History of Yale Locks and Linus Yale



Linus Yale, Jr. (4 April 1821 - 25 December 1868) was an American mechanical engineer and manufacturer, best known for his inventions of locks, especially the cylinder lock. His locks are still widely distributed in today’s society, and constitute a majority of personal locks and safes. Linus Yale, Jr. was born in Salisbury, NY. Yale’s father, Linus Yale, Sr. opened a lock shop in the 1840s in Newport, NY, specializing in bank locks. Yale soon joined his father in his business and introduced some revolutionary locks that utilized permutations and cylinders. He later founded a company with Henry Robinson Towne called the Yale Lock Manufacturing Company in the South End section of Stamford, CT. Throughout his career in lock manufacturing, Yale acquired numerous patents for his inventions and received widespread acclaim from clients regarding his products.

Early years

Linus Yale’s family are of Welsh descent, and his ancestors were of the same family as Elihu Yale, the benefactor to and namesake of the well known Yale University. Yale’s father was a successful inventor who specialized in locks and mechanical engineering, and who held eight patents for locks and another half dozen for threshing machines, sawmill head blocks, and millstone dressers. In 1858, Yale’s father died, and Linus Yale, Jr. became more involved with his father’s lock company.


Portrait painting

Young Yale developed an early affinity for portrait painting, but about 1850 decided to assist his father in improving bank locks and to study mechanical problems. However, his finesse in drawing and sketching proved to be useful, as his diagrams on his later designs of locks were detailed and clear
[edit]Career in locks and mechanisms

Yale opened his own shop about 1860 in Shelburne, Massachusetts, specializing in bank locks.
He introduced some combination safe locks and key-operated cylinder locks that were improvements on previously used locks. Possessing admirable skills in mechanics and lock making, Yale created one of the first modern locks that used a pin-tumbler design. The pin-tumbler design is also known as the cylinder design, and plays significant roles in today’s locks and safes. Yale had previously harbored the practical implementation of the tumbler lock for decades, and had sketched the idea in 1844. Yale was convinced that key holes in traditional locks made the locks susceptible to thieves who could use picks, gunpowder explosives, and heat to thwart the locks. This led him to employ permanent dial and shaft designs in his inventions, known as “combination locks” today. Yale’s best-known lock design, the cylinder pin-tumbler lock, utilized a key-operated lock concept first conceived in ancient Egypt over 4,000 years ago.
Yale’s inventions were so successful and received such critical acclaim that he exhibited several of his lock designs at world’s fairs in the U.S. and overseas, winning a number of awards at these exhibitions.
Throughout his career Yale acquired many patents, mostly related to his inventions of locks and safes, but also including mechanical problems. In 1858, he patented a device for adjusting at a right angle the joiners’ square. In 1865 he patented a tool for reversing the motion of screw-taps. In 1868 he received two patents for improvements in mechanics’ vices.

Inventions

Yale had many inventions to his name throughout his career, thoroughly revolutionizing the locks industry and improving the security of financial institutions. Drawing on the principles first put to use in large wooden locks built by ancient Egyptians, Yale patented a pin tumbler lock for use in banks in 1851; he patented his pin tumbler lock for use in doors in 1863; in 1865 he patented the pin tumbler padlock, which are still widely used today. Yale’s model of the padlock was smaller, sturdier, more reliable, and innovative, proving to be a distinction among locks of his day.

Yale Bank Lock

In 1851 Yale invented what he referred to as the “Yale Magic Infallible Bank Lock,” for safes and vaults. This design allowed the owner to change its combination and would also allow the key to secure the lock while being hidden away from the exterior of the door by a hardened steel plate, which covered the key-hole behind it.

Yale stated 9 peculiarities for his Yale Magic Infallible Bank Lock that separated it from its peers: [1] 1. Being without springs, there are none to fail; it is impossible to damage by fire, dampness, or neglect. The design rid itself of the vices of the springs that become rusty or softening by heat or moisture. 2. The lock has a head that is detached from its key-bits, thus leaving a space between the head and the key-hole, making it virtually impossible to be picked. 3. When the key is withdrawn, all print or record of its action is obliterated, and no tell-tale left for duplicate keys to be made 4. Powder proof. No powder can possible be introduced into the lock itself, which eliminates the threat of gunpowder explosions. 5. Permutation lock has the ability to rearrange new key combinations. 6. In the event of a lost key, a duplicate key can be set up to unlock the lock, and upon changing the arrangement of the lock, the lost key will be powerless to open the lock. 7. The portability of the key conveys a vast advantage over traditional bank locks’. 8. Every motion of the lock is derived from movement of the hands rather than elements beyond the operator’s control, such as dirt, rust, or memory. 9. The lock is not liable to get out of order, having been made by first class machinists.soil

Yale Safe Lock

Yale’s second great invention came around 1863, which he coined the name “Yale’s Magic Infallible Safe/Door Lock.” This lock has many of the scintillating qualities of the Yale Bank Lock, and is designed for fire-proof safes and cash doors, among other items. It does not utilize springs, and is powder, damp, fire, and thief proof. The lock is not, however, a permutation lock, but each lock is unique and two different locks can never be opened with the same key. In addition, the key must be withdrawn from the lock before the bolt can be unlocked, preventing the liability of carelessly leaving the key in the keyhole.

Yale Chilled Iron Vaults and Safes

Yale’s other significant invention is the Chilled Iron Bank Doors and Vaults. Previous bank doors, vaults, and safes had plates of hard cast behind soft wrought iron, which can be easily broken using the right amount of leverage and skillful vault-picking. The hard casts are often rigid and fragile, and susceptible to heavy tinkering. Yale used a lattice screen, or basketwork of soft tough wrought iron instead of the hard cast, infused in the metal covering of the vaults, thus producing incomparably strong corners and surfaces that Yale presented to be unbreakable.

Yale Manufacturing Company

Main article: Yale (company)
In 1868, Yale and Henry Robinson Towne (b. 1844, d. 1924) founded the Yale Lock Manufacturing Company in Stamford, CT, to produce cylinder locks.

Development

Under Yale’s ingenuity and wide promotion of his inventions, Yale Locks quickly spread around major corporations in the United States and were widely adopted. Among some of Yale’s business tactics were exploiting the weakness in previously took the and locks and presenting how his locks were free of those vices; he did live demonstrations to corporate business executives and government officials that showed how he successfully picked the locks that were in operation. Due to these demonstrations and the sheer quality of Yale’s locks, Yale Lock Manufacturing quickly gained business ground. The company’s name was later changed to The Yale and Towne Manufacturing Company, which eventually became part of NACCO Industries.

Cracking the Hobbs Lock

The prominent bank locks of Yale’s day were the Hobbs or Newell locks. In an effort to present his locks over the continued usage of the Hobbs Locks, Yale contacted notable bankers and set up a live demonstration in which he successfully picked a Hobbs Lock. As described by Samuel Hammond, one of the bankers present at Yale’s demonstration, “[he] proved that the Hobbs lock is able to be picked and demonstrated it using a fake wooden key that he made.” 

Challenge to the World

As part of Yale’s business plan and effort to promote his Bank Locks, Yale presented a challenge to anyone who dared to pick his bank locks. He offered a $3000 (a hefty sum) reward to potential challengers, in the event that his locks were successfully picked.

Testimonials and Success

The utility of Yale Locks were soon widely approved and favored upon, and implemented by many firms and government agencies, including the U.S. Treasury Department, Mint of the U.S. in Philadelphia, PA, among various CEOs and Presidents of major corporations. The clients’ satisfaction in Yale’s inventions was echoed in their appreciation letters addressed to Yale:

“Briggs Bank, Clyde, April 30, 1856 Linus Yale, Jr., Dear Sir: *** About two months since, during a dark and stormy night, our bank was entered by burglars, through an adjoining cellar wall, and the vault, which was of brick, was pierced, which left us without any other protection than one of your highly approved chilled iron Burglar-Proof Safes, with your magic lock attached; these we deem sufficient, for they successfully resisted all the various devices and expedients known and practiced by burglars. We have the most implicit confidence in their strength and safety, and feel assured that when once locked, we are more secure than we should be with any other safe and lock ever yet invented. Yours, respectfully, WH. H. Coffin, Cashier.”

“I am convinced to this knowledge of the true principles of locks has enabled [Yale], in his lock, to overcome not only this, but every other know method of picking; and, in fact, I consider it and all respects superior to any other lock in the market.” -Samuel Hammond. NY, January 12, 1856

Death

On a business trip to New York City, the same year that the Yale Manufacturing Company was founded, Yale died of a sudden heart attack while negotiating to have his locks installed in a skyscraper. By that time, his locks were already selling profusely, and under Towne’s management Yale Locks became the #1 manufacturer of locks in the United States.

Legacy

Yale’s Locks still play a major part in today’s security systems. In his later years, Yale perfected the mechanism known as the “clock lock” and invented the double lock, which placed two locks within one case to be operated by the same or different combinations. His improvements in locks and boxes for the post-offices are of recognized utility and worldwide adoption. The commonly used combination locks omnipresent today also owe their dues to Linus Yale, Jr.

Awards

National Inventors Hall of Fame, Inducted 2006

Indian Data Protection Law



Does India have a Data Protection law?

Data protection law in India is currently facing many problem and resentments due the absence of proper legislative framework. There is an ongoing explosion of cyber crimes on a global scale. The theft and sale of stolen data is happening across vast continents where physical boundaries pose no restriction or seem non-existent in this technological era. India being the largest host of outsourced data processing in the world could become the epicentre of cyber crimes this is mainly due absence of the appropriate legislation. The Data Security Council of India (DSCI) and Department of Information Technology(DIT) must also rejuvenate its efforts in this regard on the similar lines. However, the best solution can come from good legislative provisions along with suitable public and employee awareness. It is high time that we must pay attention to Data Security in India. Cyber Security in India is missing and the same requires rejuvenation. When even PMO's cyber security is compromised for many months we must at least now wake up. Data breaches and cyber crimes in India cannot be reduced until we make strong cyber laws. We cannot do so by mere declaring a cat as a tiger. Cyber law of India must also be supported by sound cyber security and effective cyber forensics.

Indian companies in the IT and BPO sectors handle and have access to all kinds of sensitive and personal data of individuals across the world, including their credit card details, financial information and even their medical history. These Companies store confidential data and information in electronic form and this could be vulnerable in the hands of their employees. It is often misused by unsurplous elements among them. There have been instances of security breaches and data leakages in high profile Indian companies. The recent incidents of data thefts in the BPO industry have raised concerns about data privacy.

There is no express legislation in India dealing with data protection. Although the Personal Data Protection Bill was introduced in Parliament in 2006, it is yet to see the light of day. The bill seems to proceed on the general framework of the European Union Data Privacy Directive, 1996. It follows a comprehensive model with the bill aiming to govern the collection, processing and distribution of personal data. It is important to note that the applicability of the bill is limited to ‘personal data’ as defined in Clause 2 of the bill.

The bill applies both to government as well as private enterprises engaged in data functions. There is a provision for the appointment of, “Data Controllers”, who have general superintendence and adjudicatory jurisdiction over subjects covered by the bill. It also provides that penal sanctions may be imposed on offenders in addition to compensation for damages to victims.

The bill is clearly a step in the right direction. However due to the paucity of information, the bill is still pending.

While the Information Technology Act, 2000 (IT Act), contains provisions regarding cyber and related IT laws in India and delineates the scope of access that a party may have to on data stored on a computer, computer system or computer network, the provisions of the IT Act do not address the need for a stringent data protection law being in place.

The Information Technology Act, 2000 has recently been amended to meet challenges in cyber crime, the amended Act is yet to come into force, it has introduced two important provisions that have a strong bearing on the legal regime for data protection. These are sections 43A and 72A, inserted into the IT Act by the amendment Act. But the provisions pertaining to data security and confidentiality are grossly inadequate. In recent years the incidents of data theft in BPO has raised concern about the data privacy when one of its employees sold personal data belonging to a large number of British nationals to an undercover reporter from the British tabloid ‘The Sun’. The incident sparked off a debate among the offshore industry circles, media and the legal world as to how safe foreign data is in Indian hands. Hence, the amendments, are more of a knee-jerk reaction from the Government to the recent data thefts and other incidents, India has more to do with issues related to cyber crimes and e-commerce transactions than data protection.

The provisions purportedly for ‘data protection’ jut out as an ugly patch work on the IT Act and do not offer any comprehensive protection to personal data in India. In these circumstances the question to be asked is, Being a major IT power in the global map today, can India afford to deal with an important issue such as this in the manner in which it has dealt with in the amendments to the IT Act?.

The Recent amendments to IT Act are
Section 43A states that if a “body corporate” possessing, dealing or handling any “sensitive personal data or information” in a computer resource which it owns, controls or operates is negligent in implementing and maintaining “reasonable security practices and procedures”, and thereby causes wrongful loss or wrongful gain to any person, this body corporate will become liable to pay damages as compensation to the affected person.

The term “body corporate” is wide enough to include a company, a firm, sole proprietorship or other association of individuals engaged in professional or commercial activities. And then regarding “reasonable security practices and procedures include security practices and procedures desiring to protect information unauthorised damage, use, modification, disclosure or impairment as may be specified either (i) in an agreement between the parties; or (ii) in any law in force; and in the absence of an agreement or law, as may be prescribed by the Union government,

This mainly means that the contracting parties may specify in their contract the extent of security they demand from the disclosing parties in case of breach they are liable to pay the damages

However, the amendment Act has not specified the meaning of the term “sensitive personal data or information” and merely states that it would mean such personal information as may be prescribed by the Union government in consultation with such professional bodies or associations as it may deem fit.

Section 72 is limited to information being obtained by virtue of a “power granted under the IT Act”. The purview of section 72A, on the other hand, is wider than the existing section 72 and extends to disclosure of personal information of a person (without consent) while providing services under a lawful contract and not merely disclosure of information obtained by virtue of “powers granted under the IT Act”.

The term “intermediary” is added to section72A. This has been defined under the amendment Act to mean (with respect to any particular electronic record) a person, who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, Internet service providers, Web-hosting service providers, search engines, online payment sites, online auction sites, online market places and cyber cafes.

On comparing the Indian law with the law of developed countries the proper requirement for the Indian law can be analysed. U.K. has its Data Protection Act (DPA) of 1998. This Act is basically instituted for the purpose of providing protection and privacy of the personal data of the individuals in UK.

According to this Act , the persons and organizations which store personal data must register with the information commissioner, which has been appointed as the government official to oversee the Act. The Act put restrictions on collection of data. Personal data can be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or purposes. The personal data shall be adequate, relevant, and not excessive in relation to the purpose or purposes for which they are processed.

Both U.S and the European Union focus on enhancing privacy protection of their citizens, U.S takes a different approach to privacy from that of the European Union. US adopted the sectoral approach that relies of mix of legislation, regulation, and self regulation. In U.S, data are grouped into several classes on the basis of their utility and importance. Thereafter, accordingly a different degree of protection is awarded to the different classes of data. Whereas the provisions of IT Act deal basically with extraction of data, destruction of data, etc. Companies cannot get full protection of data through that which ultimately forced them to enter into separate private contracts to keep their data secured. These contracts have the same enforceability as the general contract.

The European Union has enforced a comprehensive Directive on Protection of personal Data to all its member countries. The US has also complied with the EU directive through the Safe Harbour Agreement to facilitate business from the EU countries. It would be wise for India to comply with the EU directive as well, as it has a lot at stake.

Despite the efforts being made for having a data protection law as a separate discipline, our legislature have left some lacuna in framing the bill of 2006. The bill has been drafted wholly on the structure of the UK Data Protection Act whereas today’s requirement is of a comprehensive Act. Thus it can be suggested that a compiled drafting on the basis of US laws relating to data protection would be more favourable to the today’ requirement.

Unauthorised use or transfer of this credit data attracts prohibitive fines. Credit information can be used only to identify the credit worthiness of a potential customer and cannot be used or transferred to unauthorised persons for any other purpose. The IT Act again, protects credit data exclusively which is just one aspect of personal data.

Any piecemeal legislation is insufficient; we need comprehensive data protection legislation that will protect the rights of data subjects, that will vehemently prohibit the use of collected data for any purpose other than for which it has been. The Information Technology Act, 2000 is not data or privacy protection legislation perse. It does not lay down any specific data protection or privacy principles. The Information Technology Act, 2000 is a generic legislation, which articulates on range of themes, like digital signatures, public key infrastructure, e-governance, cyber contraventions, cyber offences and confidentiality and privacy. It suffers from a one Act syndrome. It would be erroneous to compare the Information Technology Act, 2000 provisions with the European Directive on Data Protection (EC/95/46), OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980, and the Safe Harbor principles of the US.

In fact the Information Technology Act, 2000 deals with the issue of data protection and privacy in a piecemeal fashion. There is no an actual legal framework in the form of Data Protection Authority, data quality and proportionality, data transparency etc. which properly addresses and covers data protection issues in accordance with the principles of the EU Directive, OECD Guidelines or Safe Harbor Principles. Accordingly, even if the new proposed amendments to the Information Technology Act, 2000 were adopted, India would still lack a real legal framework for data protection and privacy.

Absence of the Data protection law is huge blow to outsourcing industry in India . The US, European Union customers are protected by a comprehensive privacy Directive, and part of that privacy protection is the requirement, placed on companies, not to transfer personal data to countries which do not offer an adequate level of protection. The result is that European Trades Unions have cited data protection as an issue which should be taken into account in many international out-sourcing deals. Stop the flow of personal data, which in turn will affect our outsourcing industry very badly.

Conclusion
For sustaining and encouraging the BPO boom, India needs to have a legal framework that meets with the expectations, both legal and of a public nature, as prevail in the jurisdictions from which data is being shipped to India. In practical terms the biggest hurdle is for India to have its framework of domestic data protection laws officially adjudged and publicly perceived as “adequate”. The EU officially declares and lists ‘adequate’ countries in terms of its 1995 Data Protection Directive. Only a handful of countries like Argentina, Canada, Australia and Switzerland, have so far made it to this “white list.” If India were also to make it to this list by enacting a suitable legislation, industries within the EU Member states would be able to export data to India without having to follow otherwise compulsory difficult and cumbersome procedures.

India rather than limit itself to being a supplier of services to corporate America and Europe, India sees itself as the place where such corporations can establish themselves. Thus by creating a good data protection law India could extend well beyond being a mere supplier of services to the world's multi-national corporations. In effect, it wants to establish corporate India.

What is Copyright Law in India



What is Copyright?
Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such as literary works (including computer programs, tables and compilations including computer databases which may be expressed in words, codes, schemes or in any other form, including a machine readable medium), dramatic, musical and artistic works, cinematographic films and sound recordings.

Copyright law protects expressions of ideas rather than the ideas themselves. Under section 13 of the Copyright Act 1957, copyright protection is conferred on literary works, dramatic works, musical works, artistic works, cinematograph films and sound recording. For example, books, computer programs are protected under the Act as literary works.

Copyright refers to a bundle of exclusive rights vested in the owner of copyright by virtue of Section 14 of the Act. These rights can be exercised only by the owner of copyright or by any other person who is duly licensed in this regard by the owner of copyright. These rights include the right of adaptation, right of reproduction, right of publication, right to make translations, communication to public etc.

Copyright protection is conferred on all Original literary, artistic, musical or dramatic, cinematograph and sound recording works. Original means, that the work has not been copied from any other source. Copyright protection commences the moment a work is created, and its registration is optional. However it is always advisable to obtain a registration for a better protection. Copyright registration does not confer any rights and is merely a prima facie proof of an entry in respect of the work in the Copyright Register maintained by the Registrar of Copyrights.

As per Section 17 of the Act, the author or creator of the work is the first owner of copyright. An exception to this rule is that, the employer becomes the owner of copyright in circumstances where the employee creates a work in the course of and scope of employment.

Copyright registration is invaluable to a copyright holder who wishes to take a civil or criminal action against the infringer. Registration formalities are simple and the paperwork is least. In case, the work has been created by a person other than employee, it would be necessary to file with the application, a copy of the assignment deed.

One of the supreme advantages of copyright protection is that protection is available in several countries across the world, although the work is first published in India by reason of India being a member of Berne Convention. Protection is given to works first published in India, in respect of all countries that are member states to treaties and conventions to which India is a member. Thus, without formally applying for protection, copyright protection is available to works first published in India, across several countries. Also, the government of India has by virtue of the International Copyright Order, 1999, extended copyright protection to works first published outside India.

Indian perspective on copyright protection:
The Copyright Act, 1957 provides copyright protection in India. It confers copyright protection in the following two forms: 
(A) Economic rights of the author, and 
(B) Moral Rights of the author.

(A) Economic Rights: The copyright subsists in original literary, dramatic, musical and artistic works; cinematographs films and sound recordings. The authors of copyright in the aforesaid works enjoy economic rights u/s 14 of the Act. The rights are mainly, in respect of literary, dramatic and musical, other than computer program, to reproduce the work in any material form including the storing of it in any medium by electronic means, to issue copies of the work to the public, to perform the work in public or communicating it to the public, to make any cinematograph film or sound recording in respect of the work, and to make any translation or adaptation of the work. In the case of computer program, the author enjoys in addition to the aforesaid rights, the right to sell or give on hire, or offer for sale or hire any copy of the computer program regardless whether such copy has been sold or given on hire on earlier occasions. In the case of an artistic work, the rights available to an author include the right to reproduce the work in any material form, including depiction in three dimensions of a two dimensional work or in two dimensions of a three dimensional work, to communicate or issues copies of the work to the public, to include the work in any cinematograph work, and to make any adaptation of the work. In the case of cinematograph film, the author enjoys the right to make a copy of the film including a photograph of any image forming part thereof, to sell or give on hire or offer for sale or hire, any copy of the film, and to communicate the film to the public. These rights are similarly available to the author of sound recording. In addition to the aforesaid rights, the author of a painting, sculpture, drawing or of a manuscript of a literary, dramatic or musical work, if he was the first owner of the copyright, shall be entitled to have a right to share in the resale price of such original copy provided that the resale price exceeds rupees ten thousand.

(B) Moral Rights: Section 57 of the Act defines the two basic “moral rights” of an author. These are: 
(i) Right of paternity, and 
(ii) Right of integrity.

The right of paternity refers to a right of an author to claim authorship of work and a right to prevent all others from claiming authorship of his work. Right of integrity empowers the author to prevent distortion, mutilation or other alterations of his work, or any other action in relation to said work, which would be prejudicial to his honour or reputation. The proviso to section 57(1) provides that the author shall not have any right to restrain or claim damages in respect of any adaptation of a computer program to which section 52 (1)(aa) applies (i.e. reverse engineering of the same). It must be noted that failure to display a work or to display it to the satisfaction of the author shall not be deemed to be an infringement of the rights conferred by this section. The legal representatives of the author may exercise the rights conferred upon an author of a work by section 57(1), other than the right to claim authorship of the work..

Indian Judiciary Response:
The response of Indian judiciary regarding copyright protection can be grouped under the following headings: 
(1) Ownership of copyright, 
(2) Jurisdictional aspect, 
(3) Cognizance taken by the court, 
(4) Infringement of copyright, 
(5) Availability of alternative remedy, and 
(6) Rectification of copyright.
(1) Ownership of copyright: The ownership in copyright may vest in different persons under different circumstances.

In Eastern Book company v Navin J.Desai, the question involved was whether there is any copyright in the reporting of the judgment of a court. The Delhi High court observed: It is not denied that under section 2(k) of the Copyright Act, a work which is made or published under the direction or control of any Court, tribunal or other judicial authority in India is a Government work. Under section 52(q), the reproduction or publication of any judgment or order of a court, tribunal or other judicial authority shall not constitute infringement of copyright of the government in these works. It is thus clear that it is open to everybody to reproduce and publish the government work including the judgment/ order of a court. However, in case, a person by extensive reading, careful study and comparison and with the exercise of taste and judgment has made certain comments about judgment or has written a commentary thereon, may be such a comment and commentary is entitled to protection under the Copyright Act”.

The court further observed: “In terms of section 52(1)(q) of the Act, reproduction of a judgment of the court is an exception to the infringement of the Copyright. The orders and judgments of the court are in the public domain and anyone can publish them. Not only that being a Government work, no copyright exists in these orders and judgments. No one can claim copyright in these judgments and orders of the court merely on the ground that he had first published them in his book. Changes consisting of elimination, changes of spelling, elimination or addition of quotations and corrections of typographical mistakes are trivial and hence no copyright exists therein.

In Godrej Soaps (P) Ltd v Dora Cosmetics Co, the Delhi High Court held that where the carton was designed for valuable consideration by a person in the course of his employment for and on behalf of the plaintiff and the defendant had led no evidence in his favour, the plaintiff is the assignee and the legal owner of copyright in the carton including the logo.

(2) Jurisdictional aspect: The question of territorial jurisdiction of the court to deal with copyright infringement was considered by the courts on several occasions.

In Caterpillar Inc v Kailash Nichani, the plaintiff, a foreign company, was carrying on business in several places in India including Delhi, through its Indian distributors and collaborators. The plaintiff claimed the relief of ad-interim injunction for preventing infringement of its copyright by the defendant, though the defendant was dealing in different goods. The Delhi high Court held that it was not necessary to show that the business being carried on by the plaintiff in Delhi should necessarily be in respect of footwear and articles of clothing as well. It is sufficient if the business was being carried on by the plaintiff in Delhi and further that there was an infringement of plaintiff’s copyright in respect of certain goods, which were being sold by the defendant in Delhi. The court further held that section 62 of the Copyright Act makes an obvious and significant departure from the norm that the choice of jurisdiction should primarily be governed by the convenience of the defendant. The legislature in its wisdom introduced this provision laying down absolutely opposite norm than the one set out in section 20 CPC. The purpose is to expose the transgressor with inconvenience rather than compelling the sufferer to chase after the former.

In Lachhman Das Behari Lal v Padam Trading Co, the Delhi High Court observed that the plaintiff being a firm functioning at Delhi, the suit filed by it in the Delhi courts is maintainable and is not liable to be rejected under Order 7 Rule 11 of the CPC as prayed. The Court further observed that the plea regarding want of territorial jurisdiction is not covered by Order7 rule 11 of CPC. The court observed that even if it is held that this court has not the territorial jurisdiction, the plaint cannot be rejected. At the most it can be returned for presentation to the proper court.

In Exphar SA & Anr v Eupharma Laboratories Ltd & Anr, the Supreme Court finally settled the position in this regard. The Court observed:“Section 62(2) cannot be read as limiting the jurisdiction of the District Court only to cases where the person instituting the suit or other proceeding or where there are more than one such persons, any of them actually and voluntarily resides or carries on business or presently works for gain. It prescribes an additional ground for attracting the jurisdiction of a court over and above the normal grounds as laid down in Section 20 of the C.P.C. Even if the jurisdiction of the Court were restricted in the manner construed by the Division Bench, it is evident not only from the cause title but also from the body of the plaint that the Appellant No 2 carries on business within the jurisdiction of the Delhi High Court. The Appellant No 2 certainly a person instituting the suit. The Division Bench went beyond the express words of the statute and negatived the jurisdiction of the Court because it found that the Appellant No 2 had not claimed ownership of the copyright, infringement of which was claimed in the suit. The appellant No 2 may not be entitled to the relief claimed in the suit but that is no reason for holding that it was not a person who had instituted the suit within the meaning of Section 62(2) of the Act.

(3) Cognizance taken by the court: To prevent copyright infringement, timely cognizance taking by the appropriate court is absolutely essential. The taking of cognizance by the court depends upon the limitation period as mentioned in the Limitation Act, 1963 and Cr.P.C, 1973.

In David Pon Pandian v State, the Madras High Court, while dealing with section 68A of the Copyright Act, observed: “ The Court can take cognizance of the offence if the charge sheet is filed within the period of limitation prescribed under Section 468 of the Cr.P.C and in computing the period of limitation, the date of commission of the offence is to be reckoned as the starting point. If the charge sheet is not filled so, the Court has no power to entertain the complaint”

The court referred the decision of the Supreme Court in State of Punjab v Sarwan Singh in which it was observed: “The object of Cr.P.C in putting a bar of limitation on the prosecution was clearly to prevent the parties from filing cases after a long time, as a result of which material evidence may disappear and also to prevent abuse of the process of Court by filing vexatious and belated prosecutions long after the date of the offence. The object, which the statute seeks to sub-serve, is clearly in consonance with the concept of fairness of trial as enshrined in Article 21 of the Constitution. It is, therefore, of utmost importance that any prosecution, whether by State or a private complainant, must abide by the letter of the law or to take the risk of the prosecution failing on the ground of limitation”

In Shree Devendra Somabhai Naik v Accurate Transheet Pvt Ltd, the Gujarat High Court explained the inter-relationship between Article 137 of the Limitation Act, 1963 and section 50 of the Copyright Act, 1957. The Court observed: “ The order passed by the by the Copyright Board is an order whereby it is held that the provisions of Article 137 of the Limitation Act are not applicable and the board has also held that the Copyright Board is a Tribunal and quasi-judicial authority for all other purposes except for the purposes which are specifically provided in the Copyright Act. It is an order by which an application under Section 50 of the Copyright act is entertained and the Copyright Board will decide the same on merits. The Copyright Board does not believe the delay alleged by the present appellant. Entertaining an application is a matter of discretion. In the present case, the Copyright Board in its wisdom, overruling the contention that the application was barred by limitation, decided to entertain the application. It is a discretionary order”.

(4) Infringement of copyright: A copyright owner cannot enjoy his rights unless infringement of the same is stringently dealt with by the Courts .The approach of the Indian Judiciary in this regard is very satisfactory.

In Prakashak Puneet Prashant Prakashan v Distt.judge, Bulandshahr &Ashok Prakashan (Regd) the Allahabad High Court held that if the petitioner publishes a book by adding any word before or after the book “Bal Bharati”, he infringes the copyright of the respondent.

In Hindustan Pencils Ltd v Alpna Cottage Industries the Copyright Board of Goa held that where the similarities between the artistic works of the parties are fundamental and substantial in material aspects, it would amount to copyright violation and the defendant’s copyright is liable to be expunged from the register of copyright.

The Board referred the decision of Prem Singh v Cec Industries wherein it was observed: “ In a case where the first party himself is shown to have adopted or imitated a trademark and copyright of a third party, then Courts can resolutely decline to step in aid of this party because honesty of action is the crux of the matter and Courts protection is extended only on the principle that damage to a party who has acquired goodwill or reputation in certain trading style for making his goods, should not be allowed to be affected by the dishonest user of the same by another”.

The Board further referred the decision of the apex court in R.G. Anand v M/S Delux Films where the Court observed: “Where the same idea is being developed in a different manner, it is manifest that the source being common, similarities are bound to occur. In such a case, the Courts should determine whether or not the similarities are on fundamental or substantial aspects of the mode of expression adopted in the copyrighted work with some variations here and here. In other words, in order to be actionable the copy must be a substantial and material one which at once leads to the conclusion that the defendant is guilty of the act of piracy.

In Ushodaya Enterprises Ltd v T.V. Venugopal the division bench of the Andhara Pradesh High Court held that even though the defendant has registered the carton under the Trademark Act, that may not come to the aid of the defendant as the case of the plaintiff is that it owns a copyright of the artistic work under the Copyright Act and no registration is required for the same. Thus the court held that the plaintiff was justified in alleging infringement of his artistic work.

In Khajanchi Film Exchange v state of MP the appellants apprehending the violation of their copyright in the film, prayed for the writ of “Mandamus” without first exhausting the alternative remedy available under the Copyright Act. The Division Bench of the Madhya Pradesh High Court Observed: There is no dispute in the submission that it is the duty of police to be watchful in the area and detect crime and punish the criminal in accordance with law. But the petitioners did not complain that any stage nor did they seek action from other functionaries of the State. They ask for mandamus without putting the grievance before the respondent and seeking their reaction. The writ petition was filed 16 days before the release of the film. Enough time appellants had, to approach the authorities/ police and later to the respondents giving their reaction to the grievance and how it was ready to deal with the matter. Therefore, unless the demand was put across and reaction awaited for some time, moving the court was premature and unsustainable. Therefore, petition was filed on mere apprehension that appellants would be deprived of their rights which did not exist when claim for mandamus was made. Mandamus can be granted only when default, commission, or omission takes place which had not happened in this case”.

In Jolen Inc v Shoban Lal Jain the Madras High Court held that latches and acquiescence is a good defence to an action for copyright infringement. The court held that the plaintiff having allowed the defendant to carry on the business under the trade name of the plaintiff for 7 years is prima facie guilty of acquiescence and it cannot claim for relief of injunction against the defendant as the balance of convenience is in favour of him.

(5) Availability of alternative remedy: The availability of an efficacious alternative remedy prevents a person from invoking the writ jurisdiction of the High court.

In Khajanchi Film Exchange and Another v State of M.P and others petitioners instead of approaching the concerned authorities filed a writ petition in the High Court. The Madhya Pradesh High Court observed: “ The film was not yet released. The petitioners did not approach the respondents. There was no failure on the part of the respondents in performance of their legal duties with respect of the right complained of. The entire machinery was put to doubt by the petitioners on the basis of the averments made in the writ petition that it is to the common knowledge that they do not take action. Thus apprehending infringement of their rights, the writ petition was filed. The petitioners should have approached the concerned authorities first; and in the event of their failure to take preventive measures/seizure of cassettes under the M.P.Police Regulations and the copyright Act, the petitioners should have approached this Court. If a writ is entertained and relief readily granted before release of the movie without approaching the respondents who have to prevent threatened violation of copyright, it would open a flood gate of litigation. The copyright Act provides adequate safeguards and procedure. It cannot be said that a mere apprehension that certain offence may take place, a writ can be filed seeking a direction that no such offence be allowed to take place. First authorities have to be asked to prevent it. The function of the police is to prevent piracy and unauthorized exhibition. In the instant case there was no inaction on the part of the police and other concerned officials and they were unnecessarily dragged in writ petition without even putting them to notice of proposed writ. No demand notice was served, no specific complaint was lodged. Thus writ is not maintainable.

(6) Rectification of copyright: In the rectification proceedings, an entry in the Copyright Register pertaining to a particular copyright can be expunged by the Copyright Board.

In Lal Babu Priyadarshi v Badshah Industries the Division bench of the Patna high Court Observed: Rule 16(3) of the Copyright Rules, 1958 which embodies the principle of natural justice provides that when there is a rival claim with regard to subject matter of the copyright then no order can be passed in favour of any party without hearing the application of the other applicant. Non-observance of the said provision will vitiate the order with regard to the entry in the Register of the Copyright. The said requirement cannot be waived nor non-observance of the said provision can be said to be a mere irregularity. If a person making an application under section 45 is not aware of the rival claim then the matter would be different. But in this case, as is evident from the notice sent by the appellants through their counsel, they were aware of the claim of the respondents and as such they should have given notice to the respondents intimating them of their intention to file an application for registration so that the respondents could have raised objections and, thereafter, the matter would have been decided in terms of provisions contained in Section 45, read with Rule 16. In this case Rule 16 has not been followed before making the entry in the Register of Copyright under section 45 and, thus, the Board rightly came to the conclusion that non-observance of the provisions of Rule16 (3), which is mandatory in nature, has vitiated the certificate of registration in favour the appellants.

Copyright Infringement:
Direct Infringement: Direct infringement is a strict liability offence and guilty intention is not essential to fix criminal liability. The requirements to establish a case of copyright infringement under this theory are: 
(1) Ownership of a valid copyright; and 
(2) Copying or infringement of the copyrighted work by the defendant.

Thus, a person who innocently or even accidentally infringes a copyright may be held liable under the Copyright Act of the U.S. and under the laws of various other countries. The guilty intention of the offender can be taken into account for determining the quantum of damages to be awarded for the alleged infringement.

Contributory infringement: The contributory infringement pre-supposes the existence of knowledge and participation by the alleged contributory infringer. To claim damages for infringement of the copyright, the plaintiff has to prove: 
(1) That the defendant knew or should have known of the infringing activity; and 
(2) That the defendant induced, caused, or materially contributed to another person’s infringing activity.

Vicarious Infringement: Vicarious copyright infringement liability evolved from the principle of respondent superior. To succeed on a claim of vicarious liability for a direct infringer’s action, a plaintiff must show that the defendant: 
(1) Had the right and ability to control the direct infringer’s actions; and 
(2) Derived a direct financial benefit from the infringing activity.

Thus, vicarious liability focuses not on the knowledge and participation but on the relationship between the direct infringer and the defendant.

Legal precedent for vicarious copyright infringement liability has developed along two general relational lines. The first relational line involves the employer/employee relationship, whereas the second involves the lessor/lessee relationship.

Internet and copyright infringement theories: The advent of information technology has made it difficult to apply the traditional theories to various cyberspace entities and organizations. These cyberspace players can be grouped under the following headings: 
(1) Internet Service Providers (ISPs),
(2) Bulletin Board Services Operators (BBSO),
(3) Commercial Web Page owner/operators, and
(4) Private users.

(1) Internet Service Providers (ISPs): An ISP most often provides Internet access and he may be held liable for copyright infringement. In Religious Technology Center v Netcom On-Line Communication Services, Inc a former minister uploaded some of the copyrighted work of the Church of Scientology to the Internet. He first transferred the information to a BBS computer, where it was temporarily stored before being copied onto Netcom’s computer and other Usenet computers. Once the information was on Netcom’s computer, it was available to Netcom’s subscribers and Usenet neighbors for downloading for up to eleven days. The plaintiffs informed Netcom about the infringing activity; nonetheless, Netcom refused to deny the subscriber’s access because it was not possible to prescreen the subscriber’s uploads, and kicking the subscriber off the Internet meant kicking off the rest of the BBS operator’s subscribers. Thus, plaintiffs sought a remedy against Netcom for infringement under all three theories –direct, contributory, and vicarious.

The court first analyzed whether Netcom directly infringed plaintiff’s copyright. Since Netcom did not violate plaintiff’s exclusive copying, distribution, or display rights, Netcom was held not liable for direct infringement. The court then analyzed the third party liability theories of contributory and vicarious infringement. The court held that Netcom would be liable for contributory infringement if plaintiffs proved that Netcom had knowledge of the infringing activity. The court then analyzed whether Netcom was vicariously liable. Here, once again the court found that a genuine issue of material fact supporting Netcom’s right and ability to control the uploader’s acts existed. The court found that Netcom did not receive direct financial benefit from the infringement. Thus, the court found that the Netcom was not liable for direct infringement, could be liable for contributory infringement if plaintiffs proved the knowledge element, and was not liable for vicarious infringement.

(2) Bulletin Board Services: The BBSs are more vulnerable to copyright infringement litigations than the ISPs because they can operate independent of the World Wide Web.

The first case in this category was Playboy Enterprises, Inc v Frena.In this case, the defendant operated a subscription BBS that allowed the subscribers to view, upload, and download material. The court held that Frena had violated Playboy’s exclusive distribution right and their exclusive display right. Because Frena supplied a product containing unauthorized copies of copyrighted work, he has violated the distribution right. Moreover, because Frena publicly displayed Playboy’s copyrighted photographs to subscribers, he violated the display right. The court concluded that Frena was liable for direct infringement, though Frena himself never placed infringing material on the BBS and despite his arguments that he was unaware of the infringement. The court relied upon the strict liability theory and held that neither intent nor knowledge is an essential element of infringement.

In Sega v Maphia the BBS was providing services to numerous subscribers who upload and downloaded files to and from the BBS. The evidence clearly showed that the BBS operator knew that subscribers were uploading unauthorized copies of Sega’s video games to and downloaded from his BBS. The court held that since the BBS operators only knew and encouraged uploading and downloading, but did not himself upload or download any files, he was not liable for direct infringement. The court, however, found the BBS operator contributory liable. Regarding the knowledge element, the BBS operator admitted that he had knowledge of the uploading and downloading activity. The court rejected the BBS operator’s asserted fair use defense since their activities were clearly commercial in nature. Further, the nature of the copyrighted games was creative rather than informative and the entire copyrighted works were copied, uploaded, and downloaded. This copying had adversely affected the Sega’s sale.

(3) Commercial Web sites: The Web Page owners must be cautious of the things they post on their Web Pages so that they do not violate the stringent provisions of the copyright laws. A Web Page owner cannot successfully plead and prove that they were unaware about the copyrighted material because copyright notices are prominently given in authorized software. They also have the controlling power over the content of their pages. The owner are usually the parties that actually perform the uploads to their pages.

(4) Private Users: A computer user who uploads copyrighted material to the Internet is liable for direct infringement. This liability could be avoided only if he can prove the fair use doctrine. Thus, an Internet user should not post copyrighted material on the Internet in a casual manner.

On-line copyright issues in India:
The reference to on-line copyright issues can be found in the following two major enactments: 
(1) The Copyright Act, 1957, and 
(2) The Information Technology Act, 2000.

(1) Copyright Act, 1957 and on-line copyright issues: The following provisions of the Copyright Act, 1957 can safely be relied upon for meeting the challenges of information technology:

(a) The inclusive definition of computer is very wide which includes any electronic or similar device having information processing capabilities. Thus, a device storing or containing a copyrighted material cannot be manipulated in such a manner as to violate the rights of a copyright holder.

(b) The term computer Programme has been defined to mean a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result. It must be noted that Section13(a) read with Section 2(o) confers a copyright in computer Programme and its infringement will attract the stringent penal and civil sanctions.

(c) The inclusive definition of literary work includes computer programmes, tables and compilations including computer databases. Thus, the legislature has taken adequate care and provided sufficient protection for computer related copyrights.

(d) The copyrighted material can be transferred or communicated to the public easily and secretly through electronic means. To take care of such a situation, the Copyright Act has provided the circumstances which amount to communication to the public. Thus, making any work available for being seen or heard or otherwise enjoyed by the public directly or by any means of display or diffusion other than by issuing copies of such work regardless of whether any member of the public actually sees, hears or otherwise enjoys the work so made available, may violate the copyright. The communication through satellite or cable or any other means of simultaneous communication to more than one household or place of residence including residential rooms of any hotel or hostel shall be deemed to be communication to the public

(e) The copyright in a work is infringed if it is copied or published without its owner’s consent. The Copyright Act provides that a work is published if a person makes available a work to the public by issue of copies or by communicating the work to the public. Thus, the ISPs, BBS providers, etc may be held liable for copyright violation if the facts make out a case for the same.

(f) The copyright in a work shall be deemed to be infringed when a person, without a license granted by the owner of the copyright or the Registrar of Copyrights under this Act or in contravention of the conditions of a license so granted or of any condition imposed by a competent authority under this Act- 
(i) Does anything, the exclusive right to do which is by this Act conferred upon the owner of the copyright, or
(ii) Permits for profit any place to be used for the communication of the work to the public where such communication constitutes an infringement of the copyright in the work, unless he was not aware and had no reasonable ground for believing that such communication to the public would be an infringement of copyright.

(g) The Copyright Act specifically exempts certain acts from the purview of copyright infringement. Thus, the making of copies or adaptation of a computer Programme by the lawful possessor of a copy of such computer Programme from such copy in order to utilize the computer Programme for the purpose for which it was supplied or to make back-up copies purely as a temporary protection against loss, destruction, or damage in order only to utilize the computer Programme for the purpose for which it was supplied, would not be copyright infringement. Similarly, the doing of any act necessary to obtain information essential for operating inter-operability of an independently created computer Programme with other programmed by a lawful possessor of a computer Programme is not a copyright violation if such information is not otherwise readily available. Further, there will not be any copyright violation in the observation, study or test of functioning of the computer Programme in order to determine the ideas and principles, which underline any elements of the Programme while performing such acts necessary for the functions for which the computer Programme was supplied. The Act also makes it clear that the making of copies or adaptation of the computer Programme from a personally legally obtained copy for non-commercial personal use will not amount to copyright violation.

(h) If a person knowingly makes use on a computer of an infringing copy of a computer Programme, he shall be held liable for punishment of imprisonment for a term which shall not be less than seven days but which may extend to three years and with fine which shall not be less than fifty thousand rupees but which may extend to two lakh rupees. However, if the computer Programme has not been used for gain or in the course of trade or business, the court may, for adequate and special reasons to be mentioned in the judgment, not impose any sentence of imprisonment and may impose a fine which may extend to fifty thousand rupees.

It must be noted that copyright can be obtained in a computer Programme under the provisions of the Copyright Act, 1957. Hence, a computer Programme cannot be copied, circulated, published or used without the permission of the copyright owner. If it is illegally or improperly used, the traditional copyright infringement theories can be safely and legally invoked. Further, if the medium of Internet is used to advance that purpose, invoking the provisions of the Copyright Act, 1957 and supplementing them with the stringent provisions of the Information Technology Act, 2000, can prevent the same.

(2) Information Technology Act, 2000 and on-line copyright issues: The following provisions of the Information Technology Act, 2000 are relevant to understand the relationship between copyright protection and information technology:

(a) Section 1(2) read with Section 75 of the Act provides for extra-territorial application of the provisions of the Act. Thus, if a person (including a foreign national) violates the copyright of a person by means of computer, computer system or computer network located in India, he would be liable under the provisions of the Act.

(b) If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network accesses or secures access to such computer, computer system or computer network or downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Thus, a person violating the copyright of another by downloading or copying the same will have to pay exemplary damages up to the tune of rupees one crore which is deterrent enough to prevent copyright violation.

(c) While adjudging the quantum of compensation, the adjudicating officer shall have to consider the following factors: 
(i) The amount of gain or unfair advantage, wherever quantifiable, made as the result of the default; 
(ii) The amount of loss caused to any person as a result of the default; 
(iii) The repetitive nature of the default.

Thus, if the copyright is violated intentionally and for earning profit, the quantum of damages will be more as compared to innocent infringement.

(d) A network service provider (ISP) will not be liable under this Act, rules or regulations made there under for any third party information or data made available by him if he proves that the offence or contravention was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence or contravention. The network service provider under section 79 means an intermediary and third party information means any information dealt with by a network service provider in his capacity as an intermediary.

(e) The provisions of this Act shall have overriding effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.[55]

The future of copyright in India:
The copyright laws in India are set to be amended with the introduction of the provisions for anti-circumvention and Rights Management Information in the Indian copyright regime although India is under no obligation to introduce these changes as it is not a signatory to WCT or WPPT.

With the amendment of the Copyright Act in 1994, which came into force on 10 May 1995, the situation with regard to copyright enforcement in India has improved. According to Ramdas Bhatkal of Popular Prakashan, Bombay, "We had problems of piracy relating to medical textbooks before the law was amended. At that time we found that while the law may be on our side, it was necessary to get a court order for search and this meant that there was sufficient notice to the pirate to take defensive action before the court order could be implemented. Therefore we preferred to accept the situation and did nothing. Since the changes which make copyright violation a cognizable offence it has been possible to use the legal mechanism as a deterrent."

Section 64 of the Indian Copyright Act 1957 provides that "Any police officer, not below the rank of a sub-inspector, may, if he is satisfied that an offence under Section 63 in respect of the infringement of copyright in any work has been, is being, or is likely to be, committed, seize without warrant, all copies of the work, wherever found, and all copies and plates used for the purpose of making infringing copies of the work, wherever found, and all copies and plates so seized shall, as soon as practicable, be produced before a magistrate."

"Copying a book is similar to stealing somebody's jewellery. Large scale organized copying is like robbing a jeweller's shop or a bank. But then, there is a major difference. In the case of a bank robbery the newspapers are full of sensational news and the whole might of the State, especially the police, jumps in to catch the culprit, there is pressure of public opinion even on the judge trying the case. The effect is electric.

On the other hand, in the case of a book pirate, the police justify their inaction by pointing to murder dockets; the State deflects the desperate appeals of Copyright owners with nonchalance and the judge sits with a `so what' attitude while the man on the street remains in stark oblivion.

"The copyright does not protect the idea but it does protect the skill and the labour put in by the authors in producing the work. A person cannot be held liable for infringement of copyright if he has taken only the idea involved in the work and given expression to the idea in his own way. Two authors can produce two different works from a common source of information each of them arranging that information in his own way and using his own language. The arrangement of the information and the language used should not be copied from a work in which copyright subsists."

Before I conclude, I must make it clear that despite the variety of cases given in this paper, there is not much piracy of books in India. By and large, to save their business interests, publishers and distributors try to enforce copyright to the best of their abilities. Yet, piracy hurts them hard because the books which get pirated invariably are the few with good margin and high demand. Deprived of the profits from such bestsellers the book industry starved of the much needed capital for growth and investment in literary works of significance but low sales potential, especially by up-coming authors. Harsher measures are therefore needed to curb piracy.

Another area of copyright infringement which needs to be tightened up relates to protection of author's rights vis-a-vis the assignee or the licensee. There is need to develop a model contract, too, which should also provide protection for the author's rights in the fast changing scenario of electronic publishing, Internet, etc.

Conclusion:
The provisions of the abovementioned two enactments show that the Copyright protection in India is strong and effective enough to take care of the Copyright of the concerned person. The protection extends not only to the Copyright as understood in the traditional sense but also in its modern aspect. Thus, on-line copyright issues are also adequately protected, though not in clear and express term. To meet the ever- increasing challenges, as posed by the changed circumstances and latest technology, the existing law can be so interpreted that all facets of copyright are adequately covered. This can be achieved by applying the purposive interpretatio” technique, which requires the existing law to be interpreted in such a manner as justice is done in the fact and circumstances of the case. Alternatively, existing laws should be amended as per the requirements of the situation. The existing law can also be supplemented with newer ones, specifically touching and dealing with the contemporary issues and problems. The Information Technology Act, 2000 requires a new outlook and orientation, which can be effectively used to meet the challenges posed by the Intellectual Property Rights regime in this age of information technology. Till the country has such a sound and strong legal base for the protection of Intellectual Property Rights, the judiciary should play an active role in the protection of these rights, including the copyright. The situation is, however, not as alarming as it is perceived and the existing legal system can effectively take care of any problems associated with copyright infringement.

Article is Authored by: Mahendra Kumar Sunkar 
B.A;LL.B(Hons.) IIIrd year - National Law Institute University - Bhopal

How Technology Has Affected Our Memory


I remember plenty of seven-digit numbers from my youth -- the Gabrielli's home phone, the Young's, and the Bardo's among them. I probably had about 20 numbers cataloged in my 12-year-old brain.
I remember memorizing directions to ride my bike to various swimming holes in Concord,N.H., including the old train bridge spanning the Merrimack River off I-93′s exit 16. I remember reciting state capitals, spelling lists, and multiplication tables in school.
Now, I honestly don't have my fiancée Rebecca's phone number memorized.
It's a valid question as to how much information we should -- or have to -- memorize when everything you could ever want to discover or be reminded of is a mouse click or swipe away. Researcher Tracy Dennis' recent post on her blog Psyche's Circuitry, which touches on memory, technology, and creativity highlights some of these issues:
Research has recently shown that when we think we can look up information on the Internet, we make less effort and are less likely to remember it. This idea is referred to as "transactive memory" -- relying on other people or things to store information for us.
I constantly look up little tidbits of information. From sorbet recipes to Wendell Berry quotes, I find it exhilarating to access whatever I want, whenever I want. But I also take pride in storing and remembering things, wherever they may reside in my brain. I'm glad I didn't grow up tethered to an all-knowing device, and I wonder how transactive memory is affecting students.

MEMORIZATION IN EDUCATION

Do many students feel the need to learn anything by heart? I've encountered plenty of students at the middle and high school level who can't instantly recall and use basic math. I've encountered plenty of students who couldn't point out Iraq or Afghanistan on a map, despite our nation's intense involvement with these countries over the past 10 years. Rote memorization of ideas and facts, of course, is often scorned upon in schools nowadays, being seen as an outdated model of learning. Nonetheless, I think it is an advantage to be able to instantly recall information, draw connections between things you know by heart, synthesizing what you know without relying on technology.
pb_2.jpg
Psyche's Circuitry's post continues, "On the other hand, shouldn't the vast amounts of information we have at our fingertips aid us in our creative endeavors? Haven't our world and the vision we have of what is possible expanded? Couldn't this make us more creative?"
It should, but in my experience, the answer is a resounding "no" for many students. We don't spend enough time teaching students how to utilize and take advantage of information technology. I should model in my classroom how, for example, I read various websites and blogs to help formulate new ideas. Or how Rebecca gathers ideas for DIY projects on Pinterest, and how I then take that information and research what I might need to build a new piece of furniture. Traditional schools and pedagogy is so far behind what is possible and, as a result, we've got a generation of students mostly unequipped to take advantage of creative possibilities.
My gut instinct is that it's not good development for people and society to rely too much on transactive memory.
How many phone numbers do you still know?

Photo of child holding mobile device by Paul Mayne on Flickr, and used with Creative Commons license.
Paul Barnwell teaches English and digital media at Fern Creek Traditional High School in Louisville, Ky. In his spare time, he enjoys bow hunting, urban gardening, and rooting for the New England Patriots. He is currently a student at Middlebury College's Bread Loaf School of English. You can read more of his thoughts on education, technology, and culture on his blog, where this post originally appeared.


Courtesy : PBS


How to Extend Wi-Fi Coverage and Eliminate Dead Zones


M
ost users having a wireless router at home or office usually complain of dead zones and low wireless connectivity in certain areas. This usually happens when you have a large room or multiple rooms, where a single wireless router cannot serve the entire area effectively. Upgrading to Wi-Fi ‘n’ routers or installing high-gain antennas could solve the problem, but the chances are remote when it comes to accessing the signals in a larger area or if you have many walls in between you and your router, especially. Adding Wi-fi signal repeaters can help, but this increases the overall cost of the hardware. 

A simpler and slightly cheaper solution would be installing additional wireless routers in other rooms, which will solve the problem. In this workshop, we show you how to configure multiple routers on the same network. Using this trick, you can have one single SSID throughout the entire network and stay in the same subnet too. Before you proceed, make sure you have an extra router handy with you. Any basic router would do since the goal is to spread the Wi-Fi network to a specific part of the house and not the whole house. You can invest in a few cheap Wi-Fi ‘g’ or ‘n’ routers, depending on how big your house is.

Choosing the right channel is very important
Choosing the right channel is very important


Let’s begin with an example to make you understand the network a bit better. You have a large home, which spreads across two or more rooms or floors. You have one wireless router, which is connected to the Internet gateway (either a DSL modem or a direct connection through your cable guy) and is placed in your living room. You can access this wireless network in your living room with ease, but your bedroom, kitchen, terrace or garden area has a very weak signal or you are unable to even get the network there. All you need is an additional router or more routers, which will pick up the primary network from another room and extend it further into its area. We shall take an example of a scenario where three routers are required to cover the area in the living room, the bedroom and the garden. Let’s call the primary wireless router in the living room as LR1, BR1 for the wireless router in the bedroom and GR1 for the one in the garden. Now we assume that LR1 is configured by default with SSID ‘RAHUL’ and a secure WPA2 password.

Let’s assume IP address is 192.168.0.1 and the DHCP server is enabled.  All clients now connecting to this router will be given IP addresses by this DHCP server on LR1 from 192.168.0.2, 192.168.0.3, and so on. Log in to your router using that IP in a browser and open the settings page.  Here, set the wireless network channel to ‘Channel 1’. Now, dig around a bit till you find the option to increase the antenna gain, and set it to the highest possible strength. Save and restart the router. LR1 is now configured.

Configuring LR1
Configuring LR1



Now let’s configure the second router BR1, which is placed in the bedroom. Once again, connect the router to a PC via the Ethernet or Wi-Fi network for configuration. Open the setup page of the router and start the setup wizard. Configure the WAN IP (Internet gateway) settings as ‘Dynamic’. This will receive an IP address from the primary router automatically. Next move on to configure the wireless network details, such as SSID and security password. Now enter the SSID the same as the primary router LR1 (in this case ‘RAHUL’). Enter the security type (in this case WPA2) and password, which is again identical to LR1. Next, set the channel number as channel 6, so that there is no overlapping of the channels between LR1 and BR1. Increase the antennal signal strength to maximum. Next, move on to the LAN settings and disable the DHCP server. Save the settings and the router will restart. Now BR1 is also configured. 

Courtesy : tech2

Microsoft Office 2013 First Impressions





Microsoft Corp.'s CEO Steve Ballmer recently unveiled the customer preview of the new Microsoft Office, optimised for Windows 8 and touch-based devices like tablets. This release features an intuitive design that works beautifully either with touch, stylus, mouse or keyboard across new Windows devices. The new Office is social and unlocks modern scenarios in reading, note-taking, meetings and communications, and will be delivered to subscribers through a cloud service. We decided to give it a quick try and here are our initial impressions on the widely used applications that form Office 2013. 


SkyDrive syncing


Aesthetics and UI enhancements



Office 2013 is slick and buttery smooth. There hasn't been much change to the UI, with the same ribbons, options and enhancements still there, but there are a ton of new features that we have individually covered below. However, the overall aesthetics and user interface of this new version is simply beautiful – from the smooth refresh rate for the cursor and the lag-free, fluid scrolling to neat little subtle animations, everything feels buttery. The colour styles are well chosen, giving this new Office a very minimalistic yet professional look. Let’s have a look at the individual applications below. 



Word 2013



Images in Word now come with live layout and alignment. What this indicates is that if you add an image to your text and move it around the page, your text automatically aligns itself based on where the image is placed, in real time. You also have a simple mark-up view that provides you with a clean, uncomplicated view of your document, but you still see markers where changes and comments have been made. You can click on the vertical bar on the left side of the text to see the changes. Or click the comment icon on the right to check out comments about the text. The read mode has got a neat little trick – all images can be expanded from the read view itself, giving you a uniform read in a single window. 


Word 2013


Users can also add and play online videos inside their Word documents. You can also add pictures from Facebook, Flickr, and other online photo services without having to save them to your computer. Click Insert > Online Video to add a video to the document.


Image-only PDFs didn’t have as many editing options like we have seen with free online software, but PDFs with texts are now easy to edit and save. We’re not sure if this is a good thing, though; editing PDFs was always known to be a complicated process and this may just be an easy way out for those wanting to make changes in their PDF files. 


Excel 2013 



Flash filling your data is now a part of Excel 2013. It’s really helpful for those working with insanely large numbers of spreadsheets with similar actions for particular rows and columns. For example, you start typing the first names of your email IDs which are in column 1 and the rest of the names are added automatically. Simple, yet saves a lot of time. 


Excel 2013


You can analyze data using live previews and Excel gives you a quick analytical chart in the column itself, showing you the differences between the different values. A recommended chart option in the Insert tab lets Excel recommend you charts based on the data you have entered. The look and feel of Excel may not be a complete overhaul from previous versions, but why fix something that’s not broken? With the new subtle animations and smooth transitions, the experience with Excel 2013 makes us like it even more.


Courtesy : tech2