I can say with confidence that the legal component in IT is not only and not so obvious copyright and contracting. The legal environment in Ukraine is quite dynamic, and therefore we have to constantly face new challenges simultaneously in different areas, such as business security, taxation, labor law, advertising, consumer protection, currency control.
Module 1. IT business structuring in Ukraine
Key components of the legal structure of IT business in Ukraine will be discussed. In particular, the forms of IT business organization (legal entity, sole proprietorship) and their taxation, the peculiarities of constituting agreements with customers of IT products and services. Particular attention will be paid to contracts entered into for the establishment of business relationships with developers and other IT professionals, as well as the procedure for their transfer of intellectual property rights to software and other intellectual objects created under the contract.
Module 2. Intellectual Property Law in IT
How intellectual property rights allow to protect and defend IT products; various modes of legal protection of software, main basic tools of protection of intellectual property rights in the digital environment.
Module 3. Industrial property tools for your business
Non-standard possibilities of legal protection of computer programs and the use of tcommercial secrets. Options for application of these opportunities in practice in various areas of business. Reasons of emerging difficulties and advantages of using additional protection of computer programs through patenting. Commercial secrets, methods of using it as an asset for small and medium-sized businesses, as well as how it can be commercialized.
Module 4. Agreements on the use of cloud technologies. SaaS contracts
Discussion of general principles and principles of drawing up and using agreements on the utilization of cloud technologies, analysis of the specific examples of the application of these agreements. Attention will be paid to both the professional use of cloud services such as Azure and the use of everyday cloud technologies from Google.
Module 5. The legal side of the GameDev industry
Models of relationships between the main categories of industry players (developers, publishers and distribution platforms). Legal aspects of gaming companies in Ukraine (organizational forms of doing business; registration of relations between the company and teams of game designers, programmers, artists, designers, etc .; the process of creating a video game and its legal design). Video games as intellectual property and ways to protect video game rights. Doctrines Look & feel, Merger doctrine, Scènes à faire in disputes over infringement of intellectual property rights in video games.
Module 6. Personal data vs technology
It is said that the Internet has made the world smaller. However, the price of such convenience is our privacy, which has also become much less with the development of IT industry. Our habits, preferences, circle of communication have become a commodity sold to advertisers, and government agencies get more and more opportunities to monitor our online and offline behavior. It is from the right to privacy that the conversation about the protection of personal data begins, which, thanks to the EU’s efforts, has become one of the main topics for business (and not only technology). During the lecture, we will find out what data is personal, how it is regulated in Ukraine, what practice is in the EU and the US, where the main technology companies come from.
Module 7. Legal aspects of e-commerce
If you want to open a bakery near your home, you will know roughly what it takes, but if you want to sell services around the world through a website, you may not. "What to consider when starting a business in the field of e-commerce?" - this is the question that will be answered during the lecture. From a theoretical point of view, consider only one: what, in fact, can be considered e-commerce? But this is the basis of the basics, and then - only practical nuances. We will consider the Ukrainian legal requirements in comparison with the European standards which implementation is provided by the Association Agreement.
Module 8. Application of blockchain technology in modern systems. Blockchain and legislation
Detailed analysis of decentralized systems in the context of the principles of their regulation. Economic aspect of decentralized systems, formation of the value of cryptocurrencies, principles of using blockchain in modern systems, common approaches to consensus and the conditions of their use. Cryptocurrency and blockchain regulation strategies, best modern practices in the world, difficulties of implementing blockchain in a regulated environment.
Module 9. Cyber threats to business and countermeasures for them
Cyber threats. Information leakage. Personal data. Critical vulnerabilities. Risk analysis. Security audit of automated systems. Vulnerabilities. Cyber-attack. Firewalls. Finding and blocking intrusions. Security event management systems. Pentenst Risk analysis when working with contractors. Cybersecurity standards. Regulations. Best practices. Requirements management. Compliance automation.
Module 10. Artificial intelligence and digital man
Artificial intelligence is aware of the principles of its construction and operation, self-learning and self-improvement, its first version finds errors within itself, corrects them and rewrites its own program indefinitely. It is increasingly striving for autonomy of decision-making and self-sufficiency. Will the responsibility of the developer, manufacturer or user be justified under such conditions? What is the transition from Homo sapiens to the digital human, which is being improved through bioengineering, the combination of organic and inorganic in the «cybernetic organism» and the transfer of consciousness to digital or other media?
Module 11. Understanding trade secrets in the United States
On August 4, 2020, Anthony Levandowski, a former Google engineer who founded an autonomous vehicle startup in 2016 that he sold to Uber for more than $600 million, was sentenced to 18 months in prison after pleading guilty to stealing trade secrets from his former employer. Those events led to a scorched earth litigation between Google’s autonomous vehicle company, Waymo, and Uber, the ride hailing service that sought to employ Levandowski. Did Uber hope to gain illicit knowledge from Levandowski’s work for Google? The case settled, and we may never know. But the case does provide a concise overview of how trade secret protection works in the United States, how hard it can be to win a trade secrets case in litigation, and therefore why internal controls to prevent trade secrets from leaving in the first place are so important.
Module 12. Bad robot: criminal responsibility and punishment for intelligent machines
Robots are now commonplace in the world. They sort and ship packages, trade stocks, and build cars. Software drives cars and assists in surgeries. Criminal law is well developed for people who use machines to commit crimes – but almost completely undeveloped for how to treat machines that commit crimes of their own accord. In this lecture, Ed Walters, an adjunct professor at Cornell Law School, will discuss the opportunities and limits of criminal law to limit and punish offenses committed by machines.