{"id":12943,"date":"2020-03-04T15:53:28","date_gmt":"2020-03-04T15:53:28","guid":{"rendered":"https:\/\/ponsip.com\/sin-categorizar\/protection-transfer-and-exploitation-software\/"},"modified":"2022-03-28T16:24:42","modified_gmt":"2022-03-28T16:24:42","slug":"protection-transfer-and-exploitation-software","status":"publish","type":"post","link":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/","title":{"rendered":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE"},"content":{"rendered":"<p>In R + D activity, the developed software requires a different transfer procedure. Experts from public and private R + D entities as well as researchers and managers from the business industry consider that the approach after introducing several strategies and their corresponding protection are key activity areas since they have a particular nature.<\/p>\n<p>This course, which consists of different conferences, is aimed at technologists and researchers from R + D centers, people from the business industry, and professionals of R + D management and knowledge transfer. The course will take place in our <u>Headquarters located at Rub\u00e9n Dar\u00edo on March 11, 2020. It will start with a welcome and a brief presentation at 09:45 and it will end at 19:45.<\/u><\/p>\n<p>Jos\u00e9 Carlos Erdozain, <strong>PONS IP<\/strong> Of Counsel specialized in Intellectual Property, will give his module about the development of the software, development of law in coding, and related materials such as flow charts. Besides, certain aspects of the legal, registry, and judicial protection together as well as limits to exclusive right will be developed.<\/p>\n<p>One of our Patent experts, Dennis Cumba, who is member of the Mechanics, Electronics, and Software Area, will explain software protection through patent, as well as addressing different aspects regarding legal frameworks and international protection issues.<\/p>\n<p>Violeta Arnaiz, lawyer of our company will finish the part of the course given by <strong>PONS IP<\/strong> with the transmission of rights over the Software, subcontracting and labor and commercial contracting.<\/p>\n<p>INNOPRAC is a <strong>PONS Business School<\/strong> and RedTransfer training project, which, with the <strong>PONS IP<\/strong> collaboration, aims to meet the training needs of R + D + I managers from different professional environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In R + D activity, the developed software requires a different transfer procedure. Experts from public and private R + D entities as well as researchers and managers from the business industry consider that the approach after introducing several strategies and their corresponding protection are key activity areas since they have a particular nature. This &#8230; <a title=\"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE\" class=\"read-more\" href=\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\" aria-label=\"Read more about PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE\">Read more<\/a><\/p>\n","protected":false},"author":6,"featured_media":12945,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[59],"class_list":["post-12943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP\" \/>\n<meta property=\"og:description\" content=\"In R + D activity, the developed software requires a different transfer procedure. Experts from public and private R + D entities as well as researchers and managers from the business industry consider that the approach after introducing several strategies and their corresponding protection are key activity areas since they have a particular nature. This ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\" \/>\n<meta property=\"og:site_name\" content=\"PONS IP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-04T15:53:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-28T16:24:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"790\" \/>\n\t<meta property=\"og:image:height\" content=\"747\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PONS IP\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PONS IP\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\"},\"author\":{\"name\":\"PONS IP\",\"@id\":\"https:\/\/ponsip.com\/#\/schema\/person\/95e8be9ba5a0fc00a9ac4625daa8640a\"},\"headline\":\"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE\",\"datePublished\":\"2020-03-04T15:53:28+00:00\",\"dateModified\":\"2022-03-28T16:24:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\"},\"wordCount\":273,\"publisher\":{\"@id\":\"https:\/\/ponsip.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png\",\"keywords\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\",\"url\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\",\"name\":\"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP\",\"isPartOf\":{\"@id\":\"https:\/\/ponsip.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png\",\"datePublished\":\"2020-03-04T15:53:28+00:00\",\"dateModified\":\"2022-03-28T16:24:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage\",\"url\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png\",\"contentUrl\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png\",\"width\":790,\"height\":747,\"caption\":\"Protection, transfer and exploitation of software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ponsip.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ponsip.com\/#website\",\"url\":\"https:\/\/ponsip.com\/\",\"name\":\"PONS IP\",\"description\":\"Consultora Global especializada en Propiedad Industrial e Intelectual.\",\"publisher\":{\"@id\":\"https:\/\/ponsip.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ponsip.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ponsip.com\/#organization\",\"name\":\"PONS IP\",\"url\":\"https:\/\/ponsip.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ponsip.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2021\/11\/logo-pons-ip.svg\",\"contentUrl\":\"https:\/\/ponsip.com\/wp-content\/uploads\/2021\/11\/logo-pons-ip.svg\",\"width\":166,\"height\":26,\"caption\":\"PONS IP\"},\"image\":{\"@id\":\"https:\/\/ponsip.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ponsip.com\/#\/schema\/person\/95e8be9ba5a0fc00a9ac4625daa8640a\",\"name\":\"PONS IP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ponsip.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8a7390cb9f094df7e62df92beab50332b56facf6716ac94f1614f16bef962de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8a7390cb9f094df7e62df92beab50332b56facf6716ac94f1614f16bef962de?s=96&d=mm&r=g\",\"caption\":\"PONS IP\"},\"url\":\"https:\/\/ponsip.com\/en\/ip-news\/author\/ponsip\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP","og_description":"In R + D activity, the developed software requires a different transfer procedure. Experts from public and private R + D entities as well as researchers and managers from the business industry consider that the approach after introducing several strategies and their corresponding protection are key activity areas since they have a particular nature. This ... Read more","og_url":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/","og_site_name":"PONS IP","article_published_time":"2020-03-04T15:53:28+00:00","article_modified_time":"2022-03-28T16:24:42+00:00","og_image":[{"width":790,"height":747,"url":"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png","type":"image\/png"}],"author":"PONS IP","twitter_card":"summary_large_image","twitter_misc":{"Written by":"PONS IP","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#article","isPartOf":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/"},"author":{"name":"PONS IP","@id":"https:\/\/ponsip.com\/#\/schema\/person\/95e8be9ba5a0fc00a9ac4625daa8640a"},"headline":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE","datePublished":"2020-03-04T15:53:28+00:00","dateModified":"2022-03-28T16:24:42+00:00","mainEntityOfPage":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/"},"wordCount":273,"publisher":{"@id":"https:\/\/ponsip.com\/#organization"},"image":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage"},"thumbnailUrl":"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png","keywords":["Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/","url":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/","name":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE - PONS IP","isPartOf":{"@id":"https:\/\/ponsip.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage"},"image":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage"},"thumbnailUrl":"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png","datePublished":"2020-03-04T15:53:28+00:00","dateModified":"2022-03-28T16:24:42+00:00","breadcrumb":{"@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#primaryimage","url":"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png","contentUrl":"https:\/\/ponsip.com\/wp-content\/uploads\/2022\/03\/fotoENG.png","width":790,"height":747,"caption":"Protection, transfer and exploitation of software"},{"@type":"BreadcrumbList","@id":"https:\/\/ponsip.com\/en\/ip-news\/uncategorized\/protection-transfer-and-exploitation-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ponsip.com\/"},{"@type":"ListItem","position":2,"name":"PROTECTION, TRANSFER AND EXPLOITATION OF SOFTWARE"}]},{"@type":"WebSite","@id":"https:\/\/ponsip.com\/#website","url":"https:\/\/ponsip.com\/","name":"PONS IP","description":"Consultora Global especializada en Propiedad Industrial e Intelectual.","publisher":{"@id":"https:\/\/ponsip.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ponsip.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ponsip.com\/#organization","name":"PONS IP","url":"https:\/\/ponsip.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ponsip.com\/#\/schema\/logo\/image\/","url":"https:\/\/ponsip.com\/wp-content\/uploads\/2021\/11\/logo-pons-ip.svg","contentUrl":"https:\/\/ponsip.com\/wp-content\/uploads\/2021\/11\/logo-pons-ip.svg","width":166,"height":26,"caption":"PONS IP"},"image":{"@id":"https:\/\/ponsip.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ponsip.com\/#\/schema\/person\/95e8be9ba5a0fc00a9ac4625daa8640a","name":"PONS IP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ponsip.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8a7390cb9f094df7e62df92beab50332b56facf6716ac94f1614f16bef962de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8a7390cb9f094df7e62df92beab50332b56facf6716ac94f1614f16bef962de?s=96&d=mm&r=g","caption":"PONS IP"},"url":"https:\/\/ponsip.com\/en\/ip-news\/author\/ponsip\/"}]}},"_links":{"self":[{"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/posts\/12943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/comments?post=12943"}],"version-history":[{"count":0,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/posts\/12943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/media\/12945"}],"wp:attachment":[{"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/media?parent=12943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/categories?post=12943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ponsip.com\/en\/wp-json\/wp\/v2\/tags?post=12943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}