Feeds

'Complacent' businesses turn blind eye on IP crime, says UK.gov

Viva Hooky Street!

High performance access to file storage

The government has accused UK businesses of not doing enough to protect their intellectual property.

According to new research commissioned by the Intellectual Property Office’s IP crime group, many companies understand the need to protect IP but fail to do anything about it.

It found 40 per cent of individuals surveyed took no practical action such as trade mark registration or employee training to ensure theirs and others IP was protected.

The IP crime group interviewed what it described as a “random sample” of over 1,000 working adults, including those at management level, based in both private and public sector organisations and in businesses of all sizes across England and Wales.

It said a third of businesses were clueless over whether goods sold on their premises by external traders were legit or not.

The group also found that, out of those individuals who knew that employees were selling DVDs at work, nearly a fifth knew that they were knock-off goods but turned a blind eye to such “illegal activity”.

Meanwhile, over a quarter of respondents do not warn staff that they mustn’t download “illegal content” at work, according to the research. It found that many managers shirked responsibility to prevent employees and work mates from buying pirated gear.

However, the report didn't reveal how the UK.gov could effectively change the "complacent" habits that prevail among Blighty businesses when it comes to IP, beyond being a bit shouty about why such inertia is bad for the economy.

"Intellectual property is central to the UK economy and therefore businesses of all sizes cannot afford to be complacent in respecting its value - ensuring effective measures are in place to prevent workplace IP crime are an important part of this,” said the IP Office’s director of copyright and IP enforcement Ed Quilty. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.