Академический Документы
Профессиональный Документы
Культура Документы
Chapter 5
Ethical
&
Legal
Issues
locate,
or
contact
an
Software Infringement
Copyright infringementis the use of works protected
bycopyrightlaw without permission, violatingcertain
exclusive rights granted to the copyrightholder, such
as the right to reproduce, distribute, display or perform
the protected work, or to make derivative works.
Counterfeiting occurs when illegally copied software is
duplicated and distributed on a large scale.
Countries with weak software copyright enforcement
cost software owners billions of dollars in lost revenue.
uses
the
following
intellectual
property
remedies:
Proposes
legislation.
Files civil lawsuits.
Creates non infringement technologies.
that
have
specific
penalties
and
technology
presents
challenges
to
certain
information
should
not
be
With
purposes.
Controversy
arose
in
2000
when
and
planned
clickstream data.
to
combine
the
offline
data
with
2)
be
regulated/governed
to
protect
intellectual
property ?
The law protects intellectual property through five basic
mechanisms:
Patents
Trademarks
Licenses
Copyrights
Pa t e n t s
Patent:
the
exclusive
right
granted
by
SOURCE: Based on data from United States Patent and Trademark Office, 2005
Tr a d e m a r k s
A trademark is a mark used to identify and distinguish
products, and indicate their sources.
Trademarks protect public by ensuring it gets what it
pays for/expects to receive; protects trademark owner
against piracy and fraud.
Trademark law has been applied to the internet naming
system of domain names.
Similarities in names may result in trademark infringement
claims.
A trademark violation (cyber-squatting) involves the registration
of domains that resemble or duplicate existing ones.
Licenses
Licenses
are
an
increasingly
popular
Copyrights
that
is
made
in
compiling
of
expression
is
protected
by
the
First
Amendment.
Internet technology has resulted in what many consider
inappropriate or untargeted types of consumer contact.
Spam is the mass distribution of unsolicited electronic mail.
Many internet users believe that spam steals their resources (spam
costs companies around $22 billion a year in anti-spam filters, new
equipment and lost productivity).
information
for
the
purpose
of
to
information
passwords.
trick
them
including
into
account
giving
personal
numbers
and
VI- Governance
Primary questions:
Who will control Internet and e-commerce
What elements will be controlled and how
Governance (con)
Who Governs E-commerce and the Internet?
Currently we are in a mixed mode policy
environment where self-regulation, through a
variety of internet policy and technical bodies,
co-exists with limited government regulation.
Not true that Internet cannot be controlled. In
fact, Internet can be very easily controlled,
monitored, and regulated from a central location
(such as done by China, Singapore, etc.).
V I I -
T a x a t i o n