did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780324153705

Legal Aspects of Managing Technology

by
  • ISBN13:

    9780324153705

  • ISBN10:

    0324153708

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2003-07-16
  • Publisher: South-Western College/West
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $180.00 Save up to $0.90
  • Buy New
    $179.10
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 24-48 HOURS

Supplemental Materials

What is included with this book?

Summary

Legal Aspects of Managing Technology addresses the ways in which law protects a wide range of intellectual assets that must be understood by any manager involved with technological innovations. Legal, social and regulatory issues are intertwined with intellectual property discussions. Concepts are defined and supplemented with excerpted court cases. Additionally, hypothetical and real-world thread cases show students how to critically think about legal choices for new intellectual property. This book focuses on integral technology topics, analyzes the most current and interesting issues, engages readers in controversial and important social issues, and demonstrates the public policy process.

Table of Contents

1 An Overview of the Technology Policy Environment in the United States 1(28)
The Intellectual Property System
3(7)
Patents
6(1)
Copyrights
6(2)
Trade Secrets
8(1)
Trademarks
8(2)
The Public Policy Process in the United States
10(11)
The Power Struggle: Federal versus State
10(5)
How Intellectual Property Policies Are Made in the United States
15(4)
The Expanding Scope of Intellectual Property Protection
19(2)
The Rising Importance of the First Amendment in Technology Policy Disputes
21(4)
Two Running Examples
25(4)
The Self-Adjusting Stair Climber
26(1)
DeCSS
27(2)
2 The International Technology Policy Environment 29(50)
Unilateral Measures: Actions Against Imports into the United States
32(2)
Private Actions for Unauthorized Imports into the United States
32(1)
The Customs Service and Section 337
33(1)
Bilateral Arrangements and the Importance of Trade Sanctions
34(5)
Section 301 and Trade Sanctions
34(1)
Special 301 and Intellectual Property Protection
35(4)
Multilateral Approaches
39(16)
Global Intellectual Property Agreements
39(4)
World Trade Organization
43(10)
Regional Trade Pacts
53(2)
International Law and the Internet
55(24)
Personal Jurisdiction: Where Can the Lawsuit Be Brought?
56(16)
What Law Applies?
72(1)
Can a Judgment Be Enforced?
73(1)
Example 1: The Yahoo! Litigation
74(2)
Example 2: The ElcomSoft Controversy
76(3)
3 Fundamental Requirements for Patent Protection in the United States 79(45)
Overview of Patent Policies and Processes
81(9)
Basic Requirements
82(3)
Patent Duration
85(4)
Enforcement Issues
89(1)
Novelty
90(17)
Is the Invention New?
93(6)
Was the Patent Application Filed in Time?
99(4)
Who Gets the Patent When There Are Multiple Inventors?
103(4)
Nonobviousness
107(7)
Patentable Subject Matter and Utility
114(3)
Patentable Subject Matter
114(1)
Utility
115(2)
Design Patents
117(7)
International Protection of Industrial Designs
121(3)
4 Obtaining and Defending Patent Rights in the United States and Globally 124(49)
The Patent Application Process: A Brief Overview
125(15)
Who May File the Patent Application?
126(1)
Invention Assignment Agreements
127(1)
When to Apply
128(3)
Dealing with the PTO
131(6)
Loss of Patent Rights
137(3)
Disclosure: Enablement and Best Mode
140(7)
Enablement
140(6)
Best Mode
146(1)
Infringement and Remedies
147(12)
Literal Infringement
148(1)
Doctrine of Equivalents
149(2)
Prosecution History Estoppel
151(4)
Infringement of Process Patents
155(4)
International Patent Protection Issues
159(14)
Substantive Patent Policy Issues
159(7)
Procedural Patent Policy Issues
166(7)
5 Patent Protection for Computer Programs and Internet Business Methods 173(31)
Patent Protection for Computer Programs: The Long and Winding Road
174(11)
Computer Processes Are Patentable Subject Matter
174(3)
Old Standards and the Importance of Physical Transformations
177(2)
The Modern Trend
179(1)
1996 PTO Examination Guidelines for Computer-Related Inventions
180(1)
The Dual Impact of the Federal Circuits State Street Decision
180(4)
Revised PTO Examination Guidelines for Computer-Related Inventions
184(1)
Other Issues Regarding Patents for Computer Programs
185(7)
Receiving a Patent from the PTO
185(1)
Disclosure
186(1)
The Possibility of Copyright Protection
187(1)
International Patent Protection of Computer Programs
188(2)
The Controversy Continues: Should Patent Protection Be Extended to Computer Programs?
190(2)
Patent Protection for Internet Business Methods
192(12)
The Controversy Over Amazons One-Click Business Method Patent
194(7)
The PTO 'S Business Method Patent Initiative
201(1)
Legislative Measures and New Proposals
202(2)
6 Biotechnology: Patent Issues and Other Policy Matters 204(39)
Basics of Genetic Engineering
205(5)
The Human Genome Project
207(3)
Cloning of Organisms
210(4)
Animal Cloning
210(2)
Human Reproductive Cloning
212(2)
Biotechnology Patent Issues
214(14)
Patents for Higher Life Forms
217(2)
Patents on Human Beings and Human Cloning Techniques
219(1)
Patent Rights and the Ownership of Progeny
220(1)
Patents on Genes
221(3)
An Important Pharmaceutical Patent Issue
224(1)
International Patent Issues
225(2)
Other Biotechnology Patent Issues
227(1)
Other Biotechnology Controversies
228(15)
Biological Safety and Diversity
228(4)
Food: Labeling and Other Regulatory Matters
232(4)
Gene Therapies
236(1)
Embryonic Stem Cells and Therapeutic Cloning
237(3)
Genetic Testing, Discrimination, and Behavioral Issues
240(3)
7 Protection of Secret Information 243(54)
Rationales for Trade Secret Laws
247(5)
Important Aspects of Trade Secret Laws
252(25)
Definition of Trade Secret
253(3)
Misappropriation
256(8)
Proving Misappropriation
264(1)
Remedies for Trade Secret Misappropriation
264(13)
Trade Secret Protection Measures
277(8)
Federal Economic Espionage Act
285(5)
International Trade Secret Protection
287(2)
Concluding Remarks About Trade Secret Protection
289(1)
Presenting Unsolicited Ideas to Third Parties
290(7)
How Companies Handle Unsolicited Ideas
293(2)
Advice for Offering Unsolicited Ideas
295(2)
8 Fundamental Aspects of Copyright Protection 297(55)
What May Be Protected by Copyright
301(12)
Protection of Original Expressions
301(7)
Protection of Databases
304(4)
Copyright Protection of Product Designs
308(5)
Rights Provided by Copyright
313(8)
The Basic Exclusive Rights
313(4)
The Digital Transmission Right for Sound Recordings
317(4)
Fair Use and Other Exceptions to Copyright Protection
321(8)
Copyright Ownership
329(7)
Works Made for Hire
329(6)
Joint Works
335(1)
Moral Rights
335(1)
How to Obtain Copyright Protection
336(8)
Registration and Deposit
336(6)
Copyright Notice
342(1)
Duration of Copyright Protection
343(1)
Infringement and Remedies
344(8)
The Substantial Similarity Standard
344(5)
Remedies
349(3)
9 Copyright Protection for Computer Programs and Digital Media 352(54)
The Importance of Distinguishing Ideas from Expressions in Computer Programs
353(9)
Levels of Abstractions in Copyrighted Works
353(4)
The Availability of Alternative Expressions
357(2)
Levels of Abstraction for Computer Programs
359(3)
The Original Approach in Computer Copyright Cases
362(9)
Protection for Computer Programs
362(4)
Protection for User Interfaces
366(5)
The Modern Approach in Computer Copyright Cases
371(13)
Protection for Computer Programs
371(7)
Protection for User Interfaces
378(4)
International Copyright Protection of Computer Programs
382(2)
Reverse Engineering of Computer Programs and Clean-Room Techniques
384(8)
Copyright and Artistic Media: Digital Sampling, Imaging, and Multimedia Works
392(14)
Digital Audio Sampling
392(2)
The Application of Fair Use to Sampling
394(7)
Digital Imaging
401(2)
Multimedia Works
403(3)
10 Copyright and the Internet 406(63)
Legal Responsibility for the Wrongful Conduct of Others
408(3)
A Framework for Analyzing Legal Responsibility
411(1)
The Controversies Over Video Recording Devices
411(5)
The ReplayTV Dispute
415(1)
The Controversies Over Audio Recording Devices
416(7)
The Controversy Over MP3 and Portable Digital Music Players
417(6)
Internet Service Provider Liability
423(9)
Contributory and Vicarious Liability
423(6)
DMCA Protects ISP's from Copyright Infringement
429(3)
Responsibility for Copyright Infringements on Peer-to-Peer File-Sharing Networks
432(16)
The Napster Dispute
432(8)
The Recording and Motion Picture Industries Contend with PostNapster Services in the Courts
440(3)
The Entertainment Industries Adopt Other Strategies to Combat File Sharing
443(5)
The DMCA and Copyright Protection Technologies
448(13)
DMCA's Anti-Circumvention and AntiTrafficking Provisions
450(9)
Other Recent DMCA Controversies
459(2)
Proposed Statutory Amendments to the DMCA
461(1)
Linking, Framing, and Other Internet Copyright Issues
461(8)
Linking
462(1)
Deep-Linking
463(2)
Inline Imaging and Framing
465(2)
Application to CoolEdge
467(1)
Other Internet Issues
467(2)
11 Protecting Trademarks and Product Designs in International Markets 469(58)
Fundamental Principles of Trademark Protection
470(14)
Trademarks and Competitive Ethics
471(3)
Trademarks and Market Efficiency
474(1)
Generic Marks
475(3)
Descriptive Marks
478(1)
The Spectrum of Trademark Protection
479(5)
Trademark Protection of Product Characteristics
484(13)
Distinctiveness of Product Characteristics
485(5)
Functionality
490(4)
Trademark Protection and Computers
494(2)
Product Design Protection in the EU
496(1)
Federal Registration: Standards and Procedures
497(6)
Likelihood of Confusion
497(1)
Use Requirements
498(1)
Reasons to Conduct a Trademark Search
499(1)
Basic Registration Procedures
500(1)
Intent-to-Use Applications
501(1)
Loss of Registration Rights
501(2)
Trademark Infringement and Remedies
503(12)
Likelihood of Confusion
503(5)
Dilution
508(4)
Remedies for Infringement
512(3)
International Aspects of Trademark Protection
515(1)
International Trademark Registration
515(7)
The Gray Market
522(5)
12 Domain Names and Other Trademark Issues on the Internet 527(37)
The Initial Problems with the Internet Domain Name System
528(7)
NSI's Revised Domain Name Registration Policy
532(2)
International Domain Name Complexities
534(1)
Policy Responses to Domain Name Problems
535(17)
Anticybersquatting Consumer Protection Act
535(4)
Preliminary Suggestions for Improvements to the Domain Name Registration Process
539(2)
The Creation of KANN
541(3)
New Generic Top-Level Domain Names
544(2)
The Uniform Dispute Resolution Policy
546(6)
Other Internet-Related Trademark Issues
552(12)
"Suck" Sites and Critical Commentary
552(4)
Metatags
556(4)
Linking and Framing
560(1)
Keying and Advertising Banners
561(3)
13 Tort Liability for Physical and Economic Harms 564(44)
Negligence
565(9)
Negligence and the Restatement of Torts
566(1)
Causation Issues in Negligence
566(2)
Proximate Cause: Responsibility for Negligence
568(1)
Defenses to Liability for Negligence
569(1)
What Is Negligent Conduct?
570(3)
Negligence and Computer Programmers
573(1)
Strict Products Liability
574(23)
Policy Reasons for Strict Products Liability
574(2)
Forms of Product Defects
576(7)
The New Restatement of Torts on Products Liability
583(3)
Consumer Product Safety Commission Regulations
586(2)
Tort Reform Measures
588(1)
Examples of Strict Liability Policies in Other Countries
589(2)
Strict Products Liability and the Computer Industry
591(6)
Intentional Torts Involving Computer Systems
597(11)
Trespass by Electronic Robots
597(4)
Spam
601(4)
Computer Viruses, Trojan Horses, and Worms
605(1)
Electronic Coercion and Self-Help
606(2)
14 Intrusions on Privacy and Other Personal Rights 608(63)
A Preliminary Look at Privacy
609(6)
Sources of Laws Regulating Privacy
609(2)
The Privacy Balance
611(4)
Monitoring Communications and Personal Activities in the Workplace
615(12)
Monitoring for Efficiency
615(1)
Monitoring Internet Activity
616(2)
Monitoring E-Mail Conversations
618(8)
Recommendations Regarding Electronic Monitoring Activities
626(1)
Collection of Personally Identifiable Information
627(15)
Data Collection on the Internet
630(12)
Measures to Protect Personal Privacy
642(7)
Anonymity
642(1)
Encryption
643(6)
Content Control and the Regulation of Indecent Speech
649(12)
The Communications Decency Act of 1996
651(4)
Private Control through Labels and Software Filters
655(2)
Child Online Protection Act of 1998
657(2)
Public Libraries and Filtering Software
659(2)
Defamation
661(7)
Intrusions on Publicity Rights
668(3)
15 Important Contract Issues for Technology Companies 671(49)
Warranties, Limitations, and Remedies
672(15)
Express Warranties
673(3)
Implied Warranties
676(2)
Remedies for Breach of Warranties and Limitations of Remedies
678(7)
Dealing with Potential Liabilities-The Y2K Example
685(2)
Shrink-Wrap and Click-Wrap Licenses
687(13)
General Principles Regarding Standardized Forms
687(1)
Standardized Forms in the Consumer Context
688(1)
The Trend in the Courts
689(6)
Click-Wrap Licenses
695(5)
The Uniform Computer Information Transactions Act
700(11)
Electronic Commerce Issues
702(3)
Electronic Agents
705(1)
Mass-Market Licenses
706(2)
Warranties
708(1)
Other Issues
709(2)
Strategic Alliances and the Importance of Alternate Dispute Resolution
711(9)
Strategic Alliances
711(3)
Alternative Dispute Resolution
714(6)
16 Antitrust and AnticourPetitive Conduct 720(48)
Overview of Antitrust
720(6)
Philosophical Justifications for Antitrust
721(2)
Antitrust Policy Makers and Remedies
723(3)
Application of the Antitrust Laws
726(12)
The Rule of Reason
726(1)
Per Se Illegality
727(2)
Monopolizing
729(2)
Service for High Technology Products: An Important Example of Antitrust Analysis
731(6)
Some Final Comments on the Application of the Antitrust Laws
737(1)
The Antitrust Debate About Microsoft
738(18)
The Issue of Monopoly Power
739(1)
The Potential Threat from Internet Browsers
740(1)
Preliminary Justice Department Antitrust Proceedings
741(2)
The 1998 Antitrust Complaint and Trial
743(13)
International Dimensions of Antitrust
756(5)
Antitrust in the European Union
757(2)
EU Merger Policy
759(2)
Antitrust, Intellectual Property, and the Doctrine of Misuse
761(7)
Intellectual Property Antitrust Guidelines
762(3)
Misuse of Intellectual Property
765(3)
Table of Cases 768(1)
Index 769

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program