did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780324399738

Legal Aspects Of Managing Technology

by
  • ISBN13:

    9780324399738

  • ISBN10:

    0324399731

  • Edition: 4th
  • Format: Paperback
  • Copyright: 2006-07-10
  • Publisher: South-Western College/West
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $294.99 Save up to $1.47
  • Buy New
    $293.52
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 24-48 HOURS

Supplemental Materials

What is included with this book?

Summary

Whether you plan a career in management, engineering, architecture, biology, computer science, or other field that deals with innovations in any technological field, LEGAL ASPECTS OF MANAGING TECHNOLOGY will give you the understanding of the fundamental legal issues pertinent to technology management you need to competently create strategic plans in consultation with their attorneys. Up-to-date coverage focuses on integral technology law topics, including a intellectual property rights, privacy, biotechnology, e-commerce and antitrust.

Table of Contents

An Overview of the Technology Policy Environment in the United States
1(26)
Introduction
1(2)
The Intellectual Property System
3(8)
Patents
6(1)
Copyrights
6(1)
Trade Secrets
7(1)
Trademarks
8(3)
The Public Policy Process in the United States
11(9)
The Power Struggle: Federal versus State
11(2)
How Intellectual Property Policies Are Made in the United States
13(4)
The Expanding Scope of Intellectual Property Protection
17(3)
The Rising Importance of the First Amendment in Technology Policy Disputes
20(3)
Two Running Examples
23(3)
The Self-Adjusting Stair Climber
24(1)
DeCSS
25(1)
Conclusion
26(1)
The International Technology Policy Environment
27(49)
Introduction
27(3)
Unilateral Measures: Actions Against Imports into the United States
30(1)
Private Actions for Unauthorized Imports into the United States
30(1)
Enforcement through Administrative Action
31(1)
Bilateral Arrangements and the Importance of Trade Sanctions
31(6)
Section 301 and Trade Sanctions
32(1)
Special 301 and Intellectual Property Protection
33(4)
Multilateral Approaches
37(15)
Global Intellectual Property Agreements
37(4)
World Trade Organization
41(9)
Regional Trade Pacts
50(2)
International Law and the Internet
52(22)
Personal Jurisdiction: Where Can the Lawsuit Be Brought?
53(15)
What Law Applies?
68(1)
Can a Judgment Be Enforced?
69(1)
Example 1: The Yahoo! Litigation
70(3)
Example 2: The ElcomSoft Controversy
73(1)
Conclusion
74(2)
Fundamental Requirements for Patent Protection in the United States
76(47)
Introduction
76(4)
Overview of Patent Policies and Processes
80(9)
Basic Requirements
80(3)
Patent Duration
83(4)
Enforcement Issues
87(2)
Novelty
89(18)
Was the Patent Application Filed in Time?
99(4)
Who Gets the Patent When There Are Multiple Inventors?
103(4)
Nonobviousness
107(7)
Patentable Subject Matter and Utility
114(2)
Patentable Subject Matter
114(1)
Utility
115(1)
Design Patents
116(6)
International Protection of Industrial Designs
120(2)
Conclusion
122(1)
Obtaining and Defending Patent Rights in the United States and Globally
123(50)
Introduction
123(1)
The Patent Application Process: A Brief Overview
124(16)
Who May File the Patent Application?
125(1)
Invention Assignment Agreements
126(2)
When to Apply
128(2)
Dealing with the PTO
130(6)
Loss of Patent Rights
136(4)
Disclosure: Enablement and Best Mode
140(6)
Enablement
140(6)
Infringement and Remedies
146(11)
Literal Infringement
147(1)
Doctrine of Equivalents
148(2)
Prosecution History Estoppel
150(4)
Infringement of Process Patents
154(3)
International Patent Protection Issues
157(14)
Substantive Patent Policy Issues
158(7)
Procedural Patent Policy Issues
165(6)
Conclusion
171(2)
Patent Protection for Computer Programs and Internet Business Methods
173(31)
Introduction
173(2)
Patent Protection for Computer Programs: The Long and Winding Road
175(10)
Computer Processes Are Patentable Subject Matter
175(2)
Old Standards and the Importance of Physical Transformations
177(1)
The Modern Trend
178(1)
1996 PTO Examination Guidelines for Computer-Related Inventions
179(1)
The Dual Impact of the Federal Circuit's State Street Decision
180(3)
Revised PTO Examination Guidelines for Computer-Related Inventions
183(1)
Recent Events Involving Computer Program Patents
184(1)
Other Issues Regarding Patents for Computer Programs
185(9)
Receiving a Patent from the PTO
185(2)
Disclosure
187(1)
The Possibility of Copyright Protection
188(1)
International Patent Protection of Computer Programs
189(2)
The Controversy Continues: Should Patent Protection Be Extended to Computer Programs?
191(3)
Patent Protection for Internet Business Methods
194(9)
The Controversy over Amazon's One-Click Business Method Patent
196(5)
The PTO's Business Method Patent Initiative
201(1)
Legislative Measures and New Proposals
202(1)
Conclusion
203(1)
Protection of Secret Information
204(50)
Introduction
204(4)
Rationales for Trade Secret Laws
208(2)
Important Aspects of Trade Secret Laws
210(24)
Definition of Trade Secret
211(2)
Misappropriation
213(8)
Proving Misappropriation
221(1)
Remedies for Trade Secret Misappropriation
221(13)
Trade Secret Protection Measures
234(7)
Federal Economic Espionage Act
241(3)
International Trade Secret Protection
244(2)
Concluding Remarks about Trade Secret Protection
246(1)
Presenting Unsolicited Ideas to Third Parties
247(5)
How Companies Handle Unsolicited Ideas
250(1)
Advice for Offering Unsolicited Ideas
251(1)
Conclusion
252(2)
Fundamental Aspects of Copyright Protection
254(54)
Introduction
254(4)
What May Be Protected by Copyright
258(6)
Protection of Original Expressions
258(3)
Protection of Databases
261(3)
Copyright Protection of Product Designs
264(5)
Rights Provided by Copyright
269(9)
The Basic Exclusive Rights
269(5)
The Digital Transmission Right for Sound Recordings
274(4)
Fair Use and Other Exceptions to Copyright Protection
278(7)
Copyright Ownership
285(7)
Works Made for Hire
286(4)
Joint Works
290(1)
Moral Rights
291(1)
How to Obtain Copyright Protection
292(7)
Registration and Deposit
292(5)
Copyright Notice
297(1)
Duration of Copyright Protection
298(1)
Infringement and Remedies
299(8)
The Substantial Similarity Standard
299(5)
Remedies
304(3)
Conclusion
307(1)
Copyright Protection for Computer Programs and Digital Media
308(47)
Introduction
308(1)
The Importance of Distinguishing Ideas from Expressions in Computer Programs
309(8)
Levels of Abstractions in Copyrighted Works
309(4)
The Availability of Alternative Expressions
313(2)
Levels of Abstraction for Computer Programs
315(2)
The Original Approach in Computer Copyright Cases
317(9)
Protection for Computer Programs
317(5)
Protection for User Interfaces
322(4)
The Modern Approach in Computer Copyright Cases
326(10)
Protection for Computer Programs
326(4)
Protection for User Interfaces
330(4)
International Copyright Protection of Computer Programs
334(2)
Reverse Engineering of Computer Programs and Clean-Room Techniques
336(7)
Digital Audio Sampling and Digital Imaging
343(11)
Digital Audio Sampling and Remixing
343(3)
The Application of Fair Use to Sampling and Remixing
346(5)
Digital Imaging
351(3)
Conclusion
354(1)
Copyright and the Internet
355(64)
Introduction
355(2)
Legal Responsibility for the Wrongful Conduct of Others
357(4)
A Framework for Analyzing Legal Responsibility
360(1)
The Controversies over Video Recording Devices
361(4)
Application of Sony's Principles to Digital Video Recorders
363(2)
The Controversies over Audio Recording Devices
365(4)
The Audio Home Recording Act
366(1)
The Controversy over MP3 and Portable Digital Music Players
367(2)
Online Service Provider Liability
369(8)
Contributory and Vicarious Liability
370(4)
DMCA Protects OSPs from Copyright Infringement
374(3)
Responsibility for Copyright Infringements on Peer-to-Peer File-Sharing Networks
377(24)
The Napster Dispute
378(6)
The Recording and Motion Picture Industries Contend with Post-Napster Services in the Courts
384(5)
The Entertainment Industries Adopt Other Strategies to Combat File Sharing
389(7)
The Supreme Court Addresses the Legality of P2P Services
396(5)
The DMCA and Copyright Protection Technologies
401(12)
DMCA's Anti-Circumvention and Anti-trafficking Provisions
402(8)
Other Recent DMCA Controversies
410(2)
Proposed Statutory Amendments to the DMCA
412(1)
Linking, Framing, and Other Internet Copyright Issues
413(5)
Linking
413(1)
Deep-Linking
414(2)
Inline Imaging and Framing
416(1)
Application to CoolEdge
417(1)
Other Internet Issues
418(1)
Conclusion
418(1)
Protecting Trademarks and Product Designs in International Markets
419(56)
Introduction
419(1)
Fundamental Principles of Trademark Protection
420(13)
Trademarks and Competitive Ethics
420(4)
Trademarks and Market Efficiency
424(1)
Generic Marks
425(3)
Descriptive Marks
428(1)
The Spectrum of Trademark Protection
429(4)
Trademark Protection of Product Characteristics
433(12)
Distinctiveness of Product Characteristics
436(3)
Functionality
439(4)
Trademark Protection and Computers
443(2)
Federal Registration: Standards and Procedures
445(6)
Likelihood of Confusion
446(1)
Use Requirements
446(2)
Reasons to Conduct a Trademark Search
448(1)
Basic Registration Procedures
448(1)
Intent-to-Use Applications
449(1)
Loss of Registration Rights
449(2)
Trademark Infringement and Remedies
451(12)
Likelihood of Confusion
451(4)
Dilution
455(5)
Remedies for Infringement
460(3)
International Aspects of Trademark Protection
463(11)
International Trademark Registration
463(6)
The Gray Market
469(5)
Conclusion
474(1)
Domain Names and Other Trademark Issues on the Internet
475(39)
Introduction
475(1)
The Initial Problems with the Internet Domain Name System
476(6)
NSI's Revised Domain Name Registration Policy
480(1)
International Domain Name Complexities
481(1)
Policy Responses to Domain Name Problems
482(16)
Anticybersquatting Consumer Protection Act
482(4)
Preliminary Suggestions for Improvements to the Domain Name Registration Process
486(1)
The Creation of ICANN
487(2)
New Generic Top-Level Domain Names
489(3)
The Uniform Dispute Resolution Policy
492(6)
Other Internet-Related Trademark Issues
498(15)
``Suck'' Sites and Critical Commentary
498(5)
Metatags
503(3)
Linking and Framing
506(1)
Keying and Sponsored Advertising
507(6)
Conclusion
513(1)
Tort Liability for Physical and Economic Harms
514(47)
Introduction
514(1)
Negligence
515(9)
Negligence and the Restatement of Torts
516(1)
Causation Issues in Negligence
516(2)
Proximate Cause: Responsibility for Negligence
518(1)
Defenses to Liability for Negligence
519(1)
What Is Negligent Conduct?
520(2)
Negligence and Computer Programmers
522(2)
Strict Products Liability
524(21)
Policy Reasons for Strict Products Liability
524(2)
Forms of Product Defects
526(6)
The New Restatement of Torts on Products Liability
532(3)
Consumer Product Safety Commission Regulations
535(2)
Tort Reform Measures
537(1)
Examples of Strict Liability Policies in Other Countries
538(2)
Strict Products Liability and the Computer Industry
540(5)
Intentional Torts Involving Computer Systems
545(15)
Trespass by Electronic Robots
545(4)
Spam
549(8)
Computer Viruses, Trojan Horses, and Worms
557(2)
Electronic Coercion and Self-Help
559(1)
Conclusion
560(1)
Intrusions on Privacy and Other Personal Rights
561(60)
Introduction
561(1)
A Preliminary Look at Privacy
562(8)
Sources of Laws Regulating Privacy
562(2)
The Privacy Balance
564(6)
Monitoring Communications and Personal Activities in the Workplace
570(12)
Monitoring for Efficiency
570(1)
Monitoring Internet Activity
571(2)
Monitoring E-Mail Communications
573(7)
Recommendations Regarding Electronic Monitoring Activities
580(2)
Collection of Personally Identifiable Information
582(19)
Data Collection on the Internet
585(16)
Content Control and the Regulation of Indecent Speech
601(11)
The Communications Decency Act of 1996
602(3)
Private Control through Labels and Software Filters
605(1)
Child Online Protection Act of 1998
606(3)
Public Libraries and Filtering Software
609(3)
Defamation
612(6)
Intrusions on Publicity Rights
618(2)
Conclusion
620(1)
Important Contract Issues for Technology Companies
621(44)
Introduction
621(1)
Warranties, Limitations, and Remedies
622(12)
Express Warranties
623(3)
Implied Warranties
626(2)
Remedies for Breach of Warranties and Limitations of Remedies
628(6)
Shrink-Wrap and Click-Wrap Licenses
634(12)
General Principles Regarding Standardized Forms
634(1)
Standardized Forms in the Consumer Context
635(2)
The Trend in the Courts
637(5)
Click-Wrap Licenses
642(4)
The Uniform Computer Information Transactions Act
646(9)
Electronic Commerce Issues
649(1)
Electronic Agents
650(1)
Mass-Market Licenses
651(2)
Warranties
653(1)
Other Issues
654(1)
Strategic Alliances and the Importance of Alternate Dispute Resolution
655(9)
Strategic Alliances
655(3)
Alternative Dispute Resolution
658(6)
Conclusion
664(1)
Antitrust and Anticompetitive Conduct
Biotechnology: Patent Issues and Other Policy Matters
Table of Cases 665(2)
Index 667

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program