Scott on Computer Law, 1. sējums

Pirmais vāks
Pearson Education, 1991

No grāmatas satura

Lietotāju komentāri - Rakstīt atsauksmi

Ierastajās vietās neesam atraduši nevienu atsauksmi.

Saturs

Chapter 17Constitutional
46
Chapter 1Computer
3 Relevance of the Development
1-3
INTRODUCTION
1-7
CHAPTER 13
1-13
Chapter 2Introduction to Software Protection
21
LITIGATION 543
2-3
MAINTENANCE AGREEMENTS 132
2-13
C Actual Damages and Profits 3345
3-345
D Statutory Damages 3349
3-349
E Attorneys Fees and Costs 3354
3-354
F Import Exclusion or Seizure 3356
3-356
G Prejudgment Interest 3357
3-357
54 Defenses 3359
3-359
A Noninfringement 3360
3-360
B Statute of Limitations 3361
3-361

Chapter 3Copyright Protection
2-17
INTRODUCTION 183
2-18
HISTORICAL BACKGROUND
3-7
SERVICE AGREEMENTS 143
3-14
ONLINE PRIVACY CERTIFICATION 15A38
3-38
REQUIREMENTS FOR COPYRIGHT 340
3-40
3 Copyright Office Database
3-70
AUTHORSHIP 385
3-85
RACKETEER INFLUENCED AND CORRUPT
3-96
EXCLUDED SUBJECT MATTER 3101
3-101
UNFAIR COMPETITION
3-103
ELECTRONIC SIGNATURE LEGISLATION 7129
3-129
OWNERS RIGHTS 3135
3-135
STANDARD CONTRACT PROVISIONS 7136
3-136
TRANSFERS OF COPYRIGHT OWNERSHIP 3162
3-162
STATUTORY FORMALITIES 3170
3-170
DURATION OF PROTECTION 3229
3-229
LITIGATION 3244 1
3-244
Process 3286
3-286
4 Environmental Constraints 3287
3-287
5 External Constraints 3289
3-289
6 Compatibility 3293
3-293
Decompilation 3298
3-298
8 Copy Programs 3302
3-302
10 Electronic Databases 3304
3-304
11 Computer Languages 3309
3-309
13 Online Services 3310
3-310
14 Caching of Data 3313
3-313
15 Hyperlinks 3314
3-314
16 Framing 3317
3-317
17 Importation 3319
3-319
19 Data Aggregation 3320
3-320
D Contributory Infringement 3321
3-321
E Vicarious Liability 3325
3-325
F Government LiabilityImmunity 3327
3-327
G DMCA 3329
3-329
1 AntiCircumvention 3331
3-331
2 Copyright Management Information 3335
3-335
52 Remedies 3336 2
3-336
A Injunctive Relief 3336 3
3-336
B Impoundment and Destruction of Infringing Articles 3342
3-342
INTERNATIONAL PROTECTION 3390 2
2
Chapter 4Patent Protection
4
INTRODUCTION
4-8
INTRODUCTION
4-9
COMPUTERS AND TORT LAW 155
4-15
PATENT PROSECUTION 450 1
4-50
LITIGATION 467
4-67
UCITA 775
4-75
4 Article 35 Conformity of
4
Chapter 4A Trademark and Domain Name
1
DEVELOPMENT AGREEMENTS 103
10
INTRODUCTION 163
16
FEDERAL TRADEMARK REGISTRATION
19
4A41
41
4A47
47
TRADEMARKS AND DOMAIN NAMES 4A52 1
53
Chapter 5Semiconductor Chip Protection
5-1
PROTECTION UNDER INTERNATIONAL
5-3
HISTORICAL BACKGROUND 510 1
1
2 Sample Customers Warranty
2
CONTRACTING BASICS 710
7
FRAUD 1539
5-15
STATUTORY FORMALITIES 530
5-30
TREATIES 570
5-70
B Opponents View of the Act 781
5-81
PROTECTION UNDER NATIONAL LAWS 587
5-87
REQUIREMENTS FOR PROTECTION 618
5-91
MAGNUSONMOSS WARRANTY ACT 7103
5-103
Chapter 6Trade Secret
6-1
CHAPTER 11
6-11
CHAPTER 12
6-12
Software into Other
6-12
SEARCH AND SEIZURE 1712
6-17
DURATION OF PROTECTION 633
6-33
LITIGATION 641
6-41
ADMISSIBILITY AT TRIAL 1816
6-56
Relief Under 337 874
6-74
CONTRACTUAL PROTECTION 677
6-77
Chapter 7Contract
2
15A 03 Intrusion 15A6
6
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Atsauces uz šo grāmatu

Scott on Multimedia Law
Michael Dennis Scott
Priekšskatījums nav pieejams - 1997

Bibliogrāfiskā informācija