Scott on Information Technology Law, 1. sējums

Pirmais vāks
Wolters Kluwer, 2007. gada 1. janv. - 1760 lappuses
For answers to questions relating to computers, the Internet and other digital technologies - and how to make them work for your clients - turn to this comprehensive, practical resource. Whether you're an experienced IT lawyer, a transactional or intellectual property attorney, an industry executive, or a general practitioner whose clients are coming to you with new issues, you'll find practical, expert guidance on identifying and protecting intellectual property rights, drafting effective contracts, understanding applicable regulations, and avoiding civil and criminal liability. Written by Michael D. Scott, who practiced technology and business law for 29 years in Los Angeles and Silicon Valley, Scott on Information Technology Law, Third Edition offers a real-world perspective on how to structure transactions involving computer products and services such as software development, marketing, and licensing. He also covers the many substantive areas that affect technology law practice, including torts, constitutional issues, and the full range of intellectual property protections. You'll find coverage of the latest issues like these: computer and cybercrime, including spyware, phishing, denial of service attacks, and more traditional computer crimes the latest judicial thinking on software and business method patents open source licensing outsourcing of IT services and the legal and practical issues involved in making it work and more To help you quickly identify issues, the book also includes practice pointers and clause-by-clause analysis of the most common and often troublesome provisions of IT contracts.

No grāmatas satura

Lietotāju komentāri - Rakstīt atsauksmi

Ierastajās vietās neesam atraduši nevienu atsauksmi.

Saturs

C Wireless Technologies
1-60
E Automated Vehicles
1-67
a The Definition of an Aircraft
1-72
i sUAS Registration Requirements
1-79
g State Regulation
1-99
4 Frequency Allocation
1-110
c UAS Cyber Attacks
1-116
A person to reproduce the mask work solely for the purpose
2-1
317H Rep 98781 at 23
5-54
INTERNATIONAL PROTECTION
5-56
Preface to the Third Edition Acknowledgments Chapter 1 Introduction and Overview Chapter 2 Copyright Protection Chapter 3 Patent Protection Ch...
6-1
VOLUME 2
6-2
LITIGATION
6-37
at the beginning of the chapter
v
System Procurement Chapter 10 Software and Website Development Agreements Chapter 11 Software Marketing and Distribution Agreements
viii
License Agreements Chapter 13 Maintenance Agreements Chapter 14 Service Agreements Chapter 15 Tort
ix

PATENT PROSECUTION
2-3
STATUTORY FORMALITIES
2-4
DURATION OF PROTECTION
2-5
DURATION OF PROTECTION
2-213
law287 the maximum amount the plaintiff can be awarded is 250000
2-289
ment The Act defines an innocent purchaser as a person
2-306
components used in 2 A person who has performed the analysis or evaluation above to it319
2-320
VOLUME 1
3-1
AUTHORSHIP
3-2
LITIGATION
3-3
Contents
3-71
DESIGN PATENTS
3-126
FEDERAL TRADEMARK REGISTRATION
4-2
PROTECTION OF FOREIGN WORKS UNDER U S
4-5
CHAPTER 1
5-1
Chapter 6
5-6
TRADE SECRET
5-24
allow the recovery of full costs including reasonable attorneys fees
5-48
Privacy
xi
Preface to the Third Edition
7-1
LITIGATION
7-9
288H Rep 98781 at 27
7-27
Is liable for only a reasonable royalty for each infringing product
8-3
a Advantages
9-4
Chapter 4
10-4
purchasers one who knows that protection is claimed for a particular mask work but does
11-14
the chip or mask work embodied therein See 17 U S C 907a1
12-1
TRADEMARKS AND DOMAIN NAMES
12-3
09A Music Modernization
14-2
B Cloud Computing
14-22
exploited on or after July 1 1983 but before November 8 1984 17 U S C 913d2
14-25
INTRODUCTION
14-39
Chapter 5
15-5
CONTRACTUAL PROTECTION
15-6
Chapter 3
17-3
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija