Skip to content

Legal Aspects of Managing Technology

Best in textbook rentals since 2012!

ISBN-10: 0324399731

ISBN-13: 9780324399738

Edition: 4th 2007 (Revised)

Authors: Lee B. Burgunder

List price: $277.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Whether you plan a career in management, engineering, architecture, biology, computer science, or other field that deals with innovations in any technological field, LEGAL ASPECTS OF MANAGING TECHNOLOGY will give you the understanding of the fundamental legal issues pertinent to technology management you need to competently create strategic plans in consultation with their attorneys. Up-to-date coverage focuses on integral technology law topics, including a intellectual property rights, privacy, biotechnology, e-commerce and antitrust.
Customers also bought

Book details

List price: $277.95
Edition: 4th
Copyright year: 2007
Publisher: Cengage South-Western
Publication date: 7/10/2006
Binding: Paperback
Pages: 704
Size: 7.50" wide x 9.25" long x 1.00" tall
Weight: 2.332
Language: English

Lee B. Burgunder is professor of law and public policy at California Polytechnic State University, where he has been teaching for 25 years. Professor Burgunder is recognized as a "Distinguished Teacher" at Cal Poly, and is a pioneer in developing technology law courses for undergraduate and graduate programs. He has published numerous articles on intellectual property and technology law issues, and served as co-chair of the technology law section within the Academy of Legal Studies in Business. Professor Burgunder received his law degree and M.B.A. from Stanford University, and practiced law at Patton, Boggs in Washington, D.C., prior to entering academia.

An Overview of the Technology Policy Environment in the United States
Introduction
The Intellectual Property System
Patents
Copyrights
Trade Secrets
Trademarks
The Public Policy Process in the United States
The Power Struggle: Federal versus State
How Intellectual Property Policies Are Made in the United States
The Expanding Scope of Intellectual Property Protection
The Rising Importance of the First Amendment in Technology Policy Disputes
Two Running Examples
The Self-Adjusting Stair Climber
DeCSS
Conclusion
The International Technology Policy Environment
Introduction
Unilateral Measures: Actions Against Imports into the United States
Private Actions for Unauthorized Imports into the United States
Enforcement through Administrative Action
Bilateral Arrangements and the Importance of Trade Sanctions
Section 301 and Trade Sanctions
Special 301 and Intellectual Property Protection
Multilateral Approaches
Global Intellectual Property Agreements
World Trade Organization
Regional Trade Pacts
International Law and the Internet
Personal Jurisdiction: Where Can the Lawsuit Be Brought?
What Law Applies?
Can a Judgment Be Enforced?
The Yahoo! Litigation
The ElcomSoft Controversy
Conclusion
Fundamental Requirements for Patent Protection in the United States
Introduction
Overview of Patent Policies and Processes
Basic Requirements
Patent Duration
Enforcement Issues
Novelty
Was the Patent Application Filed in Time?
Who Gets the Patent When There Are Multiple Inventors?
Nonobviousness
Patentable Subject Matter and Utility
Patentable Subject Matter
Utility
Design Patents
International Protection of Industrial Designs
Conclusion
Obtaining and Defending Patent Rights in the United States and Globally
Introduction
The Patent Application Process: A Brief Overview
Who May File the Patent Application?
Invention Assignment Agreements
When to Apply
Dealing with the PTO
Loss of Patent Rights
Disclosure: Enablement and Best Mode
Enablement
Infringement and Remedies
Literal Infringement
Doctrine of Equivalents
Prosecution History Estoppel
Infringement of Process Patents
International Patent Protection Issues
Substantive Patent Policy Issues
Procedural Patent Policy Issues
Conclusion
Patent Protection for Computer Programs and Internet Business Methods
Introduction
Patent Protection for Computer Programs: The Long and Winding Road
Computer Processes Are Patentable Subject Matter
Old Standards and the Importance of Physical Transformations
The Modern Trend
1996 PTO Examination Guidelines for Computer-Related Inventions
The Dual Impact of the Federal Circuit's State Street Decision
Revised PTO Examination Guidelines for Computer-Related Inventions
Recent Events Involving Computer Program Patents
Other Issues Regarding Patents for Computer Programs
Receiving a Patent from the PTO
Disclosure
The Possibility of Copyright Protection
International Patent Protection of Computer Programs
The Controversy Continues: Should Patent Protection Be Extended to Computer Programs?
Patent Protection for Internet Business Methods
The Controversy over Amazon's One-Click Business Method Patent
The PTO's Business Method Patent Initiative
Legislative Measures and New Proposals
Conclusion
Protection of Secret Information
Introduction
Rationales for Trade Secret Laws
Important Aspects of Trade Secret Laws
Definition of Trade Secret
Misappropriation
Proving Misappropriation
Remedies for Trade Secret Misappropriation
Trade Secret Protection Measures
Federal Economic Espionage Act
International Trade Secret Protection
Concluding Remarks about Trade Secret Protection
Presenting Unsolicited Ideas to Third Parties
How Companies Handle Unsolicited Ideas
Advice for Offering Unsolicited Ideas
Conclusion
Fundamental Aspects of Copyright Protection
Introduction
What May Be Protected by Copyright
Protection of Original Expressions
Protection of Databases
Copyright Protection of Product Designs
Rights Provided by Copyright
The Basic Exclusive Rights
The Digital Transmission Right for Sound Recordings
Fair Use and Other Exceptions to Copyright Protection
Copyright Ownership
Works Made for Hire
Joint Works
Moral Rights
How to Obtain Copyright Protection
Registration and Deposit
Copyright Notice
Duration of Copyright Protection
Infringement and Remedies
The Substantial Similarity Standard
Remedies
Conclusion
Copyright Protection for Computer Programs and Digital Media
Introduction
The Importance of Distinguishing Ideas from Expressions in Computer Programs
Levels of Abstractions in Copyrighted Works
The Availability of Alternative Expressions
Levels of Abstraction for Computer Programs
The Original Approach in Computer Copyright Cases
Protection for Computer Programs
Protection for User Interfaces
The Modern Approach in Computer Copyright Cases
Protection for Computer Programs
Protection for User Interfaces
International Copyright Protection of Computer Programs
Reverse Engineering of Computer Programs and Clean-Room Techniques
Digital Audio Sampling and Digital Imaging
Digital Audio Sampling and Remixing
The Application of Fair Use to Sampling and Remixing
Digital Imaging
Conclusion
Copyright and the Internet
Introduction
Legal Responsibility for the Wrongful Conduct of Others
A Framework for Analyzing Legal Responsibility
The Controversies over Video Recording Devices
Application of Sony's Principles to Digital Video Recorders
The Controversies over Audio Recording Devices
The Audio Home Recording Act
The Controversy over MP3 and Portable Digital Music Players
Online Service Provider Liability
Contributory and Vicarious Liability
DMCA Protects OSPs from Copyright Infringement
Responsibility for Copyright Infringements on Peer-to-Peer File-Sharing Networks
The Napster Dispute
The Recording and Motion Picture Industries Contend with Post-Napster Services in the Courts
The Entertainment Industries Adopt Other Strategies to Combat File Sharing
The Supreme Court Addresses the Legality of P2P Services
The DMCA and Copyright Protection Technologies
DMCA's Anti-Circumvention and Anti-trafficking Provisions
Other Recent DMCA Controversies
Proposed Statutory Amendments to the DMCA
Linking, Framing, and Other Internet Copyright Issues
Linking
Deep-Linking
Inline Imaging and Framing
Application to CoolEdge
Other Internet Issues
Conclusion
Protecting Trademarks and Product Designs in International Markets
Introduction
Fundamental Principles of Trademark Protection
Trademarks and Competitive Ethics
Trademarks and Market Efficiency
Generic Marks
Descriptive Marks
The Spectrum of Trademark Protection
Trademark Protection of Product Characteristics
Distinctiveness of Product Characteristics
Functionality
Trademark Protection and Computers
Federal Registration: Standards and Procedures
Likelihood of Confusion
Use Requirements
Reasons to Conduct a Trademark Search
Basic Registration Procedures
Intent-to-Use Applications
Loss of Registration Rights
Trademark Infringement and Remedies
Likelihood of Confusion
Dilution
Remedies for Infringement
International Aspects of Trademark Protection
International Trademark Registration
The Gray Market
Conclusion
Domain Names and Other Trademark Issues on the Internet
Introduction
The Initial Problems with the Internet Domain Name System
NSI's Revised Domain Name Registration Policy
International Domain Name Complexities
Policy Responses to Domain Name Problems
Anticybersquatting Consumer Protection Act
Preliminary Suggestions for Improvements to the Domain Name Registration Process
The Creation of ICANN
New Generic Top-Level Domain Names
The Uniform Dispute Resolution Policy
Other Internet-Related Trademark Issues
"Suck" Sites and Critical Commentary
Metatags
Linking and Framing
Keying and Sponsored Advertising
Conclusion
Tort Liability for Physical and Economic Harms
Introduction
Negligence
Negligence and the Restatement of Torts
Causation Issues in Negligence
Proximate Cause: Responsibility for Negligence
Defenses to Liability for Negligence
What Is Negligent Conduct?
Negligence and Computer Programmers
Strict Products Liability
Policy Reasons for Strict Products Liability
Forms of Product Defects
The New Restatement of Torts on Products Liability
Consumer Product Safety Commission Regulations
Tort Reform Measures
Examples of Strict Liability Policies in Other Countries
Strict Products Liability and the Computer Industry
Intentional Torts Involving Computer Systems
Trespass by Electronic Robots
Spam
Computer Viruses, Trojan Horses, and Worms
Electronic Coercion and Self-Help
Conclusion
Intrusions on Privacy and Other Personal Rights
Introduction
A Preliminary Look at Privacy
Sources of Laws Regulating Privacy
The Privacy Balance
Monitoring Communications and Personal Activities in the Workplace
Monitoring for Efficiency
Monitoring Internet Activity
Monitoring E-Mail Communications
Recommendations Regarding Electronic Monitoring Activities
Collection of Personally Identifiable Information
Data Collection on the Internet
Content Control and the Regulation of Indecent Speech
The Communications Decency Act of 1996
Private Control through Labels and Software Filters
Child Online Protection Act of 1998
Public Libraries and Filtering Software
Defamation
Intrusions on Publicity Rights
Conclusion
Important Contract Issues for Technology Companies
Introduction
Warranties, Limitations, and Remedies
Express Warranties
Implied Warranties
Remedies for Breach of Warranties and Limitations of Remedies
Shrink-Wrap and Click-Wrap Licenses
General Principles Regarding Standardized Forms
Standardized Forms in the Consumer Context
The Trend in the Courts
Click-Wrap Licenses
The Uniform Computer Information Transactions Act
Electronic Commerce Issues
Electronic
Agents
Mass-Market Licenses
Warranties
Other Issues
Strategic Alliances and the Importance of Alternate Dispute Resolution
Strategic Alliances
Alternative Dispute Resolution
Conclusion
Antitrust and Anticompetitive Conduct
Biotechnology: Patent Issues and Other Policy Matters
Table of Cases
Index