首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
Copyright protection for computer software often presents a contradiction between law and the desired public policy that is the law's inspiration. The law provides incentives to individuals to create intellectual property by protecting authors through monopolistic controls on copying and distributing the authors' work. Conferring too much protection, however, may reduce incentives to create competitive products in the same market, defeating the law's constitutional purpose of encouraging the “Progress of Science and the useful Arts.” Two characteristics of computer software, technical standards and interoperability, compound this contradiction. Using economic literature on standards and the recent line of Lotus v. Borland cases, this article examines the role of standardization and interoperability in copyright protection of computer software, and suggests a part for the fair‐use defense in such cases.  相似文献   

4.
5.
6.
7.
Who should be considered the author of a work protected by copyright?In recent years, there has been an expanding critical literatureexamining notions of authorship and the role of the author inthe creative process, often leading to suggestions for waysin which the copyright framework might be recalibrated to recognizecollective effort. This book by Lior Zemer is an excellent additionto those works. Eloquently written and skilfully referenced in the eight chaptersthat make up Zemer's book, its key aim is to persuade the readerthat the individual and the public should be seen as joint authorsof creative works. In making his arguments, he takes us froma Conceptual Challenge (Chapter 2) to a  相似文献   

8.
浅析软件授权合同与著作权保护之关系   总被引:1,自引:0,他引:1  
一、引言 随着第三次科技革命的深入,人类的生存方式产生 了巨大的变化。数字技术和网络相结合使作品的 传播具有了不同以往的特征,使作品可以被无限 次数地重复制作与传播,而且复制品传输的速度非常快。  相似文献   

9.
10.
11.
12.
Part I of this article in [2012] 28 CLSR 3-13 analysed the views of learned commentators on what constitutes the ‘independence’ of data protection authorities (DPAs). It concluded that a more satisfactory answer needed to be found in the international instruments on data privacy and on human rights bodies, their implementation and judicial interpretation, and in the standards that have been proposed and implemented by DPAs themselves. It found that only the OECD and APEC privacy agreements did not require a DPA (and therefore had no standards for its independence). Thirteen factors were identified as elements of ‘independence’ across these instruments and standards, five of which were more commonly found than others.  相似文献   

13.
计算机软件专利保护法律问题研究   总被引:1,自引:1,他引:0  
一、问题的提出 从有关司法判例和趋势来看,美国联邦最高法院于1999年1月维持了联邦巡回上诉法院联邦巡回庭(C.A.F.C.--U.S.Court of Appeals for the Federal Circuit)关于州街信托银行诉签记金融集团案件(State Street Bank&Trust Co.v.Signature Financial Group,Inc.)对轴辅金融服务咨询配置处理系统(DataProcessing System for Hub and Spoke Financial Service Configuration)判决受专利保护.  相似文献   

14.
15.
16.
刘强  胡峰 《行政与法》2007,(3):107-109
体育产业化要求利用知识产权保护体育运动参与者的经济利益。体育动作的不断革新要求对引入专利保护进行研究。通过分析专利制度法律规定和体育动作的特性发现,体育动作具有受到专利保护的可能性。但是,通过专利保护体育动作仍然需要克服许多困难,只有体育产业和法律制度能够良好的协调和互动,才能通过体育动作的专利保护促进体育运动的进步和体育产业的健康发展。  相似文献   

17.
18.
(三)股权配置和股红分配股权配置和股红分配(即红利分配)是农村股份合作制中与股民利益关系最大的一个环节。一旦处理不当,很容易引起村民们的不满,继而引发一系列社会问题。  相似文献   

19.
Going into the century's second decade, Open Source Software (OSS) is ubiquitous. But there remains a disconnect between OSS use and its effective management. In order to ensure that OSS is used in a way which complies with relevant licence requirements and reduces risk (for example, of adverse action from the OSS community and IP leakage through unintended application of the ‘copyleft’ terms of the GPL2); organisations should consider putting in place an effective OSS governance mechanism. OSS governance should take account of the people context, seeking to get buy-in from all stakeholder groups inside and outside the organisation. The high-level OSS strategy should then be agreed between the stakeholders, consistently with other statements of operational strategy. The next level down is the OSS policy statement, which should be clear, brief, event-driven, able to settle 80% of OSS decisions arising day to day and set out what information is to be collected and tracked. Finally, appropriate processes should be put in place to take the strain of OSS governance. Organisations should consider appointing an Open Source Compliance Officer and acquiring a software based indicator tool enabling a number of key governance processes (code review, setting agreed ‘do's and dont's’) to be automated.  相似文献   

20.
Legal context. Dilution by blurring has often been accused ofbeing a vague concept which is difficult to understand and whichhas no sensible limits. Mindful of the need for certainty inthis area, the US Senate and House of Representatives have passedthe Trademark Dilution Revision Act 2006. This Bill (which isdiscussed more generally in Part I) includes a definition ofblurring and a six-point test for blurring. Meanwhile, the EuropeanUnion has been steadily building up jurisprudence in this area. Key points. This part of the article focuses on dilution byblurring, considering how blurring is defined, how it is testedfor and whether US and EU blurring protection is in compliancewith the jurisdictions’ international obligations in thisarea (discussed in Part I). In particular, it considers thenew definition of, and test for, blurring under the US TrademarkDilution Revision Act 2006, and compares the position underthat Bill to the situation in the EU. Practical significance. Assuming that it enters into law, theRevision Act 2006 has serious implications for the proprietorsof famous marks doing business in the US. This article willinform the owners of such marks what protection they will benefitfrom and how this will differ from the protection they willget in the EU.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号