Security in Computing, 4th Edition
11.8. Terms and Concepts
legal protection for computers and data, 649 copyright, 649 intellectual property, 650 originality, 651 fair use, 651 copyright registration, 652 copyright infringement, 652 Digital Millenium Copyright Act, 653 patent, 655 novelty, 656 patent registration, 656 patent infringement, 657 trade secret, 658 reverse engineering, 658 trade secret enforcement, 659 information, 663 information depletion, 663 information replication, 664 information marginal cost, 664 information timeliness, 664 information tangibility, 665 information commerce, 665 electronic publishing, 666 database, 666 electronic commerce, 666 crimnal law, 667 civil law, 667 tort law, 667 contract law, 668 employer and employee rights, 670 product ownership, 670 patent ownership, 670 copyright ownership, 671 work for hire, 671 license, 671 employment contract, 672 property, 673 redress for faulty software, 673 U.S. Uniform Commercial Code, 674 warranty of cyberworthiness, 675 vulnerability reporting, 675 rules of evidence, 680 U.S. Computer Fraud and Abuse Act, 683 U.S. Economic Espionage Act, 683 U.S. Electronic Funds Transfer Act, 683 U.S. Freedom of Information Act, 684 U.S. Privacy Act, 684 U.S. Electronic Communications Privacy Act, 684 Gramm-Leach-Bliley Act, 684 HIPAA, 684 USA Patriot Act, 685 CAN SPAM Act, 685 California breach notification, 686 Council of Europe Agreement on Cybercrime, 687 cryptographylegality of use, 689 export of cryptography, 690 escrowed encryption, 691 ethics, 692 religion, 694 ethical pluralism, 695 ethical reasoning, 695 teleology, 696 egoism, 696 utilitarianism, 697 deontology, 697 rule-deontology, 697 code of ethics, 710 |
Категории