Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper 'Bug as a Software Database' is a great example of a business essay. The different types of legal protection in which BUG should acquire are linked to the need to have safety and security among their products. Intellectual properties and information laws are the first set of applications that need to be applied…
Download full paperFile format: .doc, available for editing
1. The different types of legal protection in which BUG should acquire is linked to the need to have safety and security among their products. Intellectual properties and information laws are the first set of applications that need to be applied. The products should include copyright, registered design, design rights, patents, confidential information and trade marks. This is because BUG is a software database, in which the product is based off of the specific codes written by developers combined with the products. This is also because infringement related to intellectual creations are highly possible if the BUG products are not claimed through law. The copyright, design rights and registered design will all protect the code that is being written. The patents, confidential information and trademarks will protect the product that is being sold. These will also protect distribution rights in order to sell the product and rights that claim that public and private interactions of BUG products solely belong to them (Davison, 2003).
2. Sending Steve in through WIRETAP in order to gather information about BUGs product line is one that breaks protection rights from BUG. The first civil liability which is broken through Steve is the e-mail forwarding that he does, not only to the WIRETAP office in his area, but also abroad. This not only breaks confidentiality on a regional level, but also on an international level. The hacked information breaks the confidentiality of Steve working at BUG, and also breaks disclosure agreements of BUG. Beyond this, sending the information overseas, moves into a break of confidentiality on an international level, and pertains to bilateral agreements with states in other countries, which relates to privacy laws and disclosure agreements moving from businesses and into others outside of the business (Lichtbau, 2002).
The second civil liability which Steve broke was forwarding all of the information at the end of the week to WIRETAP. This moved beyond the confidentiality agreements that were broken and moves into the competition law, which states that business entities can not abuse or practice business unfairly with competition in their own business. More specifically, Steve broke the economic tort law, which states that competition can not be unfair in building their own products against others. The actions that Steve took, in relation to this, broke the trademark of BUG because of his forwarding the information to directly steal from BUG to WIRETAP. It also included the economic tort of misappropriation, meaning that Steve used information that was not authorized for him to use and was supposed to be protected in the BUG organization (Elhauge and Geradin, 2007).
3. The response to Steve, through interrogation and threats, is one that is linked to committing torts. Because the leader at BUG kept Steve in the office for six hours and questioned him until he gave the information, Steve, even though he works for WIRETAP, still has the ability to say that he was psychologically and emotionally tormented, in which BUG should be liable for. Threatening to inflict Steve, as well as the way in which the BUG employer reacted, is one in which Steve could say caused him to be in a place of jeopardy with the WIRETAP organization in which he worked for.
Tort law is different from other laws because it is based around civil wrongs. While most other laws will need to be stated as to someone breaking a specific law that is written for that state, tort laws are based around an individual who is liable for being responsible for another through respect and responses to situations that arise. Typically, a tort law will be based around justifying someone's actions according to whether there intentions acted in response to someone out of negligence or through an action in which the individual should be liable for, whether it be physical, economic or as a nuisance (Deaken et al, 2003).
4. The ability to sell the BUG products on the Internet is one that may arise with international conflict of law. Because BUG is located in one area, moving into an international agreement takes different laws and provisions in relation to security, privacy and infringement. Regulating the transnational effects and continuing to protect their intellectual property of the BUG products is one that now has to provide similar transactions across territories while remaining protected with their products. This is one that specifically relates to the ownership from the BUG domain name already being owned, as this shows how the products and information that BUG is releasing now must be monitored internationally so that others do not breach the ownership or infringe any of the rights (Murphy, 2006).
5. Under tort law, BUG has some liabilities towards the vendors and employees who were attacked in the parking lot. Their responsibility is to keep the parking lot well lit and to be accountable for the employees who are on the property, because it is also BUG's property. BUG can be held liable under the tort area of negligence, meaning that they were not being responsible or paying attention to the property areas in which they had. They can also be held under the statutory tort, meaning they are responsible for the health and well being of all who are on their property. This could have been done through security measures and by replacing the lights in the parking lot.
At the same time, BUG will be able to defend themselves by showing that their intention in the work area was not to cause damage or harm to the employees or vendors. It was not the intent of BUG to have these things happen, and it occurred because of trespassing on their property, meaning that others were breaking tort laws and should be held responsible for the negligence. Part of this defense is not only linked to the individuals who were robbing others on the territory, but also because the robberies were not taking place at night, as one of the vendors were attacked during lunch, showing that the misplaced lights were not the problem. Proving that the problems are arising not because of BUGs intentions, but because of the trespassing and other individuals' negligent behavior will allow BUG to have a defense against the situation (Deakin et al, 2003).
6. The first tort that Sally can pursue against BUG is negligence. Because BUG did not install the insulator in the model of the monitor that Sally was using, they are negligent on two accounts. The first is the inability to be responsible for the monitor that was purchased by BUG, which should have been taken off of the product market when the problem was found. The second was the shock that Sally received, causing injury to herself. The second tort in which Sally can use is the Statutory torts. This states that the business who makes the product is responsible for damage and harm that may happen from the defective products. Because BUG knew the monitor needed an insulator and refused to do so because of finances, Sally can show that the business was not performing the correct statutory, in the need to save money with the production of the monitors. In relation to this, Sally has the right to request damages to bodily injury because of the shock, as well as damages done to the monitor and her capacity to work (Deaken et al, 2003).
Bibliography
1. Davison, Mark. (2003). “The Legal Protection of Databases.” Cambridge University Press: Cambridge.
2. Deaken, Simon, Angus Johnston, Basil Markenis. (2003). “Tort Law.” Oxford University Press: London.
3. Elhauge, Einer, Damien Geradin. (2007). “Global Competition Law and Economics.” Hart Publishing: New York.
4. Lichtbau, Anita. (2002). Can I Disclose This Information? Complying With Confidentiality and Disclosure Requirements. CAPLAW Legal Services.
5. Murphy, Sean. (2006). “Principles of International Law.” Thomson West: New York.
Read
More
database Applications 1) What do we mean by groupware anyway?... database Applications What do we mean by groupware anyway?... What are the special needs for database design in supporting groupware?... All information or data shared or posted by users of a groupware are saved at a centralized database.... The information can be accessed by users located in this database, which is synchronized by the groupware, as per the variables commanded....
From the paper "IT Company Upgrade - Christa Group " it is clear that the need for system upgrades in the present business environment has become something that is rather inevitable.... This is if the firm in question has the intention of having an upper hand in the way it runs its business.... ....
The paper "Software Implementing database Security" describes that SOA systems now consider data provenance and integrity of routed data in the system.... For security breaches within data transfer, different encryption techniques are employed for safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities.... The vulnerability to database security includes unauthorized access by hackers or outside attacks or misuse by authorized personnel which are database users, administrators, or system managers....
In today's business world which uses IT for its optimal and non-stop functioning, a database is something which any organization will not run without.... Speedy business needs has made database an absolute requirement.... One of these way has been to offer customer an open source software so that if the customers preferences changes they can make necessary amendments In today's business world which uses IT for its optimal and non-stop functioning, a database is something which any organization will not run without....
uring the process of migrating old data to the new IBM database DB2, erroneous data that were found in the old databases were removed and only complete and useful data was moved.... The ‘big bang' also known as the direct cutover approach (OBrien) to system implementation is a system changeover method where the new system is adopted and the old system is stopped/dropped at once....
Examples of computer softwares that business organizations will need to use are, database management softwares, point of sale softwares, content management softwares, etc.... However, it is important to denote that a computer will never function, without installing software in it.... However, it is important to denote that a computer will never function, without installing software in it.... This would therefore mean that each and every user will install different computer software in their personal computers....
The purpose of the paper 'database Development and Management' is to analyze an effective database design that incorporates all the stores product sales and inventories.... The potential sales information stored within the database entail the price of the product, customer and store number in the store.... The author states that the use of the information of potential sales information and store transactions assists in the improvement of an operative database scheme that connects all the stores together with the products in them for sale....
This theory is described as the theory of Semantics and Programming Languages, database Mappings.... This paper "The Big-Data Revolution in US Health Care" analyzes that in the past few years there has been noted technological advances in the community.... The health care chat has had dynamism of challenges ranging from new disease trends to faster response at the hospital level....
7 Pages(1750 words)Research Paper
sponsored ads
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Bug as a Software Database"
with a personal 20% discount.