Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Legal Protection of Databases: A Comparative Analysis

Buy
This book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers deserve protection to recoup their investment, excessive protection can create easily abused monopolies and restrict the public domain. The book is concerned with finding adequate legal protection
for investment in collecting, verifying or presenting database contents. The laws of the European Union and the United States, which differ in their protection of databases, are compared. Four types of laws which can protect database contents are chosen: intellectual property, unfair competition, contract and technological protection measures (‘TPMs’) along with TPMs’ anti-circumvention provisions. The book examines whether in isolation and in combination these laws over-protect, under-protect or adequately protect databases’ contents. To do so, it uses a criterion based on the economics of information goods, the human rights to intellectual property and to information and the public interest.

In Europe, a specific intellectual property right was enacted to protect database contents (the sui generis right). In isolation, most aspects of the sui generis right over-protect databases. The possibility in certain Member States to prevent the copying of databases by the tort of parasitism in addition or instead of the sui generis right is over-protective as well. This also proves that harmonization is not fully achieved. Additional contractual protection of databases by way of circumventing the limits of the sui generis right also over-protects certain databases. The same goes for most TPMs and anti-circumvention provisions. Therefore in Europe, databases are over-protected in many respects. In the United States, no specific intellectual property right to protect database contents exists. While misappropriation’s shield is far too weak, contracts, TPMs and anti-circumvention provisions are either over- or under-protective.

Remedies to over- and under-protection are proposed along with an adequate model for the protection of investment in database creation based on an intellectual property approach and which can be adopted internationally. The model is then applied to old case law to show the different outcomes arrived at under the new form of protection.
(HTML tags aren't allowed.)

Introduction to Pattern Recognition: A Matlab Approach
Introduction to Pattern Recognition: A Matlab Approach

The aim of this book is to serve pedagogic goals as a complement of the book Pattern Recognition, 4th Edition, by S. Theodoridis and K. Koutroumbas (Academic Press, 2009). It is the offspring of our experience in teaching pattern recognition for a number of years to different audiences such as students with good enough mathematical...

Introduction to Information Systems: Supporting and Transforming Business
Introduction to Information Systems: Supporting and Transforming Business

Rainer, Cegielski Introduction to Information Systems will answer this question for you. In every chapter, you will see how real global businesses use technology and information systems to increase their profitability, gain market share, improve their customer service, and manage their daily operations. In other words, information...

Programming in Objective-C (6th Edition) (Developer's Library)
Programming in Objective-C (6th Edition) (Developer's Library)

Updated for OS X 10.9 Mavericks, iOS 7, and Xcode 5

Programming in Objective-C is a concise, carefully written tutorial on the basics of Objective-C and object-oriented programming for Apple's iOS and OS X platforms.

The book makes no assumptions about prior experience with object-oriented
...


The Dream Team Nightmare: Boost Team Productivity Using Agile Techniques
The Dream Team Nightmare: Boost Team Productivity Using Agile Techniques

This first-ever interactive Agile Adventure is the gripping tale of an experienced team struggling with agile adoption. In this unique mashup of a business novel written in the gamebook format, you'll overcome common yet daunting challenges that come from using agile methods. As Jim, the agile coach, you'll learn to apply a range of...

Satellite Communications, Fourth Edition (Professional Engineering)
Satellite Communications, Fourth Edition (Professional Engineering)
The Most Complete and Accessible Guide to the Fundamentals and New Developments in Satellite Communications Technology

The leading reference and text in the field for over a decade, Satellite Communications, has been revised, updated, and expanded to cover breakthroughs in global wireless applications, digital...

Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain
Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain

Learn the most powerful primary programming language for writing smart contracts and discover how to write, deploy, and test smart contracts in Ethereum

Key Features

  • Get up and running with the Solidity programming language
  • Use Solidity as a scripting language to build...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy