Ⅰ. 개요
온라인상에서 서비스이용자가 서비스제공자의 서버나 설비, 네트워크를 이용하여 저작권 침해행위를 한 경우, 이러한 행위를 매개한 서비스제공자의 책임과 관련한 법안을 마련한 독일과 미국, EU 지침(안)은 공통적으로 서비스이용자의 행위를 매개하는 과정에서 발생하는 송신행위, 일시적
Trade Secret
provided it is not based on information
in the public domain
limitation
is statutory grant the protects creators
of intellectual property from having their work copied by others of any purpose.
Purpose
Drawback
Patent Grants
1. The congressional intent & patent law
(machines, devices, methods)
2. Where is patent granting determined ?
3. What
3.2) Promotion & Feedback
Nintendo could use its social game to promote its hardware and software. It is more effective to play a game in person rather than just listening or watching advertisement. For example, as one way of promoting new product, Nintendo can provide a demo version that people can play Nintendo’s new product briefly. In that sense, if Nintendo starts releasing the social g
Data Mining
The process of extracting patterns from data
A tool to transform this data into information
Frequently used for CRM
Google used Data Mining method
for making a search engine
No matter what your budget,
you can display your ads on Google.
Pay only if people click your ads!
-Get paid for displaying targeted Google ads on your site.
-Customize ads
저작권 제도 및 정책에 대한 연구는 대부분의 경우 법령과 판례에 대한 해석적 접근방법을 사용한다. 법체계와 법 결정과정을 설명하는 법이론 중 주류라고 볼 수 있는 전통적 법이론(traditional legal theories)적 시각에 입각하여, 주로 법리적 타당성과 법적 의미에 대해 연구하는 것이다. 이 이론적 시각의
software is limited to certain types of users, for example for private and non-commercial purposes. One example is Microsoft Internet Explorer, which is made available as freeware, but not open source software.
2.2. Copyleft?
Copyleft is an antonym of copyright, which stipulates that free software remains free, even when modified or changed. Copyleft does not allow anyone to add any restricti
with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private information and credit card information.
element- consists of computer hardware, software, and data management technology, and networking/telecommunications technology
Act : Purcell's resignation
- mismanaging the struggling areas of the business.
- his actions had threatened the performance of the firm's strength.
- unable to shake the claims.
- focus on Protecting his job rather than improving the firm.
Ⅰ.WTO 지적재산권 협정
1.TRIPs의 의의
세계 무역기구(WTO)의 “무역관련 지적재산권에 관한 협정”(Agreement on Trade-Related Aspects of Intellectual Property Rights)은 국제 무역의 왜곡과 장애를 줄이고 지적재산권의 유효하고 적절한 보호를 촉진시킬 목적으로 1994년 4월 15일 마라케쉬 UR 각료회의에서 125개국의 서