CyberRisk '96 Proceedings: Tools for Reducing Risk and Building Ethical Policies in the Electronic Workplace (Google eBook)
Contents: computer monitoring and information policy: lessons learned from the Privacy for Consumers and Workers Act; ethical online marketing: using targeted direct E-mail in a politically correct way; intelligent agents in cyberspace; intellectual property rights: employer responsibilities; restricting Web access in the workplace: pornography and games at work, and more. Extensive appendices including: policy manuals on E-mail, internet use, software policy, employee monitoring, computer ethics, privacy, foreign laws affecting DP and transborder data flows, copyright, and much more.
What people are saying - Write a review
We haven't found any reviews in the usual places.
activities allow America Online anonymous remailers audit aware Berne Convention Buenos Aires Convention bulletin board Canter & Siegel clients communications Company/Agency Computer Ethics Computer Security Consumers and Workers copy copyright infringement copyright law Copyright Office corporate Court crime Cyber Patrol Cyber Promotions Cyberspace document e-mail ECPA effective electronic mail electronic messaging electronic monitoring employee's employees encryption example fair Federal files guidelines illegal individual information security Internet Internet access issues license Lippa ment National Computer Security NCSA network facilities newsgroups online services organization password patent PDPLs personal data personal information Privacy for Consumers privacy policies Privacy Rights Clearinghouse procedures programs protection public domain published reports responsible security policies server services and resources social statute telephone tion trademark treaties unauthorized Usenet users violations Workers Act workplace
Page 62 - Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
Page 62 - fixed" in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is "fixed" for purposes of this title if a fixation of the work is being made simultaneously with its transmission.
Page 67 - Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright.
Page 36 - ... (1) to reproduce the copyrighted work in copies or phonorecords; (2) to prepare derivative works based upon the copyrighted work; (3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending...
Page 68 - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; (4) the effect of the use upon the potential market for or value of the copyrighted work.
Page 35 - computer program" is a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.
Page 3 - Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Page 39 - service mark" means any word, name, symbol, or device, or any combination thereof (1) used by a person, or (2) which a person has a bona fide intention to use in commerce and applies to register on the principal register established by this...
Page 20 - Thou Shalt Not Use a Computer to Harm Other People. 2. Thou Shalt Not Interfere with Other People's Computer Work. 3. Thou Shalt Not Snoop around in Other People's Computer Files.
Page 60 - ... literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly; and (5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly.