CyberRisk '96 Proceedings: Tools for Reducing Risk and Building Ethical Policies in the Electronic Workplace
Contents: computer monitoring and information policy: lessons learned from the Privacy for Consumers and Workers Act; ethical online marketing: using targeted direct E-mail in a politically correct way; intelligent agents in cyberspace; intellectual property rights: employer responsibilities; restricting Web access in the workplace: pornography and games at work, and more. Extensive appendices including: policy manuals on E-mail, internet use, software policy, employee monitoring, computer ethics, privacy, foreign laws affecting DP and transborder data flows, copyright, and much more.
What people are saying - Write a review
We haven't found any reviews in the usual places.
America Online anonymous remailers audit Berne Convention Buenos Aires Convention Canter & Siegel clients communications company’s Company/Agency Computer Ethics Computer Security conﬁdential Consumers and Workers copy copyright infringement copyright law Copyright Office corporate Court crime Cyber Patrol Cyber Promotions Cyberspace document e-mail ECPA electronic mail electronic messaging electronic monitoring employee’s employees encryption example Federal ﬁles ﬁltering ﬁnancial ﬁnd ﬁring ﬁrms ﬁrst guidelines identiﬁable illegal individual information security Internet Internet access issues Kristen Bell license Lippa ment NCSA network facilities newsgroups ofﬁce ofﬁcials online services organization password patent PDPLs personal data Privacy for Consumers privacy policies Privacy Rights Privacy Rights Clearinghouse procedures programs protection public domain reports responsible security policies server services and resources signiﬁcant speciﬁc statute telephone tion trademark treaties unauthorized Usenet users violations workplace
Page 62 - Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
Page 62 - fixed" in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is "fixed" for purposes of this title if a fixation of the work is being made simultaneously with its transmission.
Page 67 - Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright.
Page lxi - ... (1) to reproduce the copyrighted work in copies or phonorecords; (2) to prepare derivative works based upon the copyrighted work; (3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending...
Page 68 - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; (4) the effect of the use upon the potential market for or value of the copyrighted work.
Page lx - computer program" is a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.
Page 3 - Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Page xlii - service mark" means any word, name, symbol, or device, or any combination thereof (1) used by a person, or (2) which a person has a bona fide intention to use in commerce and applies to register on the principal register established by this...
Page xlix - Thou Shalt Not Use a Computer to Harm Other People. 2. Thou Shalt Not Interfere with Other People's Computer Work. 3. Thou Shalt Not Snoop around in Other People's Computer Files.
Page 60 - ... literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly; and (5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly.