CyberRisk '96 Proceedings: Tools for Reducing Risk and Building Ethical Policies in the Electronic Workplace

Front Cover
David M. Harper
DIANE Publishing, 1998 - Computer networks - 139 pages
0 Reviews
Contents: computer monitoring and information policy: lessons learned from the Privacy for Consumers and Workers Act; ethical online marketing: using targeted direct E-mail in a politically correct way; intelligent agents in cyberspace; intellectual property rights: employer responsibilities; restricting Web access in the workplace: pornography and games at work, and more. Extensive appendices including: policy manuals on E-mail, internet use, software policy, employee monitoring, computer ethics, privacy, foreign laws affecting DP and transborder data flows, copyright, and much more.

What people are saying - Write a review

We haven't found any reviews in the usual places.

Common terms and phrases

Popular passages

Page 62 - Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
Page 62 - fixed" in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is "fixed" for purposes of this title if a fixation of the work is being made simultaneously with its transmission.
Page 67 - Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright.
Page 4 - ... (1) to reproduce the copyrighted work in copies or phonorecords; (2) to prepare derivative works based upon the copyrighted work; (3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending...
Page 68 - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; (4) the effect of the use upon the potential market for or value of the copyrighted work.
Page 3 - computer program" is a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.
Page 3 - Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Page 7 - service mark" means any word, name, symbol, or device, or any combination thereof (1) used by a person, or (2) which a person has a bona fide intention to use in commerce and applies to register on the principal register established by this...
Page 20 - Thou Shalt Not Use a Computer to Harm Other People. 2. Thou Shalt Not Interfere with Other People's Computer Work. 3. Thou Shalt Not Snoop around in Other People's Computer Files.
Page 60 - ... literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly; and (5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly.

Bibliographic information