IT law

In the report, WildWestWeb is known as “the company”. This is about their commercial and managing problem relate to any legal issue. It analyses these problems and business behavior against the relevant act and statute. It recommends reforms to better operating under computer law. The areas of discourse are: Computer Crime, Intellectual property and Data protection Computer Crime Introduction Hacker, in computer science, originally, a computerphile—a person totally engrossed in computer programming and computer technology.

In the 1980s, with the advent of personal computers and dial-up computer networks, hacker acquired a pejorative connotation, often referring to someone who secretively invades others' computers, inspecting or tampering with the programs or data stored on them. (More accurately, though, such a person would be called a “cracker. ”) Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick. Computers and the information they contain are often considered confidential systems because their use is typically restricted to a limited number of users.

This confidentiality can be compromised in a variety of ways. For example, computers and computer data can be harmed by people who spread computer viruses and worms. A computer virus is a set of computer program instructions that attaches itself to programs in other computers. The viruses are often parts of documents that are transmitted as attachments to e-mail messages. A worm is similar to a virus but is a self-contained program that transports itself from one computer to another through networks. Thousands of viruses and worms exist and can quickly contaminate millions of computers.

(Parker, Donn B; 2006) Another technique to help prevent abuse and misuse of computer data is to limit the use of computers and data files to approved persons. Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. The software also securely records their actions to establish accountability. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user.

Other types of organizations also classify information and specify different degrees of protection. Intellectual property Introduction Intellectual Property refers to creative works that have economic value and are protected by law. Intellectual property laws reward the creators of most types of intellectual property by preventing others from copying, performing, or distributing those works without permission. The main purpose of this protection is to provide incentives for people to produce scientific and creative works that benefit society at large.

Some types of intellectual property are automatically protected by law from the moment of their creation. Other types require the creator to request a specific grant of rights from a government agency before they can be protected by law. Nearly all nations have laws protecting intellectual property. However, some nations do not vigorously enforce intellectual property laws, making illegal copying, or piracy, a major problem in these areas. (Schechter, Roger E; 2006) Forms of Intellectual Property The principal types of intellectual property are patents, copyrights, and trademarks.

Patent law protects inventions that demonstrate technological progress. Copyright law protects a variety of literary and artistic works, including paintings, sculpture, prose, poetry, plays, musical compositions, dances, photographs, motion pictures, radio and television programs, sound recordings, and computer software programs. Trademark law protects words, slogans, and symbols that serve to identify different brands of goods and services in the marketplace. Intellectual property also includes certain related fields of law, such as trade secrets and the right of publicity.

Trade secret law protects confidential information that belongs to a business and gives that business a competitive advantage. For example, the formula for making the soft drink Coca-Cola is a trade secret protected by intellectual property laws. Right of publicity law protects the right to use one’s own name or likeness for commercial purposes. For example, a famous athlete may profit by using his or her name to endorse a given product. Using a person’s name to endorse a product without their permission is a violation of right of publicity law.

Intellectual property differs from other forms of property because it is intangible—that is, it is a product of the human imagination. Because intellectual property is intangible, many people may use it simultaneously without conflict. For example, only one person can drive a car at a time, but if an author publishes a book, many people can read the work at the same time. Intellectual property is also much easier to copy than it is to create. It may take many months of work to write a novel or computer program, but with a photocopy machine or a computer others could copy the work in a matter of seconds.

Without intellectual property laws, it would be easy to duplicate original works and sell them for very low prices, leaving the original creators without any chance to secure economic rewards for their efforts. The legal system avoids this problem by making it against the law to reproduce various forms of intellectual property without the permission of the creator. Most intellectual property rights expire after a specified period. This permits the rest of society to benefit from the work after the creator has had an opportunity to earn a fair reward.

For example, after the inventor of a patented telecommunications device has profited from the work for a specified period, anyone may manufacture that same device without paying the inventor royalties, thereby encouraging competition that allows others to benefit from the invention as well. The one exception to limited periods of intellectual property rights is in the field of trademark law. Trademark rights never expire, so long as a merchant continues to use the trademark to identify a given product.