Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Prefatory Material
Title Page
Copyright
Volume 3 Table of Contents
PART II. Protection of Software
CHAPTER 4 — COPYRIGHT PROTECTION OF SOFTWARE
§ 4.01. Summary of Current Status
§ 4.02. Copyright and the Broad Issues of Software Protection.
§ 4.03. Statutory Basis
[1] General Copyright Statutes.
TITLE VIII —COMPUTER SOFTWARE
[2] Sovereign Immunity from Copyright Infringement.
§ 4.04. Cases
[1] Cases Concerned Directly with Software Protection
[a] Substantial Similarity Cases.
[i] The Altai Case.
[I] Introduction.
[II] A Perspective.
[III] The Whelan Case.
[IV] The Altai Case.
[A] The Altai Facts.
[B] The Second Circuit’s Analysis.
[C] The Altai View of Whelan.
[D] The Altai Framework.
[E] The Altai Test.
[F] Use of Expert Witness.
[V] Some Observations Regarding Altai
[A] Observations Regarding Copyright Protection.
[B] Observations Regarding Patent Protection.
[VI] Conclusion.
[ii] Other Substantial Similarity Cases.
[b] Other Software Copyright Cases.
[2] Cases of Indirect Copyright Protection of Software.
[3] Joint Authorship.
[4] RAM Representation as “Copy”
[5] Work Made for Hire.
[6] Derivative Works.
[a] Statutory Basis.
[b] Guidelines.
[c] Examples.
§ 4.04A. Copyright Misuse
§ 4.05. Notice, Registration, and Deposit
§ 4.06. Criminal Law Protection
§ 4.07. Constitutional Basis
§ 4.08. Protection of Semiconductor Chips
§ 4.09. Advantages and Disadvantages of Copyright Protection of Software
[1] Advantages.
[2] Disadvantages.
§ 4.10. Data Bases
[1] Introduction.
[2] The “Sweat of the Brow” Theory.
[3] The Feist Decision.
[4] Post-Feist Cases.
[5] Present United States Law
[a] Copyright Law.
[b] Trade Secret Law.
[c] Misappropriation.
[d] Contract.
[e] Patent.
[f] Sui Generis.
[6] International Protection
[a] Need for International Uniformity.
[b] The EU Database Directive
[i] Background.
[ii] Copyright Protection.
[iii] Unfair Extraction.
[iv] Cases.
[c] Japan.
[d] WIPO December 1996 Treaty.
[e] Conclusion.
[7] Alternatives.
[8] Conclusion.
§ 4.11. What Constitutes a “Sale”?
CHAPTER 4A — TRADE SECRET, CONTRACTUAL, AND EXTRALEGAL PROTECTION OF SOFTWARE
§ 4A.01. Trade Secret Protection of Software
[1] Applicability
[2] Cases
[3] Uniform Trade Secret Statute
[4] Criminal Law Protection
[5] Advantages and Disadvantages of Trade Secret Protection of Software
[a] Advantages.
[b] Disadvantages.
[6] Possible Preemption by Copyright Law; Combined Copyright and Trade Secret Protection
[a] Preemption as of 1986
[b] Preemption Subsequent to 1986
[7] The Inevitability Doctrine
[8] Posting on the Internet
§ 4A.02. Contractual Protection of Software
[1] Contracting Suggestions
[a] Model Form.
[b] Proprietary Suggestions.
[c] Other Provisions.
[2] Suggested Licensor Procedures
[3] Source Code Escrow
[a] Situations Where Need Arises.
[b] Nature and Provisions.
[c] Problems Posed By Bankruptcy
[i] Executory Contracts.
[ii] Copyright Provision Concerning Licensees.
[iii] Ways In Which Some Licensees Sought To Avoid The Bankruptcy Problem.
[iv] Legislation.
[4] “Wrap” “Agreements”
[a] Introduction.
[b] The Perceived Need.
[c] What They Purport To Do.
[d] Viability.
[e] Notice and Assent.
[i] “Shrink-Wraps”.
[ii] “Click-Wraps”.
[iii] “Browse-Wraps”.
[iv] Other Situations.
[v] Non-Consumer Situations.
[f] Unconscionability and Unreasonableness.
[g] Some Helpful Hints.
[h] Modification.
[i] Conclusion.
§ 4A.03. Extralegal Means for Protecting Programs
APPENDIX 4A — APPENDICES
Appendix 4A[1]. Database and Collections of Information Misappropriation Act
SEC. 1. SHORT TITLE.
SEC. 2. DEFINITIONS.
SEC. 3. PROHIBITION AGAINST MISAPPROPRIATION OF DATABASES.
SEC. 4. PERMITTED ACTS.
SEC. 5. EXCLUSIONS.
SEC. 6. RELATION TO OTHER LAWS.
SEC. 7. CIVIL REMEDIES.
SEC. 8. LIMITATION ON ACTIONS.
SEC. 9. EFFECTIVE DATE.
SEC. 10. NONSEVERABILITY.
Appendix 4A[2]. Consumer and Investor Access to Information Act
SEC. 1. SHORT TITLE.
TITLE I COMMERCE IN DUPLICATED DATABASES PROHIBITED
SEC. 101. DEFINITIONS.
SEC. 102. PROHIBITION AGAINST DISTRIBUTION OF DUPLICATES.
SEC. 103. PERMITTED ACTS.
SEC. 104. EXCLUSIONS.
SEC. 105. RELATIONSHIP TO OTHER LAWS.
SEC. 106. LIMITATIONS ON LIABILITY.
SEC. 107. ENFORCEMENT.
SEC. 108. REPORT TO CONGRESS.
SEC. 109. EFFECTIVE DATE.
TITLE II SECURITIES MARKET INFORMATION
SEC. 201. MISAPPROPRIATION OF REAL-TIME MARKET INFORMATION.
SEC. 202. EFFECTIVE DATE.
Appendix 4A[3]. Collections of Information Antipiracy Act
§ 1. SHORT TITLE.
§ 2 MISAPPROPRIATION OF COLLECTIONS OF INFORMATION.
“CHAPTER 14 MISAPPROPRIATION OF COLLECTIONS OF INFORMATION
“Sec. 1401. Definitions
“Sec. 1402. Prohibition against misappropriation
“Sec. 1403. Permitted acts
“Sec. 1404. Exclusions
“Sec. 1405. Relationship to other laws
“Sec. 1406. Civil remedies
“Sec. 1407. Criminal offenses and penalties
“Sec. 1408. Limitations on actions
§ 3 CONFORMING AMENDMENTS.
§ 4 EFFECTIVE DATE.
Appendix 4A[4]. Model Software License Agreement
Appendix 4A[5]. [Reserved]
Appendix 4A[6]. [Reserved]
Appendix 4A[7]. Copyright Application Form TX (for Literary Works, Including Programs), with Instructions
Copyright Application Form TX (for Literary Works, Including Programs), with Instructions
Appendix 4A[8]. Copyright Application Form PA (Audivisual Works), with Instructions
Copyright Application Form PA (Audivisual Works), with Instructions
Appendix 4A[9]. Copyright Registration Instructions for Audiovisual Works
Copyright Registration Instructions for Audiovisual Works
Appendix 4A[10]. Obtaining Copies of Copyright Office Records and Deposits
Obtaining Copies of Copyright Office Records and Deposits
Appendix 4A[11]. Copyright Registration Procedures
Copyright Registration Procedures
Appendix 4A[12]. Certification of Authorship
Certification of Authorship
Appendix 4A[13]. Copyright Registration for Computer Programs
Copyright Registration for Computer Programs
Appendix 4A[14]. C.F.R. Copyright Notice Requirement
§ 202.2 Copyright notice.
Appendix 4A[15]. Economic Espionage Act of 1996
§ 1831. Economic espionage
§ 1832. Theft of trade secrets
§ 1833. Exceptions to prohibitions
§ 1834. Criminal forfeiture
§ 1835. Orders to preserve confidentiality
§ 1836. Civil proceedings to enjoin violations
§ 1837. Applicability to conduct outside the United States
§ 1838. Construction with other laws
§ 1839. Definitions
Appendix 4A[16]. [Reserved]
Appendix 4A[17]. Mandatory Deposit
Mandatory Deposit Instructions
Appendix 4A[18]. Compendium of Copyright Office Practices
Under the Copyright Law Which Became Fully Effective on January 1, 1978, Including Title 17 of the United States Code and Amendments Thereto COPYRIGHT OFFICE THE LIBRARY OF CONGRESS WASHINGTON, D.C. 20559 1984
320 Machine-readable works.
321 Computer programs.
322 Copyrightable subject matter.
323 Derivative computer programs.
324 Deposit for registration: identifying material.
325 Completing the application form.
326 Glossary of terms.
327 Instructional booklets, flowcharts, and the like.
328 Automated data bases.
Appendix 4A[19] [Reserved]
Appendix 4A[20]. Semiconductor Chip Protection Act of 1984
CHAPTER 9 PROTECTION OF SEMICONDUCTOR CHIP PRODUCTS
§ 901. Definitions
§ 902. Subject matter of protection
§ 903. Ownership, transfer, licensing, and recordation
§ 904. Duration of protection
§ 905. Exclusive rights in mask works
§ 906. Limitation on exclusive rights: reverse engineering; first sale
§ 907. Limitation on exclusive rights: innocent infringement
§ 908. Registration of claims of protection
§ 909. Mask work notice
§ 910. Enforcement of exclusive rights
§ 911. Civil actions
§ 912. Relation to other laws
§ 913. Transition provisions
§ 914. International transitional provisions
Appendix 4A[21]. [Reserved]
Appendix 4A[22]. [Reserved]
Appendix 4A[23]. [Reserved]
Appendix 4A[24]. [Reserved]
Appendix 4A[25]. United Kingdom Copyright (Computer Software) Amendment Act 1985
1.
2.
3.
4.
Appendix 4A[26]. [Reserved]
Appendix 4A[27]. Software Protection in the United Kingdom
1 The nature and scope of software copyright in the UK
1.1 The evolution of UK copyright law
1.2 The Copyright (Computer Software) Amendment Act 1985
1.3 Current scope of protection under the 1956 Act (as amended)
2 Ownership of copyright: special cases
2.1 Employees
2.2 Software houses and freelance programmers
2.3 Joint authors and joint owners
3 Copyright infringement, remedies and sanctions
3.1 Infringement by reproduction or adaptation
3.2 Infringement by “use”
3.3 Civil remedies and criminal sanctions
4 Trade secrets and confidentiality
4.1 What can be protected as confidential and how?
4.2 Rights and obligations of employees
4.3 Remedies for misuse
Appendix 4A[29]. [Reserved]
Appendix 4A[30]. Copyright Office Notice on Computer Screen Displays
Appendix 4A[31]. [Reserved]
Appendix 4A[32]. Registration of Claims to Copyright Registration and Deposit of Databases (54 Fed Reg. 13177-13182).
Appendix 4A[33]. [Reserved]
Appendix 4A[34]. [Reserved]
Appendix 4A[35]. [Reserved]
Appendix 4A[36]. State and Federal Computer Crime Statutes
State Statutes.
Alabama (Ala. Code)
§ 13A-8-100. Short Title.
§ 13A-8-101. Definitions.
§ 13A-8-102. Acts constituting offenses against intellectual property; punishment.
§ 13A-8-103. Acts constituting offense against computer equipment or supplies; punishment.
Alaska (Alaska Stat.)
§ 11-46-740. Criminal use of computer.
Arizona (Ariz. Rev. Stat. Ann.)
§ 13-2301. Definitions.
§ 13-2316. Computer fraud; classification.
Arkansas (Ark. Stat. Ann.)
§ 5-41-101. Purpose.
§ 5-41-102. Definitions.
§ 5-41-103. Computer fraud.
§ 5-41-104. Computer trespass.
§ 5-41-105. Venue of violations.
§ 5-41-106. Civil actions.
§ 5-41-107. Assistance of Attorney General.
California (Cal. Penal Code)
§ 502. Computer data access and fraud; legislative findings; definitions; prohibited acts; penalty; civil action; application; exceptions.
Colorado (Col. Rev. Stat.)
§ 18-5.5-101. Definitions.
§ 18-5.5-102. Computer crime.
Connecticut (Conn. Gen. Stat.)
§ 53a-250. Definitions.
§ 53a-251. Computer crime.
§ 53a-252. Computer crime in the first degree: Class B felony.
§ 53a-253. Computer crime in the second degree: Class C felony.
§ 53a-254. Computer crime in the third degree: Class D felony.
§ 53a-255. Computer crime in the fourth degree: Class A misdemeanor.
§ 53a-256. Computer crime in the fifth degree: Class B misdemeanor.
§ 53a-257. Alternative fine based on defendant’s gain.
§ 53a-258. Determination of degree of crime
§ 53a-259. Value of property or computer services
§ 53a-260. Location of offense
§ 53a-261. Jurisdiction
Delaware (Del. Code Ann.)
§ 931. Definitions.
§ 932. Unauthorized access.
§ 933. Theft of computer services.
§ 934. Interruption of computer services.
§ 935. Misuse of computer system information.
§ 936. Destruction of computer equipment.
§ 937. Penalties.
§ 938. Venue.
§ 939. Remedies of aggrieved persons.
Florida (Fla. Stat.)
§ 815.01. Short title.
§ 815.02. Legislative intent.
§ 815.03. Definitions.
§ 815.04. Offenses against intellectual property.
§ 815.05. Offenses against computer equipment or supplies.
§ 815.06. Offenses against computer users.
§ 815.07. This chapter not exclusive.
Georgia (Ga. Code)
16-9-90. Short title.
16-9-91. Legislative findings.
16-9-92. Definitions.
16-9-93. Computer crimes defined; exclusivity of article; civil remedies; criminal penalties.
16-9-93.1
16-9-94. Venue.
Hawaii (Hawaii Rev. Stat.)
§ 708-890. Definitions of terms in this part.
§ 708-891. Computer fraud in the first degree.
§ 708-892. Computer fraud in the second degree.
§ 708-893. Computer fraud in the third degree.
§ 708-894. Unauthorized computer use in the first degree.
§ 708-895. Unauthorized computer use in the second degree.
§ 708-896. Unauthorized computer use in the third degree.
Idaho (Idaho Code)
18-2201. Definitions.—As used in this chapter:
18-2202. Computer crime.
26-1220. Illegal data processing activities.
Illinois (Ill. Crim. Code)
§ 16D-2. Definitions.
§ 16D-3. Computer Tampering.
§ 16D-4. Aggravated Computer Tampering.
§ 16D-5. Computer Fraud.
§ 16D-6. Forfeiture.
§ 16D-7. Rebuttable Presumption—without authority.
Indiana (Ind. Code)
35-43-1-4. Computer tampering.
35-43-2-3. Computer trespass.
Iowa (Iowa Code)
716A.1. Definitions.
716A.2. Unauthorized access.
716A.3. Computer damage defined.
716A.4. Computer damage in the first degree.
716A.5. Computer damage in the second degree.
716A.6. Computer damage in the third degree.
716A.7. Computer damage in the fourth degree.
716A.8. Computer damage in the fifth degree.
716A.9. Computer theft defined.
716A.10. Computer theft in the first degree.
716A.11. Computer theft in the second degree.
716A.12. Computer theft in the third degree.
716A.13. Computer theft in the fourth degree.
716A.14. Computer theft in the fifth degree.
716A.15. Chapter not exclusive.
716A.16. Printouts admissible as evidence.
Kansas (Kans. Crim. Code)
§ 21-3755. Computer crime; unlawful computer access.
Kentucky (Ky. Rev. Stat.)
434.840. Definitions.
434.845. Unlawful access to a computer in the first degree.
434.850. Unlawful access to a computer in the second degree.
434.855. Misuse of computer information.
434–860. Venue.
Louisiana (La. Rev. Stat. Ann.)
§ 73.1. Definitions.
§ 73.2. Offenses against intellectual property.
§ 73.3. Offenses against computer equipment or supplies.
§ 73.4. Offenses against computer users.
§ 73.5. Computer fraud.
Maine (Me. Rev. Stat. Ann.)
§ 431. Definitions
§ 432 Criminal invasion of computer privacy
§433. Aggravated criminal invasion of computer privacy
Maryland (Md. Ann. Code)
§ 146. Unauthorized access to computers prohibited.
§ 45A
Massachusetts (General Laws)
Chapter 266, § 30
Michigan (Mich. Comp. Laws Ann.)
§ 752.792. Definitions.
§ 752.793. Definitions.
§ 752.794. Access to computers for devising or executing scheme to defraud or obtain money, property, or service.
§ 752.795. Gaining access to alter, damage, or destroy computers, computer programs, or data.
§ 752.796. Use of computers to commit violations of certain sections.
§ 752.797. Violations; misdemeanor, felony, penalties.
Minnesota (Minn. Stat.)
609.87. Computer crime; definitions.
609.88. Computer damage.
609.89. Computer theft.
609.891 Unauthorized computer access
Mississippi (Miss. Code Ann.)
§ 97-45-1. Definitions.
§ 97-45-3. Computer fraud; penalties.
§ 97-45-5. Offense against computer users; penalties.
§ 97-45-7. Offense against computer equipment; penalties.
§ 97-45-9. Offense against intellectual property; penalties.
§ 97-45-11. Venue.
§ 97-45-13. Effect on other offenses.
Missouri (Mo. Rev. Stat.)
569.093. Definitions for section 569.094 to 569.099.
569.094. Computer printouts used as evidence, when
569.095. Tampering with intellectual property, penalties.
569.097. Tampering with computer equipment, penalties.
569.099. Tampering with computer users, penalties.
Montana (Mont. Code Ann.)
45–6–311. Unlawful use of a computer.
Nebraska (Neb. Rev. Stat.)
28-1341. Act, how cited.
28-1342. Legislative findings and declarations.
28-1343. Terms, defined.
28-1343.01. Unauthorized computer access; penalty.
28-1344. Unlawful acts; depriving or obtaining property or services; penalties.
28-1345. Unlawful acts; harming or disrupting operations; penalties.
28-1346. Unlawful acts; obtaining confidential public information; penalties.
28-1347. Unlawful acts; access without authorization; exceeding authorization; penalties.
28-1348. Act, how construed.
Nevada (Nev. Rev. Stat.)
205.473. Definitions.
205.4732. “Access” defined.
205.4735. “Computer” defined.
205.474. “Data” defined.
205.4745. “Network” defined.
205.475. “Program” defined.
205.4755. “Property” defined.
205.476. “System” defined.
205.4765. Unlawful use or destruction of computer, system or network.
205.477. Unlawful use or denial of use of computer, system or network.
New Hampshire (N.H. Rev. Stat. Ann.)
636:16. Computer Crime; Definitions.
636:17. Computer Related Offenses.
636:18. Computer Crime Penalties.
636:19. Venue.
New Jersey (N.J. Rev. Stat.)
2C:20-23. Definitions.
2C:20-24. Value of property or services.
2C:20-25. Computer-related theft.
2C:20-26. Property or services of $75,000 or more; degree of crime.
2C:20-27. Property or services between $500 and $75,000; degree of crime.
2C:20-28. Property or services between $200 and $500; degree of crime.
2C:20-29. Property or services of $200 or less; disorderly persons offense.
2C:20-30. Damage or wrongful access to computer system; no assessable damage; degree of crime.
2C:20-31. Disclosure of data from wrongful access; no assessable damage; degree of crime.
2C:20-32. Wrongful access to computer; lack of damage or destruction; disorderly persons offense.
2C:20-33. Copy or alteration of program or software with value of $1,000 or less.
2C:20-34. Situs of offense.
New Mexico (N.M. Stat. Ann.)
30-45-1. Short title.
30-45-2. Definitions.
30-45-3. Computer access with intent to defraud or embezzle.
30-45-4. Comuter abuse.
30-45-5. Unauthorized computer use.
30-45-6. Prosecution.
30-45-7. Forfeiture of property.
New York (N.Y. Penal Code)
§ 156.00. Offenses involving computers; definition of terms.
§ 156.05. Unauthorized use of a computer.
§ 156.10. Computer trespass.
§ 156.20. Computer tampering in the fourth degree.
§ 156.25 Computer tampering in the third degree.
§ 156.26 Computer tampering in the second degree.
§ 156.27 Computer tampering in the first degree.
§ 156.30 Unlawful duplication of computer related material.
§ 156.35 Criminal possession of computer related material.
§ 156.50 Offenses involving computers; defenses.
§ 165.07 Unlawful use of secret scientific material.
NY Penal Code § 170.00 (Article 170 deals with forgery)
NY Penal Code § 175.00 (Article 175 deals with offenses involving false written statements)
North Carolina (N.C. Gen. Stat.)
14–453. Definitions.
14–454. Accessing computers.
14–455. Damaging computers and related materials.
14–456. Denial of computer services to an authorized user.
14–457. Extortion.
North Dakota
12.1–06.1–01. Definitions.
12.1-06.1-08. Computer fraud—Computer crime—Classification—Penalty.
Ohio (Ohio Rev. Stat.)
2913.01 Definitions.
2913.04 Unauthorized use of property; unauthorized access to computer systems.
2913.81 Denying access to a computer.
Oklahoma (Okla. Stat.)
§ 1952. Definitions
§ 1953. Prohibited Acts
§ 1954. Certain acts as prima facie evidence of violation of act
§ 1955. Penalties—Civil actions
§ 1956. Repealed by Laws 1989, c. 154, § 2, operative July 1, 1989.
§ 1957. Access of computer, computer system or computer network in one jurisdiction from another jurisdiction—Bringing of action
§ 1958 Access to computers, computer systems and computer networks prohibited for certain purposes—Penalty
Pennsylvania (Pa. Cons. Stat.)
§ 3933. Unlawful use of computer.
Rhode Island (R.I. Gen. Laws)
11-52-1. Definitions.
11-52-2. Access to computer for fraudulent purposes.
11-52-3. Intentional access, alteration, damage or destruction.
11-52-4. Computer theft.
11-52-5. Penalties.—
11-52-6. Civil action.
11-52-7. Use of false information.—
11-52-8. Tampering with computer source documents.
South Carolina (S.C. Code Ann.)
§ 16-16-10. Definitions.
§ 16-16-20. Offenses; penalties.
§ 16-16-30. Venue.
§ 16-16-40. Applicability of other criminal law provisions.
South Dakota (S.D. Codified Laws Ann.)
43–43B–1. Unlawful uses of computer.
§ 43-43B-2. Definition of terms.
§ 43-43B-3. Obtaining use, altering or destroying system, access and disclosure without consent—Value one thousand dollars or less.
§ 43-43B-4. Obtaining use, altering or destroying system, access and disclosure without consent—Value more than one thousand dollars.
§ 43-43B-8. Venue for violations.
Tennessee (Tenn. Code Ann.)
39-14-601. Definitions for computer offenses.
39-14-602. Violations —Penalties.
39-14-603. Venue.
Texas (Tex. Code Ann.)
§ 33.01 Definitions.
§ 33.02 Breach of Computer Security.
§ 33.03 Harmful Access.
§ 33.04 Defenses.
§ 33.05 Assistance by Attorney General.
Utah (Utah Code Ann.)
§ 76-6-701. Computer Crimes Act—Short title.
§ 76-6-702. Computer Crimes Act—Definitions.
§ 76-6-703. Computer crimes and penalties.
§ 76-6-704. Computer Crimes Act—Attorney general or county attorney to prosecute conduct violating other statutes.
§ 76-6-705. Reporting violations.
Virginia (Va. Code)
18.2-152.1. Short title.
18.2-152.2. Definitions.—For purposes of this article:
18.2-152.3. Computer fraud.
18.2-152.4. Computer trespass; penalty.
18.2-152.5. Computer invasion of privacy.
18.2-152.6. Theft of computer services.
18.2-152.7. Personal trespass by computer.
18.2-152.8. Property capable of embezzlement.
18.2-152.9. Limitation of prosecution.
18.2-152.10. Venue for prosecution.
18.2-152.11. Article not exclusive.
18.2-152.12. Civil relief; damages.
18.2-152.13. Severability.
18.2-152.14. Computer as instrument of forgery.
Washington (Wash. Rev. Code)
9A.48.100 Malicious mischief—“Physical damage” defined.
9A.52.110. Computer trespass in the first degree.
9A.52.120. Computer trespass in the second degree.
9A.52.130. Computer trespass—Commission of other crime.
West Virginia (W. Va. Code)
§ 61-3C-1. Short Title.
§ 61-3C-2. Legislative findings.
§ 61-3C-3. Definitions.
§ 61-3C-4. Computer fraud; penalties.
§ 61-3C-5. Unauthorized access to computer services.
§ 61-3C-6. Unauthorized possession of computer data or programs.
§ 61-3C-7. Alteration, destruction, etc. of computer equipment.
§ 61-3C-8. Disruption of computer services.
§ 61-3C-9. Unauthorized possession of computer information, etc.
§ 61-3C-10. Disclosure of computer security information.
§ 61-3C-11. Obtaining confidential public information.
§ 61-3C-12. Computer invasion of privacy.
§ 61-3C-13. Fraud and related activity in connection with access devices.
§ 61-3C-14. Endangering public safety.
§ 61-3C-15. Computer as instrument of forgery.
§ 61-3C-16. Civil relief; damages.
§ 61-3C-17. Defenses to criminal prosecution.
§ 61-3C-18. Venue.
§ 61-3C-19. Prosecution under other criminal statutes not prohibited.
§ 61-3C-20. Personal jurisdiction.
§ 61-3C-21. Severability.
Wisconsin (Wis. Stat.)
943.70 Computer crimes.
Wyoming (Wyo. Stat.)
§ 6-3-501. Definitions.
§ 6-3-502. Crimes against intellectual property; penalties.
§ 6-3-503. Crimes against computer equipment or supplies; interruption or impairment of governmental operations or public services; penalties.
§ 6-3-504. Crimes against computer users; penalties.
§ 6-3-505. This article not exclusive.
Federal Statutes.
United States Code Title 18
§ 641. Public money, property or records
§ 661. Within special maritime and territorial jurisdiction
§ 1001. Statements or entries generally
§ 1029. Fraud and related activity in connection with access devices
§ 1030. Fraud and related activity in connection with computers
§ 1341. Frauds and swindles
§ 1343. Fraud by wire, radio, or television
§ 1344. Bank fraud
§ 1346. Definition of “scheme or artifice to defraud”
§ 2071. Concealment, removal, or mutilation generally
§ 2311. Definitions
§ 2314. Transportation of stolen goods, securities, moneys, fraudulent State tax stamps, or articles used in counterfeiting
Appendix 4A[37]. [Reserved]
Appendix 4A[38]. [Reserved]
Appendix 4A[39]. [Reserved]
Appendix 4A[40]. [Reserved]
Appendix 4A[41]. [Reserved]
Appendix 4A[42]. 1991 P.R.C. Copyright Software Regulations
REGULATIONS FOR THE PROTECTION OF COMPUTER SOFTWARE
Chapter 1 General Provisions
Chapter 2 Computer Software Copyrights
Chapter 3 Computer Software Registration Administration
Chapter 4 Legal Responsibilities
Chapter 5 Supplementary Articles
Appendix 4A[43]. Database Protection in Japan
Appendix 4A[44]. [Reserved]
Appendix 4A[45]. [Reserved]
Appendix 4A[46]. U.S. Copyright Office Form CA (Rectification of incorrect or incomplete facts given in earlier registration)
CA. APPLICATION FORM CA
Form CA Continuation Sheet
Appendix 4A[47]. Copyright Office Shareware Regulations
§ 201.26 Recordation of Documents Pertaining to Computer Shareware and Donation of Public Domain Computer Software.
Appendix 4A[48]. EU Database Directive
Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, Official Journal L 077 , 27/03/1996 P. 0020–0028
CHAPTER I Scope
CHAPTER II Copyright
CHAPTER III SUI GENERIS RIGHT
CHAPTER IV COMMON PROVISION
Appendix 4A[49]. Information Technology Strategies Relating to the U.S. Bankruptcy Laws By J.T. Westermeier
STRATEGIES RELATING TO THE U.S. BANKRUPTCY LAWS AND INFORMATION TECHNOLOGY
← Prev
Back
Next →
← Prev
Back
Next →