Intellectual Property and Computer Crimes"A must-have desk reference.... A practical all-in-one legal resource on intellectual property and computer crimes...." -- The Vermont Bar Journal Written by a former federal prosecutor with the Computer Crime and Intellectual Property Section, this complete guide explains the criminal laws that apply to violations of intellectual property rights and unauthorized computer access, as well as civil violations under the Computer Fraud and Abuse Act -- and their impact on your clients. Intellectual Property and Computer Crimes examines criminal infringement, the expanded scope of computer hacking laws, and the important legal issues that arise when these crimes are prosecuted. Coverage includes detailed analysis of the Economic Espionage Act based on the latest cases; how to calculate damages and the meaning of unauthorized access under the Computer Fraud and Abuse Act; recent prosecutions under the Trademark Counterfeiting Act; state prosecutions for computer hacking and theft of trade secrets; and civil cases brought under the DMCA. In addition to analysis of laws aimed specifically at intellectual property violations, you'll find discussion of how general criminal laws are used to prosecute intellectual property crimes. Whether you are a criminal lawyer seeking guidance on intellectual property issues or a civil lawyer with questions about criminal law or the use of criminal statutes in civil litigation, this book is an invaluable reference. |
Hva folk mener - Skriv en omtale
Vi har ikke funnet noen omtaler på noen av de vanlige stedene.
Innhold
CHAPTER 3 | 2-3 |
CHAPTER 1 | 3-1 |
Trademark Counterfeiting | 4-1 |
a Fraud in Obtaining Trademark | 4-14 |
CHAPTER 6 | 6-1 |
1 Introduction | 6-43 |
c Protection for Government Computer | 7-1 |
CHAPTER 8 | 7-71 |
24 Minnesota 944 | 9-19 |
13 Idaho 931 | 9-31 |
36 Ohio 959 | 9-58 |
48 Washington 974 | 9-74 |
2 Alaska 911 | 1-1 |
03 | xi |
Index | xxiv |
CHAPTER 7 | 2-10 |
CHAPTER 9 | 9-1 |
14 Illinois 932 | 9-2 |
25 Mississippi 946 | 9-3 |
37 Oklahoma 961 | 9-4 |
iii Counterfeit Mark Must | 9-6 |
222 | 2-22 |
CHAPTER 5 | 33 |
Computer Crimes | 7-1 |
Vanlige uttrykk og setninger
2d Cir 9th Cir action activity actual addition Amendment amount apply authorized cause charged Circuit civil claim Code communication Computer Crime conduct Cong Congress constitute contained conviction copy copyright infringement Corp counterfeit court crime criminal criminal copyright damage defendant defendant's defined definition determine distribution electronic element employee establish evidence example fact federal files foreign fraud gain Guidelines held important individual infringement intellectual property intent interstate involved issue knowing legislative limited loss mark material means measures noted obtain offense Office original owner particular patent penalties person prohibits prosecution protection prove provides reasonable records registered requirement result retail value S.Ct Second Section Sentencing specific Stat statute subsection Supp term theft of trade Third tion Title trade secret trademark unauthorized United victim violation wire