The Author |
|
3 | (16) |
|
|
15 | (4) |
General Introduction |
|
19 | (1) |
|
Chapter 1 General Background of the Country |
|
|
19 | (2) |
|
Chapter 2 Telecommunications Infrastructure |
|
|
21 | (6) |
|
|
21 | (2) |
|
|
21 | (2) |
|
§2 Fixed-Line Voice Telephone Networks |
|
|
23 | (2) |
|
§3 Mobile Telephone Networks |
|
|
25 | (2) |
|
Chapter 3 The Information and Communications Technologies Market |
|
|
27 | (4) |
|
|
27 | (1) |
|
§2 Market for Varying Types of Broadband Technologies |
|
|
28 | (3) |
|
Chapter 4 E-Commerce Facts and Figures |
|
|
31 | (4) |
|
|
31 | (4) |
|
Chapter 5 E-Government Initiatives |
|
|
35 | (6) |
|
|
35 | (2) |
|
§2 Particular E-Government Initiatives |
|
|
37 | (2) |
|
§3 State E-Government Initiatives |
|
|
39 | (2) |
|
Part I Regulation of the ICT Market |
|
|
41 | (60) |
|
Chapter 1 Regulatory Framework of the Telecommunications Sector |
|
|
41 | (20) |
|
|
41 | (2) |
|
§2 Regulation of Legacy Telecommunications Providers |
|
|
43 | (2) |
|
|
45 | (4) |
|
|
45 | (3) |
|
II The FCC, Local Governance, and Preemption |
|
|
48 | (1) |
|
§4 Regulatory Framework for Broadcast Media |
|
|
49 | (2) |
|
I Broadcast Content Requirements |
|
|
49 | (1) |
|
II Broadcast Ownership Restrictions |
|
|
50 | (1) |
|
III Broadcast Licensing Restrictions |
|
|
50 | (1) |
|
§5 Regulatory Framework for Multichannel Video Program Distributors |
|
|
51 | (3) |
|
|
51 | (1) |
|
II Franchising Authorities |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
V Direct Broadcast Satellite Service |
|
|
53 | (1) |
|
|
53 | (1) |
|
VII Carry One, Carry All Provisions |
|
|
54 | (1) |
|
§6 Regulatory Framework for Internet Regulation |
|
|
54 | (1) |
|
|
55 | (6) |
|
|
55 | (3) |
|
|
58 | (3) |
|
Chapter 2 Regulation of Competition in the ICT Market |
|
|
61 | (11) |
|
|
61 | (2) |
|
§2 Competition and the Telecommunications Act of 1996 |
|
|
63 | (9) |
|
|
65 | (2) |
|
II State Regulation and Preemption |
|
|
67 | (1) |
|
III Bell Operating Companies |
|
|
68 | (1) |
|
IV Enforcement and Judicial Review |
|
|
69 | (3) |
|
Chapter 3 Regulation of Cryptography and Other Dual-Use Goods |
|
|
72 | (13) |
|
|
72 | (1) |
|
§2 The Department of Commerce and Export Administration Regulations V |
|
|
73 | (7) |
|
§3 The Wassenaar Arrangement |
|
|
80 | (1) |
|
|
81 | (4) |
|
Chapter 4 Legal Status of Standardization |
|
|
85 | (8) |
|
|
85 | (1) |
|
§2 The American National Standards Institute |
|
|
86 | (1) |
|
|
87 | (1) |
|
§4 Government Involvement in Standardization |
|
|
88 | (3) |
|
|
89 | (1) |
|
II U.S. Standards Strategy |
|
|
89 | (2) |
|
§5 International Standardization |
|
|
91 | (2) |
|
Chapter 5 Legal Status of Out-of-Court Dispute Settlement in the ICT Sector |
|
|
93 | (8) |
|
|
93 | (2) |
|
|
95 | (2) |
|
§3 ADR in Intellectual Property and Technology |
|
|
97 | (1) |
|
§4 ADR in the International ICT Sector |
|
|
98 | (3) |
|
Part II Protection of Intellectual Property in the ICT Sector |
|
|
101 | (66) |
|
Chapter 1 Application of Copyright in the Area of ICT |
|
|
101 | (33) |
|
|
101 | (1) |
|
§2 The Copyright Act of 1976 |
|
|
102 | (4) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
|
§6 Works Created Under Employment |
|
|
109 | (1) |
|
§7 Computer-Generated Works |
|
|
110 | (1) |
|
|
110 | (2) |
|
§9 Rights of the Copyright Holder |
|
|
112 | (5) |
|
I Lifespan of Copyrighted Work |
|
|
112 | (1) |
|
II Registration and Notice |
|
|
113 | (2) |
|
III Publication and Issuance of Copies to the Public |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (7) |
|
I Copy Protection and Digital Rights Management |
|
|
118 | (2) |
|
A Nonprofits and Education |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
E Personally Identifying Information |
|
|
121 | (1) |
|
|
122 | (1) |
|
A Transitory Digital Network Communications |
|
|
123 | (1) |
|
B Linking to Infringing Matter |
|
|
123 | (1) |
|
|
124 | (10) |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
E Social Networking and Fair Use |
|
|
130 | (1) |
|
|
130 | (1) |
|
III Reverse Engineering and Decompilation |
|
|
131 | (1) |
|
|
132 | (2) |
|
Chapter 2 Legal Protection of Software |
|
|
134 | (14) |
|
|
134 | (1) |
|
|
135 | (13) |
|
I Requirements of Patentability |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
II Patentable Subject Matter |
|
|
139 | (2) |
|
A The Mental Steps Exception |
|
|
141 | (1) |
|
B Preemption and Meaningful Limitations |
|
|
142 | (1) |
|
C Flook-Like Inventive Concepts ("point of novelty") |
|
|
142 | (1) |
|
D The Machine-or-Transforrnation Test V |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (3) |
|
Chapter 3 Legal Protection of Databases |
|
|
148 | (4) |
|
|
148 | (1) |
|
§2 Databases as Compilations |
|
|
148 | (1) |
|
§3 Originality and Creativity |
|
|
149 | (1) |
|
§4 Database Licensing and Preemption |
|
|
150 | (1) |
|
§5 European Database Directive and WIPO Database Treaty |
|
|
151 | (1) |
|
Chapter 4 Legal Protection of Computer Chips |
|
|
152 | (4) |
|
|
152 | (1) |
|
|
152 | (4) |
|
Chapter 5 Other Intellectual Property Rights in the ICT Sector |
|
|
156 | (5) |
|
|
156 | (1) |
|
|
157 | (1) |
|
§3 Resale, the Internet and Secondary Infringement |
|
|
157 | (1) |
|
§4 Contributory and Vicarious Copyright Infringement |
|
|
158 | (3) |
|
Chapter 6 Internet Domain Name Registration |
|
|
161 | (6) |
|
|
161 | (1) |
|
|
162 | (1) |
|
§3 The Anticybersquatting Consumer Protection Act |
|
|
163 | (2) |
|
|
165 | (2) |
|
|
167 | (32) |
|
Chapter 1 Hardware Contracts |
|
|
167 | (2) |
|
Chapter 2 Software Contracts |
|
|
169 | (8) |
|
|
169 | (1) |
|
|
170 | (1) |
|
§3 Implied Contractual Obligations |
|
|
170 | (4) |
|
I Duty of Good Faith and Fair Dealing |
|
|
170 | (2) |
|
II Implied Warranty of Merchantability |
|
|
172 | (1) |
|
III Duty to Perform in a Workmanlike Manner |
|
|
173 | (1) |
|
IV Disclaimer of Implied Warranties |
|
|
174 | (1) |
|
§4 Interpreting Software Contracts |
|
|
174 | (2) |
|
§5 Software Contracts and the Internet of Things |
|
|
176 | (1) |
|
Chapter 3 Turnkey Contracts |
|
|
177 | (2) |
|
Chapter 4 Distribution Agreements |
|
|
179 | (1) |
|
Chapter 5 Maintenance Contracts |
|
|
180 | (3) |
|
Chapter 6 Facilities Management |
|
|
183 | (3) |
|
Chapter 7 Network Services |
|
|
186 | (6) |
|
|
186 | (2) |
|
|
188 | (1) |
|
§3 Network Access and Security |
|
|
189 | (3) |
|
Chapter 8 Government Contracts |
|
|
192 | (7) |
|
|
192 | (3) |
|
§2 Federal Acquisition Regulation |
|
|
195 | (4) |
|
Part IV Electronic Transactions |
|
|
199 | (24) |
|
Chapter 1 Legal Status of Electronic Transactions |
|
|
199 | (6) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (5) |
|
I The Uniform Electronic Transactions Act |
|
|
203 | (1) |
|
|
204 | (1) |
|
Chapter 2 Regulation of Electronic Signatures and Certification Services |
|
|
205 | (5) |
|
|
205 | (2) |
|
|
207 | (1) |
|
§3 The Electronic Signatures in Global and National Commerce Act |
|
|
208 | (2) |
|
Chapter 3 Legal Aspects of Electronic Banking |
|
|
210 | (7) |
|
|
210 | (1) |
|
|
211 | (3) |
|
I The Gramm-Leach-Bliley Act |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
§3 Online Banking Transactions |
|
|
214 | (3) |
|
Chapter 4 Protection of Users of Electronic Services |
|
|
217 | (6) |
|
|
217 | (1) |
|
|
218 | (3) |
|
II The Fair Credit Billing Act |
|
|
219 | (1) |
|
|
219 | (2) |
|
III The Gramm-Leach-Bliley Act |
|
|
221 | (1) |
|
IV The Electronic Fund Transfer Act (EFTA) |
|
|
221 | (1) |
|
|
221 | (2) |
|
Part V Noncontractual Liability |
|
|
223 | (14) |
|
|
223 | (4) |
|
|
223 | (1) |
|
§2 Tort Law, IT and Software |
|
|
224 | (3) |
|
Chapter 2 Liability of Network Operators |
|
|
227 | (2) |
|
|
227 | (2) |
|
Chapter 3 Liability of Service Providers |
|
|
229 | (5) |
|
|
229 | (1) |
|
|
229 | (2) |
|
|
231 | (2) |
|
|
233 | (1) |
|
Chapter 4 Product Liability |
|
|
234 | (3) |
|
|
234 | (1) |
|
§2 Product Liability, IT, and Software |
|
|
234 | (3) |
|
Part VI Privacy Protection |
|
|
237 | (14) |
|
Chapter 1 Regulation of Personal Data Processing |
|
|
237 | (8) |
|
|
237 | (1) |
|
|
238 | (4) |
|
§3 State Regulation and Self-Regulation |
|
|
242 | (3) |
|
Chapter 2 Protection of Telecommunication Privacy |
|
|
245 | (6) |
|
|
245 | (6) |
|
Part VII Computer-Related Crime |
|
|
251 | (16) |
|
Chapter 1 General Legal Development |
|
|
251 | (10) |
|
|
251 | (1) |
|
|
252 | (3) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (2) |
|
§6 Other Network Crime Statutes |
|
|
259 | (2) |
|
Chapter 2 Application of Criminal Procedure Law in the Area of ICT |
|
|
261 | (6) |
|
|
261 | (6) |
Selected Bibliography |
|
267 | (2) |
Index |
|
269 | |