Explore BrainMass

Legal Aspects of Computing

Laws that concern computers and digital data, sometimes called 'Cyberlaw' or 'internet law' collectively, are a relatively recent development in the grand scheme of laws. While not yet as distinct as say property law or intellectual law (there is a great deal of crossover between these fields and internet law), it is a body of law seeing an ever-increasing use in the recent clamp-down attempts on internet piracy

Successful activism against Internet Law: Many sites enacted a 24-hour blackout in protest of the 2012 American S.O.P.A. Image Credits: Magnus Manske and Dark Attsios.

In addition to piracy and copyright infringement cases, internet law comes into play in cases concerning internet access and usage debates, the privacy requirements on digital data, freedom of expression online, hacking/unauthorized access and intellectual property disagreements. It also deals with hardware issues such as patents for computer-orientated machines and the intellectual property in software that comes with them as well as restrictions on importing and exporting such hardware.

One of the biggest issues in properly regulating the internet is the jurisdiction issues attached. If ripping and redistributing movies is legal in one country but many citizens are downloading these copies in a country where it is not legal, how can the second country prevent this? This issue extends beyond piracy, to places like China which are known for keeping a tight handle on the availability of the internet to their citizens. It provides challenges that will one day have to be met at an international level.

Internet Projection for Children

What additional level of internet protection should children have over adults? Provide explanations for the following situations: 1. free or low-cost access to child-protection software 2. increased penalties to web sites containing objectionable materials 3. the design and /or content of home pages of objectionable sites

Professional Issues in Computing

The following are established ways of protecting intellectual property rights in software: 1. Copyright 2. Patent 3. Trademark Describe the purpose of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these approach

Computer Crime Detective

Requesting help (information and references) with the 2 following questions. 1. The state crime lab training coordinator is concerned with the level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions on maintaining start of the art investigations. (2 or

Focus on Ethics

Focus on Ethics (attached) and answer all questions 1,2 and 3. See attached file for full problem description.

Apple Computers Transformation in the Supply Chain

Define the scope of the project. Create a detailed outline for each section of the paper. in 400 words 1. Apple Computers Transformation in the Supply Chain 2. E-Business Strategies for Apple Apple Computers 3. E-Business Effectiveness for Apple Computers 4. Apple Computers Legal, Ethical, and Regulatory Issues