StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database protection - Essay Example

Cite this document
Summary
If technical measures are used to circumvent a database not located in the USA by a non-authorized user in the USA, the database owner has viable options depending on the country they are from. International and USA law creates legal options for compensation and to stop the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Database protection
Read Text Preview

Extract of sample "Database protection"

Database Protection in the USA If technical measures are used to circumvent a database not located in the USA by a non ized user in the USA, the database owner has viable options depending on the country they are from. International and USA law creates legal options for compensation and to stop the hacker from using another’s intellectual property.A database is defined as intellectual property. International law on Intellectual property is regulated by the World Trade Organization under a treaty called TRIPS (“Intellectual Property.”). Article 10 of TRIPS states:1.

Computer programs, whether in source or object code, shall be protected as literary works under the Berne Convention (1971).2. Compilations of data or other material, whether in machine readable or other form, which by reason of the selection or arrangement of their contents constitute intellectual creations shall be protected as such (“Agreement on Trade-Related.”).If the database owner wanted to, they could file a petition with the WTO. Every WTO member must abide by the statement above, or risk sanctions (“The Digital Copyright.”) The petition filed to the WTO is basically a court hearing, with a judge, lawyers, plaintiff, and defendant.

The only difference is that not all of the players in this court case are Americans, but from various countries belonging to the WTO. Whatever the judge decides, the defendant’s country, or America in this case, is left to uphold. If it was proven that the database had been accessed illegally and copies distributed, then America would enforce the penalty, ranging from prison to restitution. Most of the time restitution is the scenario. Let it be noted that only twenty-five cases of intellectual property theft has been petitioned to the WTO (“Agreement on Trade-Related.”). Another means for the database owner would be to file suit either in American federal or state court where the defendant is from.

America has copyright laws for intellectual property. Because of the WTO, every WTO member must have current laws protecting intellectual property, America is no exception. By suing through the American justice system, the database owner could have an injunction placed on the product from the database immediately. American laws would also punish the hacker, if they were found guilty, by restitution or jail time. The two options above all depend on the database owner and where they live.

If from a developed country like Russia or one of the European states, it is very likely justice will be done and their database will be protected. However, if from an underdeveloped country, like Cambodia or an African state the database owner will lose their property. One because their country does not have the existing WTO treaty or their country already has sanctions. Two the database owner would not have the resources to travel to America and file a complaint within the justice system.

In the end, databases are intellectual property. Intellectual property is hard to defend. This new growing trend of databases and computers are surpassing existing laws. An American thief can steal in a couple of seconds; the justice system takes years to restore. Works Cited“Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS Agreement) (1994).” World Trade Organization. 29 July 2006. WTO. 29 July 2006 http://www.wipo.int/clea/docs_new/en/wt/wt001en.html#P148_13696 “Intellectual Property.

” Wikipedia the free Encyclopedia. 29 July 2006. Wikipedia. 29 July 2006 http://en.wikipedia.org/wiki/Intellectual_property “The Digital Copyright Act of 1998; U.S. Copyright Office Summary.” U.S. Copyright Office. December 1998. U.S. Copyright Office. 29 July 2006 http://www.copyright.gov/legislation/dmca.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database protection Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Database protection Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1537323-database-protection
(Database Protection Essay Example | Topics and Well Written Essays - 500 Words)
Database Protection Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1537323-database-protection.
“Database Protection Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1537323-database-protection.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database protection

Software Implementing Database Security

Overloads or inefficient performance constraint may compromise database integrity and the data might be susceptible to damage physically (earthquakes, fire, flood) and should be provided with adequate physical protection or have proper backup.... database Security Shakeel [Pick the date] Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed....
4 Pages (1000 words) Essay

Data Base Directives

For the qualification for the "sui generis" Database protection rights, the producer of the database must prove that there has been a significant qualitatively and quantitatively investment in either the acquiring, authentication or management of the contents.... Usually only original or creative expressions were protected under the protection for collections of facts.... This made all the more difficult for producers of databases which have pure factual information to protect their databases from third parties copying their database. Collections of facts being made available electronically as databases are prevalent, creators of these databases are claiming on a need to provide adequate legal protection in order to protect their hoards....
4 Pages (1000 words) Essay

The Role of Personal Selling within the Overall Marketing Strategy

The author of this term paper "The Role of Personal Selling within the Overall Marketing Strategy" describes personal selling as a very crucial component of the promotional mix as a promotional tool.... It is regarded as a flexible tool for personal communication.... hellip; The roles of personal selling: prospecting by trying to search for find new customers; communicating with the existing and potential customers in relation to the product range; and selling of the products by persuading a customer to purchase the products; gathering of information with regard to the market to feedback into the process of marketing planning....
10 Pages (2500 words) Term Paper

Analysis of Database Security

Data security systems incorporate the protection of data's disclosure to increase its safety, protection from unauthorized personnel, and the accessibility and recovery of data after malicious activities.... he best way to ensure the protection of data is by limiting is access maximally through the creation of passwords and usernames.... The paper "Analysis of database Security " describes that Nathan Aaron states that most people value database security since they ensure that the data is secured, confidential, and maintains its integrity....
11 Pages (2750 words) Annotated Bibliography

Database Administrator for Department Store

The departmental stores retail expansion creates the need for an enterprise-wide relational database model more specifically to manage the projected increase in sales as the resultant effect of the current marketing strategy.... The objective of this paper is to design a database… In designing, the database several necessary steps, procedures and precautions will be considered as the database should be employed to support both the accuracy, The data model should also help the various retail offices communicate....
12 Pages (3000 words) Essay

Potential Threats to the Database

This research will begin with the statement that a database is a collection of interrelated files.... Presently all the corporations run their business through the database technology.... hellip; This paper presents a detailed analysis of the potential threats to the database as well as ways of ensuring database security.... In this scenario, a threat is some kind of situation that can badly affect the database system and the data inside it....
5 Pages (1250 words) Case Study

Human Resource Information System for Institutional Fund Services

… 2910.... - Schedule feasibility2910.... .... - System Development Milestones2910.... .... - WBS- Work Breakdown Structure3010.... .... - Table of Time Schedule3210.... .... - MS Project Gannet Chart333310.... .... Network Diagram34Bibliography351- Project TitleHuman Resource 2910.... - Schedule feasibility2910....
18 Pages (4500 words) Essay

Improvement of Data Quality

The protection of databases is therefore important in ensuring that intentional errors are not made on the data (Berndt et al.... hellip; Once the database has been created, it is important to protect that data from unauthorized access.... This is because some people may access that data and make intentional errors on the data and this may create errors in the database.... Before this data is used or saved in the database, it should be cross-checked to ensure that there is no missing data....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us