Essay on "Contract Law Legal Ethical and Social Issues in Computing"

Essay 7 pages (2193 words) Sources: 0 Style: MLA

[EXCERPT] . . . .

Contract Law (Legal, Ethical & Social Issues in Computing)

Contract Law

The contemporaneous society is evolving at a rapid pace and most of the emergent changes are derived from the technological background. The hi-tech innovations play a pivotal part in the way we now live our lives and the domain is subjected to numerous modifications. One particular change affecting the it industry relates to the legislation that governs it. This was rather scarce in the beginning, but efforts have been made to improve the legal standards of conducing it operations and using it products.

Despite the steps made in the direction of better legislating Information Technology, breaches still occur. The most common breaking of law in it refers to piracy, or the unauthorized usage of software products. The need to answer to this problem has generated endless debates between it moguls, some beginning to charge more for their products, whilst others starting to create their products in open source code. Reverse engineering, however not considered equal to piracy, has also generated disputes.

The federal and administrative powers have increased their efforts to regulate the field and their most outstanding result was the composition of the Principles of the Law of Software Contracts. The aim of this paper is to analyze the specifications in the document relative to reverse engineering. Otherwise put, the paper will assume the situation of a software producer which stated in his contracts to providers that he bans all forms of reverse engineering. The question at the basis of the analysis is "Under what conditions should a customer or researcher or jo
Continue scrolling to

download full paper
urnalist be allowed to reverse engineer a computer program?"

2. Outline of Analysis and Arguments

In answering the question posed in the previous section, various sources will be used. Some of the sources cite articles in law journals and other speciality journals. The American Law Institute will also be addressed. Finally, websites will be looked at.

The first step in addressing the issue identified in the abstract is that of properly understanding the concept of reverse engineering. Once this is achieved, the analysis will move to explore to effects of RE upon various categories of stakeholders, such as organizational employees, business partners, customers or stockholders.

With the bases of the study having been set, the paper will continue by revealing the legislative stipulations in relation to reverse engineering. Given that the legislation is still unable to perfectly regulate the system, its application will be best revealed by a look at three real cases which appeared before the court. Their results are different and based on the particular circumstances of each situation.

A full comprehension of the topic will be achieved with the analogy between software RE and two other scenarios. The findings indicate that while reverse engineering is often frowned upon, it is a necessary means of achieving development in the it industry. The paper comes to an end with a section on conclusions and recommendations.

3. Stakeholders

Reverse engineering affects a wide variety of individuals, which interact with the company, affect the company or are affected by it. However, before being able to identify the categories of stakeholders and the roles they play in reverse engineering, one should first clearly comprehend the concept. In a simplistic formulation, reverse engineering refers to the thorough analysis of a product, with the purpose of becoming accustomed with the principles at its basis. Once this is achieved, the individual will proceed to creating a new item, which does not copy the specifications in the initial program, but is based on its underlying concepts. Pamela Samuelson and Suzanne Scotchmer define reverse engineering as "the process of extracting know-how or knowledge from a human-made artefact." A more complex definition is offered by Patricia Zimmermann. She states that "reverse engineering dismantles technologies like cars or computer codes to understand how their parts articulate. It cracks codes and invents new forms, always emphasizing building something new out of the structures of the old."

Various categories of stakeholders are influenced in the process of reverse engineering. A first such category is composed of the organizational employees, who strive to create the initial software application. Their efforts are disconsidered when a new product based on their ideas is launched within the market. Foremost, since the company may lose its competitive edge, employees could face the risks of losing their jobs. Then, as the product obtained through reverse engineering would generate additional competition, sales could decrease and negatively affect the overall profitability. This would harmfully impact the stakeholders, who would retrieve fewer financial benefits. Also, business partners could lose their trust in the organization who has failed to protect itself. The effects upon the customer seem however positive as he would get access to a wider product palette and, given the increased competition, the products available within the market would enjoy superior quality and lower retail prices.

4. The Legislation

The laws relative to reverse engineering are rather blurry. The Principles of the Law of Software Contracts state that it is up to the partners (buyer and seller of a software product) to establish the rights or bans on reverse engineering. They reach a common understanding and stipulate it in the intellectual rights contract they sign. In case the contract is broken, the courts decide each case based on the evidence, circumstances and other issues.

Considering that the parties agree to sign a contract prohibiting reverse engineering, this may be simply due to the reason that the seller of the software application wants to protect the secrecy of its source code. The stipulation is not generically included in the general contract, but is stipulated in an additional clause to the original contract. The Digital Millennium Copyright Act generally agrees with the bans on reverse engineering, stating that these are only invalid when the purpose of RE "has been found fair under the copyright case law."

Foremost, the clause banning reverse engineering may be pre-empted if the subject of RE is not a patented product. The main reasons for this decision revolve around the belief that reverse-engineering plays a major role in the development of the it community: it stimulates developers to increase their performances; and it generates competition, which helps with both quality and price of the software applications. The American Supreme Court seemed to agree with this and often ruled in favour of RE to stimulate the sustained growth and development of industries. Foremost, the Congress has even rendered laws that clearly allow RE. The most relevant example in this sense is the Semiconductor Chip Protection Act, which offers a privilege to study the conductors and integrate the acquired knowledge into the development of new chips.

The Principles of the Law of Software Contracts state: "Under copyright law, it is fair use to engage in reverse engineering to develop an independently created computer program that interoperates with the one reverse engineered if the requisite compatibility information is not available otherwise."

Across the globe, the laws relative to reverse engineering vary. They are generally most prohibited in the United States, whereas other countries are more permissive and do consider RE noninfringing. The approach taken by each state depends directly on its levels of development.

5. The Cases

As it has been stated in the previous sections, the legislation in terms of reverse engineering has evolved and the practice is generally encouraged as a means of development. In the it industry however, the actual laws are scarcer and the disputes often end up in courts.

Brooktree Corp vs. Advanced Micro Devices Inc.: The first of the reverse engineering cases to reach the court room occurred in 1989, when Brooktree Corp sued Advanced Micro Devices Inc. The accusations revolved around the fact that Advanced had thoroughly studied and copied 23 up to 30% of Brooktree's colour graphics palette chip. They argued that this in fact represented the core of their product. The judge seemed in favour of Advantage and believed that there were major differences between the two products. Despite this however, the jury ruled in favour of Brooktree Corp.

Creative Technology Ltd. Vs. Aztech Systems PTE Ltd.: Creative Technology had launched the Sound Blaster PC Sound Card. Aztech wanted to produce a similar product and with this aim, they purchased and studied Creative's gadget. The resulting product, a competing substitute of the Sound Blaster, was only 4% identical with the initial one, but the comparison of the two indicated that the latter was achieved by copying some elements of the first. The court ruled infringement had occurred on the part of Aztech Systems PTE Ltd.

News Datacom Ltd. Vs. Satellite Decoding Systems: The object of the case was a Smart Card with a chip and a software application. It was initially launched by News Datacom and Satellite Decoding had launched a similar product, based on the same functions. News Datacom was unable to provide evidence of reverse engineering on the smart card and argued that the complexity of the device was the reason for it. However, the… READ MORE

Quoted Instructions for "Contract Law Legal Ethical and Social Issues in Computing" Assignment:

Essay MUST list references (the 6 required references, plus "the Principles of the Law of Software Contracts") and at least coherently outline my analysis and arguments.( ***I will send "The Principles of the Law of Software Contracts" via email***)

I ordered 7 pages essay. So one of 7 pages should be coherently outline my analysis and arguments. (essay-6 pages, outline-1 page)

****specification of essay*****************(start)

Essay 1*****”Contract Law

The American Law Institute is completing a legislative drafting project that began in 1990, yielded a failing legislative proposal (Uniform Computer Information Transactions Act) in 2000, and (hopefully) finally morphed into the Principles of the Law of Software Contracts. The semi-final draft of the Principles is on our website. (***I will send the principles via email***)

Your task is to review the Principles and consider the below issue considered in the Principles:

*****¢ Under what conditions should a customer or researcher or journalist be allowed to reverse engineer a computer program? In your discussion, you should assume that the publisher of the software has included a clause in its contract that specifically bans all types of reverse engineering.

Research required:

(a) Search the ACM Portal (ACM Digital library) and/or the IEEE Electronic library to find at least two peer-reviewed articles that address the issue you have selected.

(b) Find at least one recent Law Review article and at least three recent court cases that addresses the issue you have selected

You are welcome to read additional sources, but these six are required.

Do not attempt to read the entire draft of the Principles. Analyzing this document could take a competent lawyer over 100 hours. However, you should be familiar with the most relevant section(s) of the Principles (and if necessary, of UCITA)

When you've considered that question carefully, please write an essay, 1500 to 2000 words, in exactly the form described below.

A Word about References: Whenever you use other people's ideas or words, you must give credit where credit is due. If you borrow words or ideas substantially from a web site or other sources, you have to acknowledge that use by citing your sources.

To cite a source, carefully describe where your reader could find the source. For each website you cite, include the URL, the title of the site (if available), the date you accessed it, and the date it was last updated (if available), and (if available) the author. If no author is listed, but an organization is listed, then list that organization. If you reference books or periodicals, use whatever style

reference you are most comfortable with. (IEEE, MLA and APA have good standards - any of those are fine.) In addition to identifying your primary sources, if you use someone else's words or ideas anywhere in your paper, you should indicate that use with quotes or with a paragraph set off with indentations and blank lines. Always advertise your sources and use complete endnotes. (One good source is The Little Brown Handbook, 2nd Edition, by H. Ramsey Fowler. Endnotes are discussed on pages 480-489.) To not cite your sources risks the serious charge of plagiarism.

Your citations do not count in the 2000-maximum word limit for the essay.

Structure:

Your paper should be written in six sections. Give each of these sections the title shown below in bold face. Skip a line between each section. Here are the sections:

Section I. Names: The first thing in this section should be your name. On the next line, name the course, the assignment (Essay 1), and the title of your essay. These four items should appear on separate lines, single spaced.

Section II. Stakeholders: In this section,

(a) list the relevant stakeholders affected by this proposal and briefly explain why each is a stakeholder.

(b) for each stakeholder, identify what they value in this proposal (you can address their principles or their self-interest here)

(c) for each stakeholder, describe the impacts of this proposal on them*****”there will often be positive and negative impacts. Identify both types and conclude whether, on balance, this proposal is better for the stakeholder or worse.

Section III. The Legal Analysis

What is the law? If you are not sure, explain what you think the law might be (the most likely alternatives). In either case, support your conclusion with references.

What do you think of the legal arguments? (Support your reasoning with references that address the legal issues/history along with the stakeholder considerations)

Analogies. Legal arguments are often best made with analogies.

Use an analogy to support one of your conclusions. State explicitly what you would prefer as the legal conclusion and then develop an analogy that you think supports that recommendation.

Sources you might want to read about analogies:

o http://www.buttecollege.com/services/student/cas/tipsheetsys/01-50/044.html

o http://www.epcc.edu/faculty/joeo/sa_analogy.htm

o http://hodu.com/analogies.shtml

Remember that using an analogy effectively requires more than just a statement. You must explain how the situations/activities are the same, and how they are different. When you make an ethical argument based on an analogy (as you will in this and the next section), you should examine and illustrate the ethical DIFFERENCES between two situations, and the ethical

SIMILARITIES between two situations. Then you also have to explain the ethical significance of these differences and similarities. Finally, you need to explain why, on balance, this analogy supports the rightness of the recommendation. Whatever analogy you decide to focus on should illuminate the ethical issue.

By building this analogy, you are not committing yourself personally to the position; instead, you are creating an intellectual argument that supports that position.

I am looking for clear thinking in this and subsequent papers. Clear thinking is revealed in clear writing. Spelling, grammar, and style all count. Follow the instructions above carefully.

****************************************************(end) *****

How to Reference "Contract Law Legal Ethical and Social Issues in Computing" Essay in a Bibliography

Contract Law Legal Ethical and Social Issues in Computing.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280. Accessed 3 Jul 2024.

Contract Law Legal Ethical and Social Issues in Computing (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280
A1-TermPaper.com. (2009). Contract Law Legal Ethical and Social Issues in Computing. [online] Available at: https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280 [Accessed 3 Jul, 2024].
”Contract Law Legal Ethical and Social Issues in Computing” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280.
”Contract Law Legal Ethical and Social Issues in Computing” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280.
[1] ”Contract Law Legal Ethical and Social Issues in Computing”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280. [Accessed: 3-Jul-2024].
1. Contract Law Legal Ethical and Social Issues in Computing [Internet]. A1-TermPaper.com. 2009 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280
1. Contract Law Legal Ethical and Social Issues in Computing. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/contract-law-legal-ethical/4926280. Published 2009. Accessed July 3, 2024.

Related Essays:

Issues in a Project Computing Ethics Essay

Paper Icon

It Ethics

Legal, Ethical, and Social Issues Facing Data Storage and Information Systems: A Hypothetical Case Study

Information technology often seems, especially in some of its more mundane business applications,… read more

Essay 6 pages (1640 words) Sources: 8 Topic: Business / Corporations / E-commerce


Legal Issues With the Use of Open Source Software in Government and EU Public Service Term Paper

Paper Icon

EU Open Source Software

Legal Implications for European Union Governments

The Use of Open Source Software in Government and EU Public Service

Current EU Software Policy: Any Directives, Regulations, Whitepapers… read more

Term Paper 25 pages (6964 words) Sources: 1+ Topic: Computers / IT / Internet


Security Issues of Online Communities Term Paper

Paper Icon

Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more

Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet


Addressing the Issue of Medical Errors With Mandatory Reporting Systems and Computer Technology Term Paper

Paper Icon

Healthcare: Addressing the Issue of Medical Errors

Healthcare

Addressing the Issue of Medical Errors with Mandatory

Reporting Systems and Computer Technology

To combat the current crisis of deaths due to… read more

Term Paper 30 pages (8204 words) Sources: 1+ Topic: Healthcare / Health / Obamacare


Corporate Social Responsibilities Term Paper

Paper Icon

responsibility of companies has historically been defined in purely economic terms. For example, Friedman (1990) considered maximization of shareholder wealth as being the sole objective and responsibility of a well-managed… read more

Term Paper 35 pages (9542 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!