2) Software piracy is bad for business. 2) Answer: True False

Size: px
Start display at page:

Download "2) Software piracy is bad for business. 2) Answer: True False"

Transcription

1 Exam Name TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Advances in data storage have made routine violation of individual privacy more difficult. 1) 2) Software piracy is bad for business. 2) 3) Most companies in North America have computer usage policies that tell employees to use only software that has been properly leased or purchased. 4) In today s new economic environment, managers who violate the law and are convicted will most likely spend time in prison. 5) Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. 3) 4) 5) 6) Ethical, social, and legal or political issues are not linked. 6) 7) The major ethical, social, and political issues raised by information systems include property rights and obligations. 8) The major ethical, social, and political issues raised by information systems include accountability and control. 9) Professionals take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. 10) The major ethical, social, and political issues raised by information systems include informed consent. 11) One of the four key technological trends responsible for ethical stresses is that computing power doubles every 18 months. 12) One of the four key technological trends responsible for ethical stresses is networking advances and the Internet. 7) 8) 9) 10) 11) 12) 13) One of the four key technological trends responsible for ethical stresses are the use of iphones. 13)

2 14) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called spoofing. 15) Nonobvious relationship awareness (NORA) is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships. 16) Ethics are principles of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behaviour. 14) 15) 16) 17) Responsibility is a very minor element of ethical action. 17) 18) Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations. 18) 19) Liability extends the concept of responsibility further to the area of laws. 19) 20) Golden Rule Ethical principle states Do unto others as you would have them do unto you. 20) 21) Descartes rule of change categorical imperative is a principle that states that if an action is not right for everyone to take, it is not right for anyone. 22) Risk aversion principle states that one should take the action that produces the least harm or incurs the least cost. 23) Many companies monitor what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities. 24) The claim to privacy is protected in the Canadian, U.S., and German constitutions in a in exactly the same way and in other countries through various statutes. 25) Right now Quebec, Ontario and Alberta are the only provinces with privacy laws for the private sector that meet European Union standards. 26) In 2000, Parliament passed the Personal Information Protection and Electronic Documents Act (PIPEDA), Canada s modern privacy law. 27) In Europe, privacy protection is much more accommodating than in many non-european countries. 21) 22) 23) 24) 25) 26) 27)

3 28) A safe harbour is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. 28) 29) Web sites use "cookies" in order to obtain the names and addresses of their visitors. 29) 30) A cookie is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. 31) Spyware is software that comes hidden in downloaded applications and can track your online movements. 30) 31) 32) Most Internet businesses do very little to protect the privacy of their customers. 32) 33) P3P encrypts or scrambles or data so that it cannot be read illicitly. 33) 34) Protection for trade secrets is enforced at the federal level. 34) 35) Copyright is the legal protection afforded intellectual property, such as a song, book, or video game. 35) 36) The Copyright Office began registering software programs in the 1990s. 36) 37) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their manifestation in a product. 38) According to the courts, in the creation of software, unique concepts, general functional features, and even colours are protectable by copyright law. 39) The key concepts in patent law's determination of nonobviousness are originality, novelty, and value. 40) Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime. 37) 38) 39) 40) 41) Spam is unsolicited . 41)

4 42) The European Parliament has passed a ban on unsolicited commercial messaging. 42) 43) RSI is unavoidable for a computer keyboard worker. 43) 44) Technostress is a computer-related malady whose symptoms include fatigue. 44) 45) Radiation from computer display screens has been proved to be a factor in CVS. 45) MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 46) Information systems 46) A) raise the same ethical questions created by the industrial revolution. B) pose traditional ethical situations in new manners. C) raise new ethical questions. D) raise ethical questions primarily related to information rights and obligations. 47) In today s new legal environment, managers who violate the law and are convicted will most likely A) pay a fine and get probation. B) pay a fine. C) get probation. D) spend time in prison. 48) Doors Inc. has just developed a new software that helps put in state of the art manufacturing techniques into plants. A quick search of the Internet reveals that another company in China already has a copy of their software that has not yet been put on the market. The moral dimension best described by this scenario is A) accountability and control. B) information rights and obligations. C) quality of life D) property rights and obligations. 49) Mary telecommutes with her head office in downtown Toronto. She finds that she is working longer hours at home than she did at the office. Her work day starts as soon as she gets out of bed as she checks her e-mal and responds to it. She is also finding that she stays on the computer long after supper in the evening as she ties up loose ends from the previous day's work. The moral dimension best described by this scenario is A) property rights and obligations. B) accountability and control. C) information rights and obligations. D) quality of life 50) Food Inc. operates a website for their firm. They ask visitors to the website to give information such as name, , address, DOB, etc. Food Inc has found that they can sell this information to outside marketing groups for a lot of money. They are in the process of deciding if they should sell their customers information. The moral dimension best described by this scenario is A) accountability and control. B) property rights and obligations. C) information rights and obligations. D) quality of life 47) 48) 49) 50)

5 51) "Free is Me" is a software company sells software that is a file sharing software. Once downloaded, the software customers can download movies, music, and software programs for free. If these goods were purchased at a store they would cost anywhere from ten dollars to several hundred dollars. This is great way to get all this stuff for free. The moral dimension best described by this scenario is A) property rights and obligations. B) quality of life C) information rights and obligations. D) accountability and control. 52) Mary has found a way to get access to her school's grading database. She determines that she can change her own grades to a higher level without getting caught. She decides not to because she feels she wouldn't want someone to access her information and change things without permission so she won't do that to others. The ethical principle best described by this scenario is A) the golden rule. B) the utilitarian principle. C) the Immanuel Kant's categorical imperative. D) the risk aversion principle Answer: A 53) John has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level without getting caught. He decides not to because he feels this would not be right if everyone did this so it is not right that he alone should do it. The ethical principle best described by this scenario is A) the golden rule. B) the Immanuel Kant's categorical imperative. C) the risk aversion principle D) the utilitarian principle. 54) Ben has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level without getting caught. He decides not to because he feels he needs to choose between earning a grades or a lesser value choice of stealing a grade or getting something for nothing. He will choose the higher value choice and not changing the grade. The ethical principle best described by this scenario is A) the golden rule. B) the risk aversion principle C) the utilitarian principle. D) the Immanuel Kant's categorical imperative. 55) Fred has found a way to get access to his school's grading database. He determines that he can change his own grades to a higher level but there is a chance he might get caught. He decides not to change his grade because if he gets caught he will get kicked out of school and not be able to go to college. The ethical principle best described by this scenario is A) the Immanuel Kant's categorical imperative. B) the golden rule. C) the risk aversion principle D) the utilitarian principle. 51) 52) 53) 54) 55) 56) Right now is the only province with privacy laws for the private sector that meet Eur opean

6 Union standard s. 56) A) Ontario B) Alberta C) Nova Scotia D) Quebec 57) Barb is buying a book online. They are asking her to give them a large amount of personal information before she is able to buy the book. The book site describes what will happen with the information and they also provide a way for Barb to ask them to collect no more data on her. The principle best described by this scenario is A) liability B) safe harbor C) due process D) informed consent 58) Books Inc. sell books at their website. They have a policy towards their customer privacy of self-regulating. Their policy meets all the government regulation and legislation but does not involve government regulation or enforcement. The principle best described by this scenario is A) informed consent B) liability C) due process D) safe harbor 59) Books Inc. sell books at their website. They have a policy of putting tiny files on their clients computers to track visits to their site. This tiny program can customize the clients next visit to Books Inc. site. This tiny files is a. A) cracker B) cookie C) biscuit D) web bug 60) Orange Computers sell software at their website. They have a policy of putting secret software on their clients computers when they install the actual software which they purchase from Orange Computers. This secret software calls out to other websites to send banner ads and other unsolicited material to the user. This secret software is. A) a web bug B) illegal C) a cookie D) spyware 61) Software is protected from being stolen, replicated and sold by anyone but the owner of the software or those given his permission by what law? A) Canadian property law B) Canadian copyright law C) Canadian patent law D) there is no legal protection 57) 58) 59) 60) 61) 62) The introduction of new information technology has a 62) A) dampening effect on the discourse of business ethics. B) ripple effect raising new ethical, social, and political issues. C) waterfall effect in raising ever more complex ethical issues. D) beneficial effect for society as a whole, while raising dilemmas for consumers. 63) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of A) accountability and control. B) information rights and obligations. C) property rights and obligations. D) system quality. 63)

7 64) In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of A) property rights and obligations. B) family and home. C) system quality. D) quality of life. 65) The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4). A) networking advances and the Internet B) international standards for data protection C) advances in wireless networking D) increased ease in file sharing and copying Answer: A 64) 65) 66) Advances in data storage techniques and rapidly declining storage costs have 66) A) doubled every 18 months. B) made universal access possible. C) been accompanied by relevant federal statutes protecting personal data. D) made routine violations of privacy cheap and effective. 67) The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) targeting. B) spamming. C) phishing. D) profiling. 67) 68) NORA is a 68) A) new data analysis technology that finds hidden connections between data in disparate sources. B) profiling technology used by the EU. C) federal privacy law protecting networked data D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives. Answer: A 69) Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise? A) accountability and control B) information rights and obligations C) property rights and obligations D) system quality 69) 70) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as 70) A) due process. B) accountability. C) liability. D) responsibility. 71) The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as A) responsibility. B) due process. C) accountability. D) liability. 71)

8 72) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called A) the courts of appeal. B) due process. C) the judicial system. D) accountability. 73) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called A) due process. B) accountability. C) the courts of appeal. D) liability. Answer: A 74) Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? A) identify the stakeholders B) identify the options you can reasonably take C) assign responsibility D) identify and clearly describe the facts 75) A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A) The "No free lunch" rule B) Kant's Categorical Imperative C) The Golden Rule D) The Risk Aversion Principle 76) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is A) wrong, because the man would not want the grocery to steal from him. B) wrong, because if everyone were to do this, the concept of personal property is defeated. C) acceptable, because the higher value is the survival of the family. D) acceptable, because the grocer suffers the least harm. 72) 73) 74) 75) 76) 77) Immanuel Kant's Categorical Imperative states that 77) A) if an action is not right for everyone to take, it is not right for anyone to take. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if an action cannot be taken repeatedly, then it is not right to be taken at any time. Answer: A 78) The ethical "no free lunch" rule states that 78) A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) everything is owned by someone else, and that the creator wants compensation for this work. D) one can put values in rank order and understand the consequences of various courses of action.

9 79) The ethical rules discussed in the textbook 79) A) do not allow for competing values. B) cannot be guides to actions. C) are based on political philosophies. D) cannot be applied to many e-commerce situations. 80) FIP principles are based on the notion of the 80) A) privacy of the individual. B) accountability of the record holder. C) mutuality of interest between the record holder and the individual. D) responsibility of the record holder. 81) European privacy protection is than in the United States. 81) A) less liable to laws B) less far-reaching C) much less stringent D) much more stringent 82) U.S. businesses are allowed to use personal data from EU countries if they 82) A) have informed consent. B) develop equivalent privacy protection policies. C) make their privacy protection policies publicly available. D) create a safe harbor. 83) When a cookie is created during a Web site visit, it is stored 83) A) on the visitor's computer. B) on the ISP's computer. C) in a Web directory. D) on the Web site computer. Answer: A 84) The Online Privacy Alliance 84) A) has established technical guidelines for ensuring privacy. B) is a government agency regulating the use of customer information. C) protects user privacy during interactions with Web sites. D) encourages self-regulation to develop a set of privacy guidelines for its members. 85) A(n) model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected. A) opt-in B) PGP C) opt-out D) P3P 85) 86) P3P stands for 86) A) Platform for Privacy Preferences. B) Privacy for Personal Protection. C) Personal Privacy Protection. D) Personal Privacy Policy. Answer: A 87) The P3P standard is concerned with 87) A) blocking or limiting cookies.

10 B) allowing users to surf the Web anonymously. C) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information. D) scrambling data so that it can't be read. Answer: A 88) The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when A) the software is widely distributed. B) hackers are able to break into the source code. C) the courts become involved. D) a new version of the software is released. Answer: A 88) 89) Intellectual property can best be described as 89) A) unique creative work or ideas. B) the expression of an intangible idea. C) tangible or intangible property created from a unique idea. D) intangible property created by individuals or corporations. 90) What legal mechanism protects the owners of intellectual property from having their work copied by others? A) patent protection B) intellectual property law C) Fair Use Doctrine D) copyright law 90) 91) "Look and feel" copyright infringement lawsuits are concerned with 91) A) the distinction between tangible and intangible ideas. B) using the creative elements of another product. C) the distinction between an idea and its expression. D) using the graphical elements of another product. 92) The strength of patent protection is that it 92) A) puts the strength of law behind copyright. B) grants a monopoly on underlying concepts and ideas. C) allows protection from Internet theft of ideas put forth publicly. D) is easy to define. 93) One of the difficulties of patent protection is 93) A) that only the underlying ideas are protected. B) the years of waiting to receive it. C) preventing the ideas from falling into public domain. D) digital media cannot be patented. 94) Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials? A) Freedom of Information Act B) Digital Millennium Copyright Act 94)

11 C) Privacy Act D) Electronic Communications Privacy Act 95) In general, it is very difficult to hold software producers liable for their software products when those products are considered to be A) services. B) artistic expressions. C) part of a machine. D) similar to books. 95) 96) are not held liable for the messages they transmit. 96) A) Private individuals B) Organizations and businesses C) Regulated common carriers D) Elected officials 97) It is not feasible for companies to produce error-free software because 97) A) any software of any complexity will have errors. B) errors can be introduced in the maintenance stage of development. C) any programming code is susceptible to error. D) it is too expensive create perfect software. 98) The most common source of business system failure is 98) A) data quality. B) hardware or facilities failures. C) software bugs. D) software errors. Answer: A 99) Which of the following is not one of the three principal sources of poor system performance? 99) A) hardware or facility failures caused by natural or other causes. B) insufficient integration with external systems. C) software bugs and errors D) poor input data quality. 100) The "do anything anywhere" computing environment can 100) A) centralize power at corporate headquarters. B) make work environments much more pleasant. C) blur the traditional boundaries between work and family time. D) create economies of efficiency. 101) The practice of spamming has been growing because 101) A) it is good advertising practice and brings in many new customers. B) it helps pay for the Internet. C) telephone solicitation is no longer legal. D) it is so inexpensive and can reach so many people. 102) The U.S. CAN-SPAM Act of ) A) has dramatically cut down spamming. B) does not override state anti-spamming laws. C) requires spammers to identify themselves. D) makes spamming illegal.

12 103) Which of the five moral dimensions of the information age does spamming raise? 103) A) accountability and control B) information rights and obligations C) quality of life D) system quality 104) Re-designing and automating business processes can be seen as a double-edged sword because 104) A) increases in efficiency may be accompanied by poor data quality. B) support for middle-management decision making may be offset by poor data quality. C) reliance on technology results in the loss of hands-on knowledge. D) increases in efficiency may be accompanied by job losses. 105) The term " divide" refers to large disparities in access to computers and the Internet among different social groups and different locations. A) computer B) electronic C) digital D) technology 105) 106) CVS refers to 106) A) carpal vision syndrome. B) wrist injuries brought about by incorrect hand position when using a keyboard. C) eyestrain related to computer display screen use. D) stress induced by technology. 107) can be induced by tens of thousands of repetitions under low-impact loads. 107) A) RSI B) technostress C) CVS D) CTS Answer: A SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 108) The principles of right and wrong that can be used by individuals acting as free moral 108) agents to make choices to guide their behaviour are called. Answer: ethics 109) issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. Answer: Ethical 110) is the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals. Answer: Profiling 111) is technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships. Answer: Nonobvious relationship awareness (NORA) 109) 110) 111) 112) extends the concept of responsibility further to the area of laws. 112) Answer: Liability 113) The ethical principle that states Do unto others as you would have them do unto you. is the.

13 113) Answer: Golden Rule 114) "If an action cannot be taken repeatedly, it is not right to take at all " describes the ethical principal of rule of change. escartes 115) Many companies what their employees are doing on the Internet to prevent them from wasting company resources on nonbusiness activities. Answer: monitor 116) The claim to is protected in the Canadian, U.S., and German constitutions in a variety of different ways and in other countries through various statutes. Answer: privacy 117) Every Canadian province and territory has enacted parallel to the federal Privacy Act and the Access to Information Act. Answer: legislation 118) Right now is the only province with privacy laws for the private sector that meet European Union standards. Answer: Quebec 119) In Europe, privacy protection is much more than in many non-european countries. Answer: stringent 120) can be defined as consent given with knowledge of all the facts needed to make a rational decision. Answer: Informed consent 121) A is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement. Answer: safe harbour 114) 115) 116) 117) 118) 119) 120) 121) 122) The Platform for Privacy Preferences, known as. 122) Answer: P3P 123) property is considered to be intangible property created by individuals or corporations. Answer: Intellectual 124) Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on. Answer: networks 125) is a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose for a period of at least 50 years. opyright 123) 124) 125) 126) Copyright law in Canada is one of the principal means of protecting computer in Canada.

14 126) Answer: software 127) The Internet was designed to information freely around the world, including copyrighted information. Answer: transmit 128) services such as Napster, and later Grokster, Kazaa, and Morpheus, sprung up to help users locate and swap digital music files, including those protected by copyright. Answer: File sharing 129) Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is. Answer: data quality 130) The now-more-efficient global marketplace has reduced the normal social buffers that permitted businesses many years to adjust to. Answer: competition 131) The danger to ubiquitous computing, telecommuting, nomad computing, and the do anything anywhere computing environment is that the traditional boundaries that work from family and just plain leisure will be weakened. Answer: separate 132) Internet use, even for entertainment or recreational purposes, takes people away from their family and friends. Answer: Extensive 133) in particular has been on the rise as bullies become more creative in their use of the Internet to humiliate their peers. yberbullying 134) is the commission of illegal acts through the use of a computer or against a computer system. omputer crime 135) has mushroomed because it costs only a few cents to send thousands of messages advertising wares to Internet users. Answer: Spamming 136) The describes large disparities in access to computers and the Internet among different social groups and different locations. Answer: digital divide 137) is a type of RSI in which pressure on the median nerve through the wrist s bony carpal tunnel structure produces pain. Answer: (CTS) Carpal tunnel syndrome 127) 128) 129) 130) 131) 132) 133) 134) 135) 136) 137) 138) refers to any eyestrain condition related to computer display screen use. 138) omputer vision syndrome (CVS) 139) The role of from computer display screens in occupational disease has not been proved.

15 139) Answer: radiation 140) The model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. Answer: opt-in 141) is the commission of acts involving a computer that may not be illegal but are considered unethical. omputer abuse 142) Although some people enjoy the convenience of working at home, the do anything anywhere computing environment can blur the traditional between work and family time. Answer: boundaries 143) The development of information technology will produce for many and costs for others. Answer: benefits 144) The liberties that individuals and organizations have with respect to data pertaining to themselves describe the moral dimension of. Answer: information rights 145) Accepting the potential costs, duties, and obligations for the decisions one makes is called. Answer: responsibility 146) refers to the existence of laws that permit individuals to recover damages done to them by other actors, systems, or organizations. Answer: Liability 147) The ethical principle called states that one should take the action that produces the least harm or incurs the least cost. Answer: the Risk Aversion Principle 148) is permission given with knowledge of all the facts needed to make a rational decision. Answer: Informed consent 149) A(n) is a tiny graphic file embedded in messages and Web pages that is designed to monitor online Internet user behaviour. Answer: web bug 150) The model prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. Answer: opt-in 151) A(n) grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. Answer: patent 140) 141) 142) 143) 144) 145) 146) 147) 148) 149) 150) 151)

16 152) The commission of acts involving the computer that may not be illegal but are considered unethical is called. Answer: computer abuse 152) ESSAY. Write your answer in the space provided or on a separate sheet of paper. 153) List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will be the most difficult for society to deal with? Support your opinion. Answer: The five moral dimensions are: 1. Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? 2. Property rights. How can intellectual property rights be protected when it is so easy to copy digital materials? 3. Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? 4. System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? 5. Quality of life. What values should be preserved? What institutions must we protect? What cultural values can be harmed? Individual answers for determining the most difficult for society to deal with will vary. One answer might be: Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different cultural and ethnic groups, such as the United States. It is difficult to regulate concerns that are based on subjective values. 154) Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one. Answer: Key technology trends include the following: (1) Computer power doubling every 18 months: ethical impact - because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse; (2) Data storage costs are rapidly declining: ethical impact - it is easy to maintain detailed databases on individuals -- who has access to and control of these databases?; (3) Data analysis advances: ethical impact - vast databases full of individual information may be used to develop detailed profiles of individual behaviour; and (5) Networking advances and the Internet: ethical impact - it is easy to copy data from one location to another. Who owns data? How can ownership be protected? 155) What are the steps in conducting an ethical analysis? Answer: The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options. 156) List and define the six ethical principles discussed in your text. Answer: The six ethical principles are the Golden Rule, Kant's Categorical Imperative, Descartes' rule of change (slippery slope), the Utilitarian Principle, the Risk Aversion Principle, and the "no free lunch" rule. The Golden Rule proposes: do unto others as you would have them do unto you. Immanuel Kant's Categorical Imperative proposes, if an action is not right for everyone to take, it is not right for anyone. Descartes' rule of change says: If an action cannot be taken repeatedly, it is not right to take at all. The Utilitarian Principle is: Take the action that achieves the higher or greater value. The Risk Aversion Principle is: Take the action that produces the least harm or the least potential cost. The ethical no free lunch rule says: Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise.tangible objects are owned by someone else unless there is a specific declaration otherwise.

17 157) Do you believe that professional groups should be allowed to assign their own professional codes of conduct and police themselves from within? Why or why not? Answer: This is an opinion question, but anyone who aspires to management will consider himself or herself a professional and will need to have a clear understanding as to how he or she feels about this matter. With the recent scandals in large business firms, which have devastated our economy, there is likely to be a cry for legally sanctioned codes and outside regulatory agencies. 158) What are the major issues concerning privacy in the information age? Do you believe the need for a country's security should overrule some of the personal privacy and information rights we have previously taken for granted? Why or why not? Answer: One answer might be that we should depend upon the Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy. 159) How does a cookie work? Answer: A cookie works as follows: A user opens a Web browser and selects a site to visit. The user's computer sends a request for information to the computer running at the Web site. The Web site computer is called the server, since it allows the user's computer to display the Web site. At the same time it sends a cookie a data file containing information like an encrypted user ID and information about when the user visited and what he did on the site. The user's computer receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the Web site, the server running the site retrieves the cookie to help identify the user. 160) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? Answer: Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. These concepts are related as follows: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in hard to another, I will be held by law to reparations for those actions (liability). 161) What do you consider to be the primary ethical, social, and political issues regarding information system quality? Answer: The central quality-related ethical issue that information systems raise is at what point should I release software or services for consumption by others? At what point can I conclude that my software or service achieves an economically and technologically adequate level of quality? What am I obligated to know about the quality of my software, its procedures for testing, and its operational characteristics? The leading quality-related social issue deals with expectations: As a society, do we want to encourage people to believe that systems are infallible, that data errors are impossible? By heightening awareness of system failure, do we inhibit the development of all systems, which in the end contribute to social well-being? The leading quality-related political issue concerns the laws of responsibility and accountability, what they should be, and how they should be applied. 162) How does the use of electronic voting machines act as a "double-edged sword?" What moral dimensions are raised by this use of information technology?

18 Answer: Electronic voting machines can be seen as beneficial by making voting easy to accomplish and tabulate. However, it may be easier to tamper with electronic voting machines than with countable paper ballots. In terms of information rights, it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge. Manufacturers of voting machines claim property rights to the voting software, which means that if the software is protected from inspection, there is no regulation in how the software operates or how accurate it is. In terms of accountability and control, if an electronic voting system malfunctions, will it be the responsibility of the government, of the company manufacturing the machines or software, or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life, while it may make voting easier and quicker, does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person, one vote? 163) What is spyware? Do you think it should be illegal? Answer: Spyware is a technology that aids in gathering information about a person or organization without their knowledge. Should it be illegal -- you will get various answers for this questions. Some may feel that it is a legitimate business model for companies to collect information to better serve their customers or to lower the price of another product in which spyware is bundled. Others may feel that it is a total invasion of privacy and has the strong potential to be used for nefarious purposes. 164) What is technostress? What are the best ways in which firms can protect their employees from getting technostress? Answer: You will get various answers of ways in which to combat technostress. Technostress is stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation Perhaps firms first need to recognize the problems caused by technostress. Firms then should put policies in place which reduce the technostress such as job rotation, mandatory breaks, rules for maxim time on computer in a week etc 165) Your workplace is considering implementing major changes in their IS infrastructures. This will cause radical change in the business processes of the firm. Many tasks and jobs will change. What would you advise you firm are the benefits and costs of considering such changes? Answer: Re-engineering work is typically hailed in the information systems community as a major benefit of new information technology. It is much less frequently noted that redesigning business processes could potentially cause middle-level managers and clerical workers to lose their jobs. One economist has raised the possibility that we will create a society run by a small high tech elite of corporate professionals... in a nation of the permanently unemployed. Other economists are much more sanguine about the potential job losses. They believe relieving bright, educated workers from re-engineered jobs will result in these workers moving to better jobs in fast-growth industries. Missing from this equation are unskilled, blue-collar workers and older, less well-educated middle managers. It is not clear that these groups can be retrained easily for high-quality (high-paying) jobs. Careful planning and sensitivity to employee needs can help companies redesign work to minimize job losses.

19 1) FALSE 2) TRUE 3) TRUE 4) FALSE 5) TRUE 6) FALSE 7) TRUE 8) TRUE 9) TRUE 10) FALSE 11) TRUE 12) TRUE 13) FALSE 14) FALSE 15) TRUE 16) TRUE 17) FALSE 18) TRUE 19) TRUE 20) TRUE 21) FALSE 22) TRUE 23) TRUE 24) FALSE 25) FALSE 26) TRUE 27) FALSE 28) TRUE 29) FALSE 30) TRUE 31) TRUE 32) TRUE 33) FALSE 34) FALSE 35) TRUE 36) FALSE 37) TRUE 38) FALSE 39) FALSE 40) FALSE 41) TRUE 42) TRUE 43) FALSE 44) TRUE 45) FALSE 46) C 47) D 48) D 49) D 50) C 51) C

20 52) A 53) B 54) C 55) C 56) D 57) D 58) D 59) B 60) D 61) B 62) B 63) C 64) D 65) A 66) D 67) D 68) A 69) B 70) D 71) D 72) D 73) A 74) C 75) B 76) C 77) A 78) C 79) B 80) C 81) D 82) B 83) A 84) D 85) C 86) A 87) A 88) A 89) D 90) D 91) C 92) B 93) B 94) B 95) D 96) C 97) D 98) A 99) B 100) C 101) D 102) C 103) C

21 104) D 105) C 106) C 107) A 108) ethics 109) Ethical 110) Profiling 111) Nonobvious relationship awareness (NORA) 112) Liability 113) Golden Rule 114) Descartes 115) monitor 116) privacy 117) legislation 118) Quebec 119) stringent 120) Informed consent 121) safe harbour 122) P3P 123) Intellectual 124) networks 125) Copyright 126) software 127) transmit 128) File sharing 129) data quality 130) competition 131) separate 132) Extensive 133) Cyberbullying 134) Computer crime 135) Spamming 136) digital divide 137) (CTS) Carpal tunnel syndrome 138) Computer vision syndrome (CVS) 139) radiation 140) opt-in 141) Computer abuse 142) boundaries 143) benefits 144) information rights 145) responsibility 146) Liability 147) the Risk Aversion Principle 148) Informed consent 149) web bug 150) opt-in 151) patent 152) computer abuse 153) The five moral dimensions are: 1. Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them?

22 2. erty rights be protected when it is so easy to copy digital materials? Prop 3. Accountability and control. Who will be held accountable and liable for the harm done to individual and erty collective information and property rights? right 4. System quality. What standards of data and system quality should we demand to protect individual rights and s. the safety of society? How 5. Quality of life. What values should be preserved? What institutions must we protect? What cultural values can can be harmed? intell Individual answers for determining the most difficult for society to deal with will vary. One answer might be: ectua Quality of life issues will be most difficult for society to deal with in societies that are comprised of many different l cultural and ethnic groups, such as the United States. It is difficult to regulate concerns that are based on subjective prop values. 154) Key technology trends include the following: (1) Computer power doubling every 18 months: ethical impact - because more organizations depend on computer systems for critical operations, these systems are vulnerable to computer crime and computer abuse; (2) Data storage costs are rapidly declining: ethical impact - it is easy to maintain detailed databases on individuals -- who has access to and control of these databases?; (3) Data analysis advances: ethical impact - vast databases full of individual information may be used to develop detailed profiles of individual behaviour; and (5) Networking advances and the Internet: ethical impact - it is easy to copy data from one location to another. Who owns data? How can ownership be protected? 155) The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify the options that you can reasonably take; and (5) identify the potential consequences of your options. 156) The six ethical principles are the Golden Rule, Kant's Categorical Imperative, Descartes' rule of change (slippery slope), the Utilitarian Principle, the Risk Aversion Principle, and the "no free lunch" rule. The Golden Rule proposes: do unto others as you would have them do unto you. Immanuel Kant's Categorical Imperative proposes, if an action is not right for everyone to take, it is not right for anyone. Descartes' rule of change says: If an action cannot be taken repeatedly, it is not right to take at all. The Utilitarian Principle is: Take the action that achieves the higher or greater value. The Risk Aversion Principle is: Take the action that produces the least harm or the least potential cost. The ethical no free lunch rule says: Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise.tangible objects are owned by someone else unless there is a specific declaration otherwise. 157) This is an opinion question, but anyone who aspires to management will consider himself or herself a professional and will need to have a clear understanding as to how he or she feels about this matter. With the recent scandals in large business firms, which have devastated our economy, there is likely to be a cry for legally sanctioned codes and outside regulatory agencies. 158) One answer might be that we should depend upon the Fair Information Practice Principles and that as long as these principles are not ignored or overset, personal privacy does not conflict with homeland security. This is a weak argument. Other issues involve online privacy, employee monitoring, tradeoffs between security and privacy and good business results versus privacy. 159) A cookie works as follows: A user opens a Web browser and selects a site to visit. The user's computer sends a request for information to the computer running at the Web site. The Web site computer is called the server, since it allows the user's computer to display the Web site. At the same time it sends a cookie a data file containing information like an encrypted user ID and information about when the user visited and what he did on the site. The user's computer receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the Web site, the server running the site retrieves the cookie to help identify the user. 160) Responsibility is the first key element of ethical action. Responsibility means that an individual, group, or organization accepts the potential costs, duties, and obligations for decisions made. Accountability is a feature of systems and social institutions. It means that mechanisms are in place to determine who took responsible action; i.e., who is responsible for the action. Liability is a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by others. These concepts are related as follows: I will assume the blame or benefit for the actions I take (responsibility); this blame or benefit accrues to me through the requirement that I be able to explain why I have taken the actions I have (accountability) for actions traceable to me by defined mechanisms in the organization, and if those actions result in

23 hard to another, I will be held by law to reparations for those actions (liability). 161) The central quality-related ethical issue that information systems raise is at what point should I release software or services for consumption by others? At what point can I conclude that my software or service achieves an economically and technologically adequate level of quality? What am I obligated to know about the quality of my software, its procedures for testing, and its operational characteristics? The leading quality-related social issue deals with expectations: As a society, do we want to encourage people to believe that systems are infallible, that data errors are impossible? By heightening awareness of system failure, do we inhibit the development of all systems, which in the end contribute to social well-being? The leading quality-related political issue concerns the laws of responsibility and accountability, what they should be, and how they should be applied. 162) Electronic voting machines can be seen as beneficial by making voting easy to accomplish and tabulate. However, it may be easier to tamper with electronic voting machines than with countable paper ballots. In terms of information rights, it seems possible that methods could be set up to determine how an individual has voted and to store and disseminate this knowledge. Manufacturers of voting machines claim property rights to the voting software, which means that if the software is protected from inspection, there is no regulation in how the software operates or how accurate it is. In terms of accountability and control, if an electronic voting system malfunctions, will it be the responsibility of the government, of the company manufacturing the machines or software, or the programmers who programmed the software? The dimension of system quality raises questions of how the level of accuracy of the machines is to be judged and what level is acceptable? In terms of quality of life, while it may make voting easier and quicker, does the vulnerability to abuse of these systems pose a threat to the democratic principle of one person, one vote? 163) Spyware is a technology that aids in gathering information about a person or organization without their knowledge. Should it be illegal -- you will get various answers for this questions. Some may feel that it is a legitimate business model for companies to collect information to better serve their customers or to lower the price of another product in which spyware is bundled. Others may feel that it is a total invasion of privacy and has the strong potential to be used for nefarious purposes. 164) You will get various answers of ways in which to combat technostress. Technostress is stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation Perhaps firms first need to recognize the problems caused by technostress. Firms then should put policies in place which reduce the technostress such as job rotation, mandatory breaks, rules for maxim time on computer in a week etc 165) Re-engineering work is typically hailed in the information systems community as a major benefit of new information technology. It is much less frequently noted that redesigning business processes could potentially cause middle-level managers and clerical workers to lose their jobs. One economist has raised the possibility that we will create a society run by a small high tech elite of corporate professionals... in a nation of the permanently unemployed. Other economists are much more sanguine about the potential job losses. They believe relieving bright, educated workers from re-engineered jobs will result in these workers moving to better jobs in fast-growth industries. Missing from this equation are unskilled, blue-collar workers and older, less well-educated middle managers. It is not clear that these groups can be retrained easily for high-quality (high-paying) jobs. Careful planning and sensitivity to employee needs can help companies redesign work to minimize job losses.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Food Inc. operates a website for their firm. They ask visitors to the website to give

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Chapter 4 INFORMATION SYSTEMS

Chapter 4 INFORMATION SYSTEMS Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems MANAGEMENT INFORMATION SYSTEMS Chapter 4 Ethical and Social Issues in Information Systems Mohammad Najjar, PhD, MBA, BSc Operations & Supply Chain Management Learning Objectives 1. Identify ethical, social

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) PURPOSE To provide library customers and staff with a statement of philosophy and the key objectives respecting

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Academic Vocabulary Test 1:

Academic Vocabulary Test 1: Academic Vocabulary Test 1: How Well Do You Know the 1st Half of the AWL? Take this academic vocabulary test to see how well you have learned the vocabulary from the Academic Word List that has been practiced

More information

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors Section: Subject: Academic/Student (AC) Programs and Curriculum AC.2.11 INTELLECTUAL PROPERTY Legislation: Copyright Act (R.S.C., 1985, c.c-42); Patent Act (R.S.C., 1985, c.p-4); Trade-marks Act (R.S.C.

More information

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology. CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other

More information

Intellectual Property Ownership and Disposition Policy

Intellectual Property Ownership and Disposition Policy Intellectual Property Ownership and Disposition Policy PURPOSE: To provide a policy governing the ownership of intellectual property and associated University employee responsibilities. I. INTRODUCTION

More information

Patents. What is a patent? What is the United States Patent and Trademark Office (USPTO)? What types of patents are available in the United States?

Patents. What is a patent? What is the United States Patent and Trademark Office (USPTO)? What types of patents are available in the United States? What is a patent? A patent is a government-granted right to exclude others from making, using, selling, or offering for sale the invention claimed in the patent. In return for that right, the patent must

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared

More information

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Getting on the same page

Getting on the same page Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

To Patent or Not to Patent

To Patent or Not to Patent Mary Juetten, CEO Traklight February 23, 2013 To Patent or Not to Patent Top Intellectual Property (IP) Question: Do I always need a patent for my business idea? The quick answer is no, not always. But

More information

Slide 15 The "social contract" implicit in the patent system

Slide 15 The social contract implicit in the patent system Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from

More information

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM (Note: Significant changes in United States patent law were brought about by legislation signed into law by the President on December 8, 1994. The purpose

More information

Technology Transfer and Intellectual Property Best Practices

Technology Transfer and Intellectual Property Best Practices Technology Transfer and Intellectual Property Best Practices William W. Aylor M.S., J.D. Director, Technology Transfer Office Registered Patent Attorney Presentation Outline I. The Technology Transfer

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials.

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials. BACK DOOR SUPPLIERS Legal Notice: While all attempts have been made to verify information provided in this publication,neither the Author nor the Publisher assumes any responsibility for errors, omissions,

More information

ICC POSITION ON LEGITIMATE INTERESTS

ICC POSITION ON LEGITIMATE INTERESTS ICC POSITION ON LEGITIMATE INTERESTS POLICY STATEMENT Prepared by the ICC Commission on the Digital Economy Summary and highlights This statement outlines the International Chamber of Commerce s (ICC)

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

EL PASO COMMUNITY COLLEGE PROCEDURE

EL PASO COMMUNITY COLLEGE PROCEDURE For information, contact Institutional Effectiveness: (915) 831-6740 EL PASO COMMUNITY COLLEGE PROCEDURE 2.03.06.10 Intellectual Property APPROVED: March 10, 1988 REVISED: May 3, 2013 Year of last review:

More information

Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board

Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board Dr. Biswajit Dhar Professor, Jawaharlal Nehru University, India and Member DA9 Advisory Board Intellectual Property Rights in Preferential Trade Agreements Many Preferential Trade Agreements (PTAs) adopted

More information

The Role of the Intellectual Property Office

The Role of the Intellectual Property Office The Role of the Intellectual Property Office Intellectual Property Office is an operating name of the Patent Office The Hargreaves Review In 2011, Professor Ian Hargreaves published his review of intellectual

More information

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics? A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there

More information

Intellectual Property Rights in the Academic and Research Environment

Intellectual Property Rights in the Academic and Research Environment Intellectual Property Rights in the Academic and Research Environment Roger Elliott * Introduction The concept of intellectual property rights, which in the academic and research context are mainly concerned

More information

Answer to Community Patent Consultation To:

Answer to Community Patent Consultation To: MRS Broadcasting AB Box 3091 SE-161 03 BROMMA STOCKHOLM SWEDEN http://www.mrs.net info@mrs.net tel +468 371400 fax +468 371700 MRS (music radio service) Broadcasting AB is a broadcast consulting company

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding

Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION. Regarding Comments of the AMERICAN INTELLECTUAL PROPERTY LAW ASSOCIATION Regarding THE ISSUES PAPER OF THE AUSTRALIAN ADVISORY COUNCIL ON INTELLECTUAL PROPERTY CONCERNING THE PATENTING OF BUSINESS SYSTEMS ISSUED

More information

CS 4984 Software Patents

CS 4984 Software Patents CS 4984 Software Patents Ross Dannenberg Rdannenberg@bannerwitcoff.com (202) 824-3153 Patents I 1 How do you protect software? Copyrights Patents Trademarks Trade Secrets Contract Technology (encryption)

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

Leveraging Intellectual Property for Success

Leveraging Intellectual Property for Success Leveraging Intellectual Property for Success Mark Radtke Assistant Regional Director Rocky Mountain Regional Office April 16 th, 2018 USPTO Locations The USPTO in FY17 12,588 Employees Patents Trademarks

More information

Chapter 4. Ethical and Social Issues in Information Systems. After completing this chapter, students should be able to answer the following questions:

Chapter 4. Ethical and Social Issues in Information Systems. After completing this chapter, students should be able to answer the following questions: Chapter 4 Ethical and Social Issues in Information Systems After completing this chapter, students should be able to answer the following questions: What ethical, social, and political issues are raised

More information

Commonwealth Data Forum. Giovanni Buttarelli

Commonwealth Data Forum. Giovanni Buttarelli 21 February 2018 Commonwealth Data Forum Giovanni Buttarelli Thank you, Michael, for your kind introduction. Thank you also to the Commonwealth Telecommunications Organisation and the Government of Gibraltar

More information

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

Professional guide for any online marketing business

Professional guide for any online marketing business 24/7 Direct Referrals on Auto-Pilot Professional guide for any online marketing business LEGAL DISCLAIMER The Publisher has strive to be as accurate and complete as possible in the creation of this report,

More information

Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa

Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa Freedom of Expression in Cyberspace Codes & Creativity 3-4 February 2005, UNESCO Chris Kabwato, Highway Africa www.highwayafrica.ru.ac.za Acknowledgements Lawrence Lessig, Free Culture Joost Smiers, Arts

More information

International IP. Prof. Eric E. Johnson. General Principles

International IP. Prof. Eric E. Johnson. General Principles International IP Prof. Eric E. Johnson ericejohnson.com General Principles territoriality Dependence, independence, central attack Procedural harmonization Substantive agreements National treatment Minima

More information

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016 TABLE OF CONTENTS 1. PURPOSE OF THE POLICY... 2 2. RESPONSIBILITIES... 2 3. GENERAL PRINCIPLES OF SELECTION... 2 4. SPECIAL COLLECTIONS... 6 5. DONATIONS OF MATERIALS... 7 6. COLLECTION MAINTENANCE...

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

Utility Patents. New and useful inventions and configurations of useful articles

Utility Patents. New and useful inventions and configurations of useful articles COMPARATIVE INTELLECTUAL PROPERTY LAW CHART (Except as otherwise indicated, citations refer to U.S. Federal Law) (Intellectual Property Advisory No. 4) Intellectual Property has become important to many

More information

Questions for the public consultation Europeana next steps

Questions for the public consultation Europeana next steps Questions for the public consultation Europeana next steps November 13, 2009 The International Federation of Film Distributors Associations gathers the national organisations of film distribution companies.

More information

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance 1. INTRODUCTION AND OBJECTIVES 1.1 This policy seeks to establish a framework for managing

More information

SF Certified International Shipping Customer Agreement V1.0

SF Certified International Shipping Customer Agreement V1.0 SF Certified International Shipping Customer Agreement V1.0 SF Certified International Shipping (further referred as SF CIS ) is a service provided by S.F. Express Co., Ltd. (further referred as SF ) to

More information

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Ethics, privacy and legal issues concerning GIS. This is lecture 12 Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;

More information

DRAFT REPORT. EN United in diversity EN. European Parliament 2017/2007(INI)

DRAFT REPORT. EN United in diversity EN. European Parliament 2017/2007(INI) European Parliament 2014-2019 Committee on Legal Affairs 2017/2007(INI) 22.2.2018 DRAFT REPORT on three-dimensional printing, a challenge in the fields of intellectual property rights and civil liability

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

UW REGULATION Patents and Copyrights

UW REGULATION Patents and Copyrights UW REGULATION 3-641 Patents and Copyrights I. GENERAL INFORMATION The Vice President for Research and Economic Development is the University of Wyoming officer responsible for articulating policy and procedures

More information

My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions.

My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions. Dear Ladies and Gentlemen, My name is Carsten Wald, I am freelancer in software developement and I would like to answer to your questions. 1.1 Do you agree that these are the basic features required of

More information

How To Make Money With CPALead

How To Make Money With CPALead By (melek.taus@yahoo.com) This free ebook has been downloaded from: http://easy-cpalead-money.blogspot.com/p/download.html If you already registered to CPALead please take the time to complete a two minutes

More information

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version

More information

California State University, Northridge Policy Statement on Inventions and Patents

California State University, Northridge Policy Statement on Inventions and Patents Approved by Research and Grants Committee April 20, 2001 Recommended for Adoption by Faculty Senate Executive Committee May 17, 2001 Revised to incorporate friendly amendments from Faculty Senate, September

More information

Chapter 8. Technology and Growth

Chapter 8. Technology and Growth Chapter 8 Technology and Growth The proximate causes Physical capital Population growth fertility mortality Human capital Health Education Productivity Technology Efficiency International trade 2 Plan

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION Teleconference Presentation On the occasion of the Joint ITU-AICTO workshop Interoperability of IPTV in the Arab Region Dubai, United Arab

More information

I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream

I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream An interview with Giovanni Buttarelli, European Data Protection Supervisor by Roberto Zangrandi

More information

GENERAL PRINCIPLES OF INTERNET GOVERNANCE

GENERAL PRINCIPLES OF INTERNET GOVERNANCE GENERAL PRINCIPLES OF INTERNET GOVERNANCE PROPOSAL OF THE FRENCH GOVERNMENT INTRODUCTION: THE VALUES OF THE INFORMATION SOCIETY The network has become a part of every nation s wealth and one of its most

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

POLICY ON INVENTIONS AND SOFTWARE

POLICY ON INVENTIONS AND SOFTWARE POLICY ON INVENTIONS AND SOFTWARE History: Approved: Senate April 20, 2017 Minute IIB2 Board of Governors May 27, 2017 Minute 16.1 Full legislative history appears at the end of this document. SECTION

More information

Pickens Savings and Loan Association, F.A. Online Banking Agreement

Pickens Savings and Loan Association, F.A. Online Banking Agreement Pickens Savings and Loan Association, F.A. Online Banking Agreement INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking

More information

UNESCO and Juventus Photo Contest CONTEST RULES

UNESCO and Juventus Photo Contest CONTEST RULES UNESCO and Juventus Photo Contest CONTEST RULES Article 1: ORGANIZATION UNESCO through its Headquarters in Paris, France (hereinafter "the Organizer"), is organizing a free-of-charge photo contest on the

More information

Patentability of Computer-Implemented Inventions in the field of Computer Security

Patentability of Computer-Implemented Inventions in the field of Computer Security Patentability of Computer-Implemented Inventions in the field of Computer Security Erik Veillas Patent Examiner, Cluster Computers European Patent Office TU München Munich, 21 June 2011 Acknowledgments

More information

MEDICINE LICENSE TO PUBLISH

MEDICINE LICENSE TO PUBLISH MEDICINE LICENSE TO PUBLISH This LICENSE TO PUBLISH (this License ), dated as of: DATE (the Effective Date ), is executed by the corresponding author listed on Schedule A (the Author ) to grant a license

More information

ATDESIGN. Working with an Assignment Photographer

ATDESIGN. Working with an Assignment Photographer Working with an Assignment Photographer Making sure your project is professionally photographed is an essential step in communicating your ideas. With the photographs being used to market your firm s expertise,

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn). CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider

More information

Telecommunication Policy, 2060 (2004)

Telecommunication Policy, 2060 (2004) Telecommunication Policy, 2060 (2004) 1. Background Even though policies undertaken after the restoration of the Multi Party Democracy in Nepal appear to have moved forward the right direction, it is not

More information

Langdon Winner: Frankenstein s Problem and Technology as Legislation

Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner Political theorist at Rensselaer Polytechnic Institute Best-known books: Autonomous Technology: Technics Out-of-Control

More information

USTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET

USTR NEWS UNITED STATES TRADE REPRESENTATIVE.   Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET USTR NEWS UNITED STATES TRADE REPRESENTATIVE www.ustr.gov Washington, D.C. 20508 202-395-3230 FOR IMMEDIATE RELEASE August 27, 2018 Contact: USTR Public & Media Affairs media@ustr.eop.gov UNITED STATES

More information

Christina Narensky, Psy.D.

Christina Narensky, Psy.D. Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice

More information

Report on the impact of the convergence of telecommunication, broadcasting and information technologies

Report on the impact of the convergence of telecommunication, broadcasting and information technologies International Telecommunication Union QUESTION 10-1/1 Impact of the convergence of telecommunication, broadcasting and information technologies ITU-D STUDY GROUP 1 3rd STUDY PERIOD (2002-2006) Report on

More information

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group Introduction In response to issues raised by initiatives such as the National Digital Information

More information

An Essential Health and Biomedical R&D Treaty

An Essential Health and Biomedical R&D Treaty An Essential Health and Biomedical R&D Treaty Submission by Health Action International Global, Initiative for Health & Equity in Society, Knowledge Ecology International, Médecins Sans Frontières, Third

More information

Committee on Legal Affairs WORKING DOCUMENT

Committee on Legal Affairs WORKING DOCUMENT European Parliament 2014-2019 Committee on Legal Affairs 23.11.2017 WORKING DOCUMT on three-dimensional printing, a challenge in the fields of intellectual property rights and civil liability Committee

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM Significant changes in the United States patent law were brought about by legislation signed into law on September 16, 2011. The major change under the Leahy-Smith

More information

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES Draft Guidelines for Ensuring and Maximizing the Quality, Objectivity, Utility, and Integrity of Information Disseminated by the Bureau of Land

More information

Distributive Justice Nozick

Distributive Justice Nozick 1. Wilt Chamberlain: Consider this story: Distributive Justice Nozick Wilt Chamberlain: There is a society that is currently in a perfectly just state. In that society, Wilt Chamberlain is a very talented

More information

Data Acquisition, Management, Sharing and Ownership

Data Acquisition, Management, Sharing and Ownership Data Acquisition, Management, Sharing and Ownership University of Ibadan MEPI-J program 1 What are data? Research Data are ".. the recorded factual material commonly accepted in the scientific community

More information

50 Tough Interview Questions (Revised 2003)

50 Tough Interview Questions (Revised 2003) Page 1 of 15 You and Your Accomplishments 50 Tough Interview Questions (Revised 2003) 1. Tell me a little about yourself. Because this is often the opening question, be careful that you don t run off at

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION The patentability of any invention is subject to legal requirements. Among these legal requirements is the timely

More information

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles.

Over the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles. Contents Preface... 3 Purpose... 4 Vision... 5 The Records building the archives of Canadians for Canadians, and for the world... 5 The People engaging all with an interest in archives... 6 The Capacity

More information

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA No. 68 The Law of the People's Republic of China on Promoting the Transformation of Scientific and Technological Achievements, adopted at the 19th

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)

More information

OFSET. Organization for Free Software in Education and Teaching. Bagneux, March 31, Our answer to the EU consultation on patents in Europe

OFSET. Organization for Free Software in Education and Teaching. Bagneux, March 31, Our answer to the EU consultation on patents in Europe OFSET Organization for Free Software in Education and Teaching Bagneux, March 31, 2006 Our answer to the EU consultation on patents in Europe 1.1 Do you agree that these are the basic features required

More information

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Approved by Loyola Conference on May 2, 2006 Introduction In the course of fulfilling the

More information