Professional Documents
Culture Documents
Types of Property
⮚ Real
● Land
⮚ Personal
● Cars, jewelry, clothing
⮚ Easements
● Non-corporal interest in real property
• Railroads, utilities
⮚ Intellectual
● Patents, copyrights and trademarks
Patents
⮚ Grant of a property right to the inventor
⮚ Term of a new patent is 20 years from the date on which the application for the
patent was filed in the United States
⮚ US patent grants are effective only within the US, US territories, and US
possessions.
⮚ The right to exclude others from making, using, offering for sale, or selling” the
invention in the United States or “importing” the invention into the United States
⮚ Not the right to make, use, offer for sale, sell or import, but the right to exclude
others from making, using, offering for sale, selling or importing the invention
Computer Contracts
INTRODUCTION
• Contracts set out the agreement between the parties:
• Where there are gaps in the agreement because the parties have failed to contemplate a
particular issue,
• it is a function of contract law to fill them,
• for example by implying terms;
• also contract law provides rules for the termination of the contract if performance
becomes impossible;
• and sometimes, although fairly rarely, it sets aside contracts which are too harsh or
unconscionable (unreasonably excessive).
• Since the advent of the Internet, the market has globalized to a far greater extent than
ever before,
• and there is greater need for international harmonization of laws.
he EU has therefore been very active in line with its policy
• There are therefore directives and proposals for directives on:
1. legal protection for encrypted services in the internal market;
2. electronic signatures;
3. electronic commerce;
4. distance contracts;
5. distance selling of financial services.
Digital Signature:
An electronic signature, or e-signature, refers to data in electronic form, which is logically
associated with other data in electronic form and which is used by the signatory to sign
• One of the problems with computing contracts is that many lawyers are still not familiar
with the technology.
• On the other hand even fewer computer scientists are familiar with the law.
• As both lawyers and computer scientists use jargon known almost only to themselves, the
difficulties are compounded.
• These difficulties are however receding,
• for more lawyers are becoming familiar with computing through use of computers at
home and in work;
• there are more lawyers specializing in this area of the law;
• and many books have been written describing
– the framework of computer contracts,
– and providing model contracts or precedents, which lawyers can adapt to the needs
of their clients
Structure of the contract
• Producing a good contract costs a lot of money;
• For this reason, software suppliers try to use what are known as standard form contracts,
which are used or intended to be used many times over.
@ a short introductory section, which specifies, the names of the parties to the contract;
@ a set of standard terms and conditions;
@ a set of appendices or annexes.
@ may be a few other things.
• The standard terms and conditions do not change from one project to another;
• They contain references to the annexes, which contain all the project specific material.
Sections of a contract
• The introductory section
• What is to be produced
• What is to be delivered
• Ownership of rights
• Confidentiality
• Payment terms
• Calculating payments for delays and changes
• Penalty clauses
• Obligations of the client
• Standards and methods of working
• Progress meetings
• Project Managers
• Acceptance procedure
• Warranty and maintenance
• Indemnity (exemption/protection against a loss or other financial burden)
• Termination of the contract
• Arbitration
• Inflation
• Applicable law
Deliverables (What is to be delivered).
• Source code
• Command files
(for building and installing the executable code)
• Documentation
• Manuals (Reference, Training, Operations)
• Software tools to help maintain the code
• User training (on site / off site)
• Training for client’s maintenance staff
• Test data and test results
Obligations of the Client
• Information on Client activities/setup
• Information on software environment
• Access to staff
• Facilities for development and testing
• Facilities for software company staff on client premises
• Attendance at progress meetings
IPR and other rights
• Who owns the rights to what
– Books, documents, disks
– Intellectual Property Rights
• Author of the software
• Software House
• Client (upon payment)
• Written agreement (assignment of rights)
• Sale or Licence …
Licencing Agreement
• Exclusive Licence (expensive)
– Software house retains copyright
– Software house can’t re-use the code
• Non-Exclusive License (cheaper)
– Software house retains copyright
– Software house can re-use the code
– Client may acquire right to veto grant of licence to others (competitors)
• Matters to consider
– Duration of licence (termination)
– Right to assign (transfer) licence to others
– Scope of licence
• One or more computers
• One or more sites
–Confidentiality
Client is prevented from allowing others to become familiar with the software
Confidentiality Agreement
• Confidentiality of Client business
• Confidentiality of the software and the properties of the system
Applicable at different stages:
– Pre-Contractual stage
– Whilst software is being developed
– After delivery
Payment terms
Issues to be considered:
• Staged payment
• Milestones
• Delays and changes (attributable to Client)
– Calculating the cost
– Changes to delivery schedule
– Changes to performance
Indemnity
Each party will indemnify the other against potential liability for accidental or deliberate
infringement of IPR due to their own fault
e.g. if the software includes proprietary components which the developer had no right to use
Termination of the Contract
• Client’s needs or circumstances may change
• Software may no longer be appropriate
• Issues to consider
– Indemnity for termination
– Ownership of software developed so far
Other contractual Issues
• Quality control
• Progress meetings
• Managing the project
• Acceptance procedure
– Determine if Contract has been delivered
• Warranty and maintenance
– Bug fixing (free of charge – e.g. 90 days)
– Extended warranty (enhancements)
• Arbitration
– Arbitration clauses are common
– Cheaper and faster than going to court
– Usually governed by Arbitration Act 1996
• Inflation
– In case of long term maintenance
– Automatic review of agreed price
– Frequently linked to Business Costs Index
• Applicable Law
Choice of the law which applies to the Contract (and its interpretation)
– If the parties have registered offices in different countries
– If the performance of the Contract involves more than one jurisdiction
• Language of the Contract
– If contract is to be translated, which is the binding version
Limitation of Liability
Unfair Contracts Terms Act (Section 3)
• Provides that a software house using a standard from contract cannot, unless it is
reasonable to do so,
– Exclude liability for its own breaches of contract, or
– Claim to be entitled
• To render a contractual performance substantially different from that which
was reasonably expected of it
• Render no performance at all (in respect of the whole or part of its
contractual obligations)
Crime bill 2016
10-Cyber terrorism
19-Offences against Modesty of a Natural Person and Minor
15-Unauthorized issuance of SIM cards etc.
Cognizable: Police officer can make an arrest without a warrant and start an investigation with
or without the permission of a court.
Bail-able: The defendant may be able to secure his release upon the payment of bail.
Compoundable: The complainant enter into a compromise, and agrees to have the charges
dropped against the accused.
Billing errors
The first few errors we look at are relatively simple ones whose negative
consequences were undone with relative ease.
A woman received a $6.3 million bill for electricity; the correct amount was $63.
The cause was an input error made by someone using a new computer system.
Programmers and users can avoid such.
For example, programmers can include tests to determine whether a billing
amount is outside some reasonable range or changed significantly from previous
bills.
These errors are perhaps more humorous than serious.
They are worth studying, because the same kinds of design and programming
errors can have more serious consequences in different applications.
Credit bureau records incorrectly listed thousands of residents as not having paid their local
property taxes.
An input error appeared to be the cause of the problem.
More serious, perhaps, are all the errors in individual people’s records.
In one case, a man applied for jobs at several retail stores and they all turned him down.
Eventually he learned that the stores used a database to screen applicants, and it listed him as a
shoplifter.
It is difficult to get accurate and meaningful error rates for major databases with information
about millions of people.
When errors occur in databases used by law enforcement agencies, the consequences can
include arrests, searches, and time in jail.
Factors that contribute to the frequency and severity of the problems people suffer because of
errors in databases include:
A large population (Many people have identical or similar names)
Automated processing without human common sense
Overconfidence in the accuracy of data stored on computers
Errors (some due to carelessness) in data entry
Failure to update information and correct errors
Lack of accountability for errors
System Failures
Modern communications, power, medical, financial, retail, and transportation
systems depend heavily on computer systems.
An aim is to see the serious impacts of the failures—and to see what you want
to work hard to avoid.
The lessons of adequate planning and testing, of having backup plans in case of
failures, and of honesty in dealing with errors apply to large projects.
Millions of BlackBerry users did not get their email for nine hours after the
company installed a faulty software update.
Although the program underwent 13 weeks of testing, it was not retested after
the change—which contained a typo.
Log-ins overloaded Skype’s peer-to-peer network system when a huge
number of people rebooted their computers after installing routine
Windows updates.
A majority of Skype’s Internet phone users could not log in for two days.
Every few years, the computer system of one of the world’s large stock
exchanges or brokerages fails.
Abandoned systems
The flaws in some systems are so extreme that the systems end up in the
trash after wasting millions, or even billions, of dollars.
Use of very new technology, with unknown reliability and problems, perhaps for
which software developers have insufficient experience and expertise.
Legacy systems
Legacy systems are out-of-date systems (hardware, software, or peripheral
equipment) still in use, often with special interfaces, conversion software, and
other adaptations to make them interact with more modern systems.
Old hardware fails and replacement parts are hard to find; Old software often
runs on newer hardware, but it is still old software.
Old programs often had little or no documentation, and the programmers who
wrote the software or operated the systems have left the company, retired, or
died.
The conversion to the new system, possibly requiring some downtime, could
also be very disruptive.
The job they are doing is inherently difficult, and sometimes the job is done
poorly.
Computer systems interact with the real world (including both machinery and
humans), include complex communications networks, have numerous features
and interconnected subsystems.
The job can be done poorly at any of many stages, from system design and
implementation to system management and use.
Vulnerability
A vulnerability is a set of conditions or behaviors that allows the violation of an
explicit or implicit security policy.
Vulnerability disclosure is a process through which vendors and vulnerability finders may work
cooperatively in finding solutions thatbreduce the risks associated with a vulnerability.
Providing users with sufficient information to evaluate risks from vulnerabilities to their
systems.
Disclosure Choices
Non Disclosure
Private Disclosure
When a product’s vendor is aware of a vulnerability, the vendor may take action to address it
but will only notify its own customer base of the vulnerability.
Many of the same motives as the Non Disclosure policy are also in play here.
The hope is that malicious actors are much less likely to find out about and exploit a
vulnerability.
Some vulnerability finders are satisfied by this method if all known customers can be reached.
However, this approach is often not practical for widely deployed or open source software.
Limited (Partial) Disclosure
When a vulnerability is found, only some information about the vulnerability is disclosed to the
public.
The goal is typically to slow down the exploit development long enough for a fix to be
developed and deployed.
This is done by withholding proof of concept code or other technical details of the vulnerability.
But still providing enough information that users of the product may take action to mitigate the
issue.
Full Disclosure
When a vulnerability is found, all information about the vulnerability is disclosed to the
public.
Typically, this scenario results in the release of proof of concept exploit code along with a
report describing the vulnerability.
Finders following a full disclosure approach may or may not attempt to notify the vendor
at all in advance of the public release of the vulnerability report.
The belief is that this approach serves the greater good by allowing consumers: