9.9. Terms and Concepts
fairness, 553 | patent ownership, 576 |
legal protection for computers and data, 554 | copyright ownership, 576 work for hire, 576 |
privacy, 555 | license, 577 |
copyright, 556 | employment contract, 577 |
intellectual property, 556 | property, 583 |
originality, 557 | rules of evidence, 584 |
fair use, 557 | U.S. Computer Fraud and Abuse Act, 587 |
copyright registration, 558 | U.S. Freedom of Information Act, 588 |
copyright infringement, 558 | U.S. Privacy Act, 588 |
patent, 561 | USA Patriot Act, 588 |
novelty, 562 | cryptography—legality of use, 592 |
patent registration, 562 | export of cryptography, 592 |
patent infringement, 562 | escrowed encryption, 593 |
trade secret, 564 | privacy, 595 |
reverse engineering, 564 | data mining, 596 |
trade secret enforcement, 565 | Carnivore, 599 |
information, 568 | anonymity, ... |
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.