999 resultados para Unauthorized use


Relevância:

70.00% 70.00%

Publicador:

Resumo:

On 14 November 2013, the US District Court of the Southern District of New York issued a major ruling in favour of the Google Books project, concluding that Google’s unauthorized scanning and indexing of millions of copyrighted books in the collections of participating libraries and subsequently making snippets of these works available online through the “Google Books” search tool qualifies as a fair use under section 107 USCA. After assuming that Google’s actions constitute a prima facie case of copyright infringement, Judge Chin examined the four factors in section 107 USCA and concluded in favour of fair use on the grounds that the project provides “significant public benefits,” that the unauthorized use of copyrighted works (a search tool of scanned full-text books) is “highly transformative” and that it does not supersede or supplant these works. The fair use defence also excluded Google’s liability for making copies of scanned books available to the libraries (as well as under secondary liability since library actions were also found to be protected by fair use): it is aimed at enhancing lawful uses of the digitized books by the libraries for the advancement of the arts and sciences. A previous ruling by the same court of 22 March 2011 had rejected a settlement agreement proposed by the parties, on the grounds that it was “not fair, adequate, and reasonable”. The Authors Guild has appealed the ruling.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The travel and tourism industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is widely thought that consumers place great importance on how that data is handled by firms. Lack of trust may cause consumers to have privacy concerns and may, in turn, have an adverse impact on consumers’ willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized use of secondary data, invasion of privacy, and errors. A survey study was undertaken to examine the effects of these factors on both prior purchase of travel products via the Internet and future purchase probability. Surprisingly, no significant relationships were found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Implications for managers are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many scholars acknowledge the need for rigorous research in landscape architecture to improve practice and teaching, and several recent studies have explored research trends in the discipline. This study continues this exploration by reviewing the articles published in the three prominent English- language landscape architecture journals: Landscape Journal, Landscape Review, and the Journal of Landscape Architecture. Specifically, this study analyzes the abstracts from 441 research articles to determine specific themes and publishing trends over 31 years (1982–2013). Findings indicate that “history” is by far the most prominent research theme, followed by “social and cultural processes and issues” and “aesthetics.” Several themes—such as “sustainability and green infrastructure,” “participation and collaboration,” and “research methods and methodologies”—have become more prominent in recent years. However, topics of current social and political concern—such as “climate change,” “active living,” “energy,” and “health”—are not yet prominent themes in the research literature, and could be key areas for future contribution. With the exception of a few themes, findings also suggest a moderate degree of alignment between research and practice. The article concludes with recommendations for future areas of research that will better position landscape architecture as a research- oriented profession with broad social relevance.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"The Protection of Traditional Knowledge Associated with Genetic Resources: The Role of Databases and Registers" ABSTRACT Yovana Reyes Tagle The misappropriation of TK has sparked a search for national and international laws to govern the use of indigenous peoples knowledge and protection against its commercial exploitation. There is a widespread perception that biopiracy or illegal access to genetic resources and associated traditional knowledge (TK) continues despite national and regional efforts to address this concern. The purpose of this research is to address the question of how documentation of TK through databases and registers could protect TK, in light of indigenous peoples increasing demands to control their knowledge and benefit from its use. Throughout the international debate over the protection of TK, various options have been brought up and discussed. At its core, the discussion over the legal protection of TK comes down to these issues: 1) The doctrinal question: What is protection of TK? 2) The methodological question: How can protection of TK be achieved? 3) The legal question: What should be protected? And 4) The policy questions: Who has rights and how should they be implemented? What kind of rights should indigenous peoples have over their TK? What are the central concerns the TK databases want to solve? The acceptance of TK databases and registers may bring with it both opportunities and dangers. How can the rights of indigenous peoples over their documented knowledge be assured? Documentation of TK was envisaged as a means to protect TK, but there are concerns about how documented TK can be protected from misappropriation. The methodology used in this research seeks to contribute to the understanding of the protection of TK. The steps taken in this research attempt to describe and to explain a) what has been done to protect TK through databases and registers, b) how this protection is taking place, and c) why the establishment of TK databases can or cannot be useful for the protection of TK. The selected case studies (Peru and Venezuela) seek to illustrate the complexity and multidisciplinary nature of the establishment of TK databases, which entail not only legal but also political, socio-economic and cultural issues. The study offers some conclusions and recommendations that have emerged after reviewing the national experiences, international instruments, work of international organizations, and indigenous peoples perspectives. This thesis concludes that if TK is to be protected from disclosure and unauthorized use, confidential databases are required. Finally, the TK database strategy needs to be strengthened by the legal protection of the TK itself.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

On 3 April 2012, the Spanish Supreme Court issued a major ruling in favour of the Google search engine, including its ‘cache copy’ service: Sentencia n.172/2012, of 3 April 2012, Supreme Court, Civil Chamber.* The importance of this ruling lies not so much in the circumstances of the case (the Supreme Court was clearly disgusted by the claimant’s ‘maximalist’ petitum to shut down the whole operation of the search engine), but rather on the court going beyond the text of the Copyright Act into the general principles of the law and case law, and especially on the reading of the three-step test (in Art. 40bis TRLPI) in a positive sense so as to include all these principles. After accepting that none of the limitations listed in the Spanish Copyright statute (TRLPI) exempted the unauthorized use of fragments of the contents of a personal website through the Google search engine and cache copy service, the Supreme Court concluded against infringement, based on the grounds that the three-step test (in Art. 40bis TRLPI) is to be read not only in a negative manner but also in a positive sense so as to take into account that intellectual property – as any other kind of property – is limited in nature and must endure any ius usus inocui (harmless uses by third parties) and must abide to the general principles of the law, such as good faith and prohibition of an abusive exercise of rights (Art. 7 Spanish Civil Code).The ruling is a major success in favour of a flexible interpretation and application of the copyright statutes, especially in the scenarios raised by new technologies and market agents, and in favour of using the three-step test as a key tool to allow for it.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"September 1993."

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many organizations now emphasize the use of technology that can help them get closer to consumers and build ongoing relationships with them. The ability to compile consumer data profiles has been made even easier with Internet technology. However, it is often assumed that consumers like to believe they can trust a company with their personal details. Lack of trust may cause consumers to have privacy concerns. Addressing such privacy concerns may therefore be crucial to creating stable and ultimately profitable customer relationships. Three specific privacy concerns that have been frequently identified as being of importance to consumers include unauthorized secondary use of data, invasion of privacy, and errors. Results of a survey study indicate that both errors and invasion of privacy have a significant inverse relationship with online purchase behavior. Unauthorized use of secondary data appears to have little impact. Managerial implications include the careful selection of communication channels for maximum impact, the maintenance of discrete “permission-based” contact with consumers, and accurate recording and handling of data.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The main requirements to DRM platforms implementing effective user experience and strong security measures to prevent unauthorized use of content are discussed. Comparison of hardware-based and software- based platforms is made showing the general inherent advantages of hardware DRM solutions. Analysis and evaluation of the main flaws of hardware platforms are conducted, pointing out the possibilities to overcome them. The overview of the existing concepts for practical realization of hardware DRM protection reveals their advantages and disadvantages and the increasing demand for creation of multi-core architecture, which could assure an effective DRM protection without decreasing the user’s freedom and importing risks for end system security.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Considering the social and economic importance that the milk has, the objective of this study was to evaluate the incidence and quantifying antimicrobial residues in the food. The samples were collected in dairy industry of southwestern Paraná state and thus they were able to cover all ten municipalities in the region of Pato Branco. The work focused on the development of appropriate models for the identification and quantification of analytes: tetracycline, sulfamethazine, sulfadimethoxine, chloramphenicol and ampicillin, all antimicrobials with health interest. For the calibration procedure and validation of the models was used the Infrared Spectroscopy Fourier Transform associated with chemometric method based on Partial Least Squares regression (PLS - Partial Least Squares). To prepare a work solution antimicrobials, the five analytes of interest were used in increasing doses, namely tetracycline from 0 to 0.60 ppm, sulfamethazine 0 to 0.12 ppm, sulfadimethoxine 0 to 2.40 ppm chloramphenicol 0 1.20 ppm and ampicillin 0 to 1.80 ppm to perform the work with the interest in multiresidues analysis. The performance of the models constructed was evaluated through the figures of merit: mean square error of calibration and cross-validation, correlation coefficients and offset performance ratio. For the purposes of applicability in this work, it is considered that the models generated for Tetracycline, Sulfadimethoxine and Chloramphenicol were considered viable, with the greatest predictive power and efficiency, then were employed to evaluate the quality of raw milk from the region of Pato Branco . Among the analyzed samples by NIR, 70% were in conformity with sanitary legislation, and 5% of these samples had concentrations below the Maximum Residue permitted, and is also satisfactory. However 30% of the sample set showed unsatisfactory results when evaluating the contamination with antimicrobials residues, which is non conformity related to the presence of antimicrobial unauthorized use or concentrations above the permitted limits. With the development of this work can be said that laboratory tests in the food area, using infrared spectroscopy with multivariate calibration was also good, fast in analysis, reduced costs and with minimum generation of laboratory waste. Thus, the alternative method proposed meets the quality concerns and desired efficiency by industrial sectors and society in general.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is almost a tradition that celluloid (or digital) villains are represented with some characteristics that remind us the real political enemies of the producer country of the film, or even enemies within the country according to the particular ideology that sustains the film. The case of Christopher Nolan The Dark Knight trilogy, analyzed here, is representative of this trend for two reasons. First, because it gets marked by political radicalization conducted by the US government after the attack of September 11, 2001. Secondly, because it offers a profuse gallery of villains who are outside the circle of friends as the new doctrine “either with us or against us” opened by George Bush for the XXI century. This gallery includes from the very terrorists who justify the War on Terror (Ra's al Ghul, the Joker), to the “radical left” (Bane, Talia al Ghul) including liberal politicians (Harvey Dent), and corrupt that take advantage of the softness of the law to commit crimes with impunity (Dr. Crane, the Scarecrow).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The doctrine of fair use allows unauthorized copying of original works of art, music, and literature for limited purposes like criticism, research, and education, based on the rationale that copyright holders would consent to such uses if bargaining were possible. This paper develops the first formal analysis of fair use in an effort to derive the efficient legal standard for applying the doctrine. The model interprets copies and originals as differentiated products and defines fair use as a threshold separating permissible copying from infringement. Application of the analysis to several key cases (including the recent Napster case) shows that this interpretation is consistent with actual legal reasoning. The analysis also underscores the role of technology in shaping the efficient scope of fair use.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new technology is being proposed as a solution to the problem of unintentional facial detection and recognition in pictures in which the individuals appearing want to express their privacy preferences, through the use of different tags. The existing methods for face de-identification were mostly ad hoc solutions that only provided an absolute binary solution in a privacy context such as pixelation, or a bar mask. As the number and users of social networks are increasing, our preferences regarding our privacy may become more complex, leaving these absolute binary solutions as something obsolete. The proposed technology overcomes this problem by embedding information in a tag which will be placed close to the face without being disruptive. Through a decoding method the tag will provide the preferences that will be applied to the images in further stages.