legal protection for computers and data, 649
copyright, 649
intellectual property, 650
originality, 651
fair use, 651
copyright registration, 652
copyright infringement, 652
Digital Millenium Copyright Act, 653
patent, 655
novelty, 656
patent registration, 656
patent infringement, 657
trade secret, 658
reverse engineering, 658
trade secret enforcement, 659
information, 663
information depletion, 663
information replication, 664
information marginal cost, 664
information timeliness, 664
information tangibility, 665
information commerce, 665
electronic publishing, 666
database, 666
electronic commerce, 666
crimnal law, 667
civil law, 667
tort law, 667
contract law, 668
employer and employee rights, 670
product ownership, 670
patent ownership, 670
copyright ownership, 671
work for hire, 671
license, 671
employment contract, 672
property, 673
redress for faulty software, 673
U.S. Uniform Commercial Code, 674
warranty of cyberworthiness, 675
vulnerability reporting, 675
rules of evidence, 680
U.S. Computer Fraud and Abuse Act, 683
U.S. Economic Espionage Act, 683
U.S. Electronic Funds Transfer Act, 683
U.S. Freedom of Information Act, 684
U.S. Privacy Act, 684
U.S. Electronic Communications Privacy Act, 684
Gramm-Leach-Bliley Act, 684
HIPAA, 684
USA Patriot Act, 685
CAN SPAM Act, 685
California breach notification, 686
Council of Europe Agreement on Cybercrime, 687
cryptographylegality of use, 689
export of cryptography, 690
escrowed encryption, 691
ethics, 692
religion, 694
ethical pluralism, 695
ethical reasoning, 695
teleology, 696
egoism, 696
utilitarianism, 697
deontology, 697
rule-deontology, 697
code of ethics, 710