Essays24.com - Term Papers and Free Essays
Search

Bug

Essay by   •  June 26, 2011  •  1,439 Words (6 Pages)  •  1,060 Views

Essay Preview: Bug

Report this essay
Page 1 of 6

Introduction

BUG, Inc is a company based in Any State, U.S.A that deals with surveillance techniques and devices. It designs, manufactures, and sells recording devices that are used by the several law enforcement agencies around the country. Police and FBI are just a few that use these devices to intercept and record sound and voices. The equipment taps into telephone wires, cell phones transmissions and picks up sounds and voices through the walls of a house or in open-air locations through the use of remote microphones. BUG has exclusive contracts with most state and federal law enforcement agencies throughout the United States. As BUG develops and becomes wide spread, newer companies are being critical competitors for their market share, making BUG struggle to protect its intellectual properties and the company itself.

Define Legal Protection of Intellection Properties

The four types of legal protections of intellectual property are patent, trademarks, copyrights and trade secrets. A patent is when they register your invention with the government, a process that can take more than a year. BUG, Inc can gain the legal right to exclude anyone else from manufacturing or marketing their products once the patent is approved. Patents cover tangible things (The IDG Network, 2002-2008). They can also be registered in foreign countries, to help keep international competitors from finding out what your company is doing. Patents usually last for 20 years.

A trademark is a name, phrase, sound or symbol used in association with services or products. It often connects a brand with a level of quality on which companies build a reputation. BUG’s logo is a ladybug wearing a set of headphones representing the models it makes. Protection of this trademark is something that BUG needs to ensure. Trademark protection lasts for 10 years after registration. But trademarks do not have to be registered (The IDG Network, 2002-2008). If a company creates a symbol or name it wishes to use exclusively, it can simply attach the TM symbol. This effectively marks the territory and gives the company room to prosecute if other companies attempt to use the same symbol for their own purposes.

Copyright laws are yet another protection that BUG should have for its intellectual property. Copyright laws protect written or artistic expressions fixed in a tangible medium such as novels, poems, songs or movies. A copyright also protects the expression of an idea. The owner of a copyright work has the right to make duplicate, to make unoriginal works from it (such as a movie based on a book), or to sell, perform or display the work to the public (The IDG Network, 2002-2008). A copyright lasts for the life of the author plus another 50 years.

Furthermore, trade secrets are a consideration for BUG as well. Any formulas, patterns, devices or compilation of data that grants the user an advantage over competitors is a trade secret. State law, rather than federal law covers this. To protect the secret, BUG must prove that it adds value to the company which is, in fact, a secret and that appropriate measures have been taken within the company to safeguard the secret, such as restricting knowledge to a select handful of executives.

(a) Civil Liability Steve May Face

WIRETAP Inc, a newly established company and major competitor of BUG Inc, hired employee Steve, to work “undercover” in the research and development department at BUG Inc, in Any State U.S.A. While employed at BUG, Steve used his hacking capabilities to intercept and forward all incoming and outgoing e-mails, both domestic and abroad to WIRETAP. On a weekly basis, Steve met with his WIRETAP boss to share any product information used by BUG Inc.

In this particular case, Steve entered into a contract with BUG Inc. Though the details of this contract are not provided, it is likely as with many major full-time employment contracts, many questions regarding other employment are asked. It is assumed in this case that Steve falsified his answer regarding being currently engaged with any other organizations on a full-time basis. This fact falls under one of four elements of fraudulent misrepresentation; “the wrongdoer made a false representation of material fact” (Cheeseman, 2007, p. Chapter 12, p.10). Another clause included in some contracts with employees, especially one as crucial of a role that Steve had in the research department at BUG, is an agreement to not acquire any position with an organization in the identical market or a major competitor.

The second clause of fraud states that “the wrongdoer intended to deceive the innocent party” (Cheeseman, 2007). Steve without questionable doubt took this job with the pure intent on deceiving BUG Inc. Though he was compensated for work performed, his services were only done for the purpose of maintaining the appearance of being a loyal employee and securing his job for the duration of WIRETAP needing product information.

The third clause: “the innocent party justifiably relied on the misrepresentation” (Cheeseman, 2007), is also true to this case. BUG Inc, relied on Steve, for product research and development. Dealing with such material would be considered classified at any major organization due to the nature of dealing with exclusive material that could be considered

...

...

Download as:   txt (8.9 Kb)   pdf (110.5 Kb)   docx (12.1 Kb)  
Continue for 5 more pages »
Only available on Essays24.com