What is fair use principle under copyright law

Assignment Help Computer Network Security
Reference no: EM133276509

Overview

After an eleven-year battle in the case of Google LLC v. Oracle America, Inc., No. 18-956, the Supreme Court sided with Google against Oracle in a long-running copyright dispute over the software used in Android's mobile operating system. The case concerned 12,000 lines of code that Google used to build Android that were copied from the Java application programming interface developed by Sun Microsystems, which Oracle acquired in 2010. It was seen as a landmark dispute over what types of computer code are protected under American copyright law. Google claimed that its use of the code was covered under the doctrine of fair use and therefore not subject to copyright liability.

Based on this case and a further research,

What is the fair use principle under copyright law?

What were the foundations of Google's and Oracle's arguments?

What impact does the final ruling have on the IT industry?

What's your conclusion?

Reference no: EM133276509

Questions Cloud

How would you define the culture this project lives in : How would you define the culture this project lives in Identify the measures of success for this project and What are the challenges that must be managed
Research a report on how vegans can cover their iron needs : Plants have iron, but plant-based iron does not absorb well in human body. Please research and provide a brief report on how vegans can cover their iron needs.
Square brackets and semi-colons in Java : Consider the use of curly brackets, square brackets, and semi-colons in Java. What would the code be like without them?
Example of foods that are good for a healthy microbiota : The relationship between the gut microbiota and the digestive disorder I choseand Include an example of foods that are good for a healthy microbiota.
What is fair use principle under copyright law : What is the fair use principle under copyright law? What were the foundations of Google's and Oracle's arguments?
Are there team members who have special needs : Centennial College PMGT Are there team members who have special needs? Will the team need special training to manage diversity? uu Life cycle approaches
Technical magazine and have legal analysis : Select an article on an emerging technology from a reputable journal or technical magazine and have a legal analysis.
Understanding of strategic impact of big data : Your task in this final project is to write research paper demonstrating your understanding of the strategic impact of big data
How do you feel about sales personnel in stores-gyms : How do you feel about sales personnel in stores, gyms and online selling/promoting supplements, when the majority of the time they are unqualified?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze and explain how you would use dns in your plan

Analyze and explain how you would use DNS in your plan. Compose a two-paragraph executive summary highlighting the main points of your plan.

  Risk management and malicious attacks

With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these responses..

  Provide a basic network security plan

The new Exam Company, which will specialize in hosting online examinations, has just hired you to be the network administrator responsible for all network.

  Describe the vpn deployment planning for the enterprise

Once you chose a topic, write a reflection (3-4 paragraphs of approximately 200-to-250 words). You need to research this topic and add your comments about it.

  Determine the routing table of the de-vice

Determine the routing table of the de-vice/interface with an IP address of 194.66.79.2. You might want to take a look at slide 68 of Chapter 5 notes.

  How would matt get joel to support his ideas

Describe your top ideas for Matt to present to Joel next week. How would Matt get Joel to support his ideas?

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  Identify different computer crimes that you are aware of

Computer crime has become a serious matter; for your Discussion Board post, consider the following: Identify 3 different computer crimes that you are aware of

  Clearly describes the security strategy being proposed

Clearly describes the security strategy being proposed. Strategy covers the confidentiality, integrity and availability. Link Solutions by clearly describes the linkage between each technology and the strategy.

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  Assign suitable ip addresses to each device of your choice

Assign IP addresses to these devices in order to enable networking among them. Assign suitable IP addresses to each device of your choice

  Calculate actual data throughput against underlying data

KF7031 - Wireless Networks and Security - Northumbria University - 802.11 WLAN data throughput and security overheads - perform a number of experiments

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd