• Title/Summary/Keyword: protection rights

Search Result 577, Processing Time 0.027 seconds

Unfair Contractual Clauses for the Transfer of Technology (국제기술이전계약상(國際技術移轉契約上)의 부공정조항(不公正條項)에 관한 연구(硏究))

  • Seo, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.107-132
    • /
    • 1999
  • The technology transfer agreements, which transfer technology from industrialized countries to developing countries, are subjected to control and restrictions in many developing countries in order to protect national interests. The licensors endeavour, therefore, to ensure that their activities fit satisfactorily into the technological policies and plans of the host countries, and contribute to the development of national scientific and technological potential, including the establishment and improvement in host countries of their capacity to innovate. Secondly, the licensors adopt in the course of their business activities practices which permit the rapid diffusion of technologies with due regard to the protection of industrial and intellectual property rights. Thirdly, the licensors endeavour to grant licenses for the use of industrial property rights or to otherwise transfer technology on reasonable terms and conditions.

  • PDF

A Constructive Study on the Carriers Liability Clauses of the Liner Bill of Lading (정기선용(定期船用) 표준선하증권상(標準船荷證券上)의 해상운송인(海上運送人) 책임약관(責任約款)에 관한 해석논적(解釋論的) 고찰(考察))

  • Kim, Jin-Kwon
    • Journal of the Korean Institute of Navigation
    • /
    • v.25 no.3
    • /
    • pp.283-296
    • /
    • 2001
  • As a matter of fact, the document which has been developed to resolve the obvious conflicts between the interests of buyer and seller is the bill of lading. The bill of lading provides the seller with some security against default by the buyer and the buyer with some assurance of performance of the seller before the buyer is required to make payment. So to speak, the B/L provides some extent protection for both seller and buyer. This is a study on the construction of Liner Bill of Lading(Code name : CONLINEBILL) adopted by BIMCO(The Baltic and International Maritime Conference) and is using a basic bill of lading in the liner ships operation. In this study, the writer makes a wider and deeper study of rights of rights and obligations of Contract Parties by means of the rules of construction, specially focusing the Carriers liability under Carriage of Goods by Sea Act 1971(COGSA 1971), Hague-Visby Rules and Korea Commercial Law.

  • PDF

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF

A Study on the Activation of the Technology Trade to Changing Trade Environment - Focusing on the Intellectual Property Rights - (통상환경 변화에 따른 기술무역 활성화 방안 - 지식재산권을 중심으로 -)

  • Seo, Gab-Sung;Kim, Jong-Sung
    • International Commerce and Information Review
    • /
    • v.10 no.2
    • /
    • pp.165-188
    • /
    • 2008
  • Some developed countries have already long been adapted to these changes in the international economic environment would improve productivity rather than traditional technology based on more high value-added business and increased investment. IPR protection is not just a national interest in the creation and growth of dimensions beyond the country's national competitiveness and a driving force to decide whether to challenge the core of the matter. Therefore, the importance of IPR in the country to raise awareness of IPR protection, and for systematic and comprehensive policy that will continue to be prepared.

  • PDF

Wavelet based Watermarking Technique for the Digital Contents Protection (지적재산권 보호를 위한 웨이블릿 기반 워터마킹 기술)

  • 송학현;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.912-917
    • /
    • 2004
  • The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyber-space. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we propose a wavelet based watermarking method which is used for implementing in the frequency domain.

Consumer Protection in E-commerce: Synthesis Review of Related Articles and Websites.

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.380-384
    • /
    • 2022
  • To have a complete and comprehensive understanding of the research subject and to form an integrated legal framework for it, I have sought comprehensively to cover the major written literature on the issue under consideration. I also benefitted from a wide range of research and academic studies pertaining to the same topic, although that literature did not specifically address the issue of consumer rights in electronic contracting in the Saudi e-commerce system. Rather, it addressed only the civil and criminal protection of the consumer in e-commerce. I have divided the reviewed literature into two sections according to the sources.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Data Protection and Privacy over the Internet: Towards Development of an International Standard (온라인 정보보호 및 프라이버시에 관한 국제 표준 개발)

  • Zoo, Hanah;Lee, Heejin;Kwak, Jooyoung;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.57-69
    • /
    • 2013
  • Progresses in ICT make the processing and exchange of personal data across international borders often necessary and relatively easy. The challenge lies in protecting fundamental rights and freedoms of individuals, notably the right to privacy and the right to personal information, while encouraging the free and secure flow of information across borders for the continued expansion of online transactions. The key to establishing a functioning international solution for personal data protection is to strike a right balance between the two camps which currently dominate the debate - the advocates of individual privacy rights on one side exemplified by the EU, and the proponents of self-regulation and economic efficiency on the other, represented by the U.S. In the face of a growing tension between the two sides each equipped with their own ideals, a practical solution may lie in utilizing established institutions of standardization such as ISO and IEC as a ground upon which an agreement can take its root.

The Comparison on the Investigative Training between the Current Korean National Police and the Law Enforcement Agencies of U.S.A. and Germany (현 대한민국 경찰의 수사교육과 미국, 독일 수사기관과의 비교)

  • Kim, Dae-Sik;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.52-80
    • /
    • 2007
  • In the rapidly changing current society, the Korean National Police(KNP) is facing a lot of demands from the citizens like the protection of subject/victim rights, independence of investigation authority, disclosure of actual truth, and prevention & eradication of crimes. It is widely recognized among the Korean people and the police that the KNP is always standing for the rights of the people and it is high time that the KNP should be restored as the pioneer for the protection of human right. In this situation, the tremendous emphasis is given on the importance of investment in investigative training through the long-term master-plan in order to renovate its constitution, to level up its quality, and to cope with the highly sophisticated crime patterns. Korean police have already shown its outstanding investigative skills of identification of the deceased throughout large cases like Daegu subway arson and tsunami in Southeast Asia. In addition, the skills of cyber crime investigation are highly recognized by foreign law enforcement agencies. However, the investigative skills and abilities are being degraded and the morale of the investigative personnel are falling due to the insufficiently of the finite training budget. Lack of financial support results in the lack of training program and poor training environment, which subsequently leads to the inefficiency of training. Additionally, no long-term budget for fostering specialized investigative agents is allotted. Considering the fact that more than 95% of crimes in Korea are being primarily investigated by the Korean police, we have to understand the importance of the police. By the tremendous investment in investigative training which can lead to the high-quality investigations, the Korean police can ultimately contribute to the protection of safety and life of its people.

  • PDF

Protecting Children's Online Privacy : Privacy Issues and Its Implications (아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로)

  • Rha, Jong-Youn;Cho, EunSun;Lee, SeungEun
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.23-31
    • /
    • 2020
  • As children's participation in online activities has recently increased, online services for children are also rapidly increasing, but children are not sufficiently guaranteed their rights. The purpose of this study is to classify and analyze issues related to the children's online privacy issues in Korea through the current status and case studies of application services mainly used by children. For this purpose, this research analyzed problems related to the children's online privacy protection according to the stage of using the application. As a result of the application content analysis, 1) issues of child identification, 2) effectiveness of notice and consent, and 3) issues of children's rights as subjects of information were derived. Based on the current status analysis, the policy implications were drawn based on the children's online privacy protection in the online environment, and suggestions were made for improvement.