What are computer information transactions

Assignment Help Computer Engineering
Reference no: EM1338282

Uniform Law for Computer Info Transactions is Offered National Law Journal, August 30, 1999.

After more than 10 years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws (NCCUSL) at long last voted to adopt the Uniform Computer Information Transactions Act (UCITA) on July 29. Like its better known cousin, the Uniform Commercial Code (UCC), this act is intended to promote uniformity in the area of computer information transactions.

"What are computer information transactions?" you ask? Under the language of the model act, they would include any "commercial agreements to create, modify, transfer or distribute computer software, multimedia interactive products, computer data and databases [and] Internet and online information." Members of the NCCUSL have been concerned about the lack of clear, consistent rules governing such transactions in this rapidly expanding part of our national economy (which now accounts for more than a third of the nation's economic growth). Contracts for computer information may be valid in one state while not in others, or terms within such contracts may or may not be enforced, thus creating uncertainty and risk which both sides to such contracts would prefer to avoid.

Five basic themes underlie many of the provisions of the UCITA. They are the following:

Computer information transactions involve licenses, not sales.

Small companies play a more significant role in the computer information industry than many other industries.

Computer information transactions implicate fundamental free speech issues.

Freedom to contract and practical commercial context of the transactions are important.

The law should facilitate continued expansion of e-commerce and be technologically neutral.

Like the UCC, the UCITA will remain as a model act until it has been presented to each state's legislature and until it is adopted as part of the state's statutory law. That could be its biggest hurdle yet. Several well-funded information industry groups remain opposed to some of the terms contained in the model act's language. Many consumer advocates would also like to see more protection for consumers be added. Because these groups may have more sway over legislatures in some states than others, the result may be a uniform act that differs from state to state. Does that sound unusual? Its not-remember that UCITA's distant cousin, the UCC, also varies from state to state.

Write a 1-2 page paper answering the following questions:

1. Before the UCC and the UCITA, what was one of the first, and most significant, of the U.S. government's attempts to promote uniformity in commercial laws from state to state? (Hint: think of "commerce" and Constitution).
2. Based on the information presented above, what do you see as the major differences between Article 2 of the Uniform Commercial Code and UCITA?
3. What is the legal distinction between selling a product and licensing it?
4. Many of the provisions in the UCITA were first proposed as a modification to Article 2 of the UCC. Why do you think the drafters decided to propose it as a separate and distinct uniform act?

Reference no: EM1338282

Questions Cloud

Historical transformation : How do you perceive the historical transformation from the collapse of Rome to the dawn of the Middle Ages?
Information about valuation models : Acort Industries owns assets that will have an 60% probability of having the market value of $55 million in one year. What is the expected return of Acort's equity without leverage? What is the expected return of Acort's equity with the leverage?
Asssume that a monopolist must choose between two points : Asssume that a monopolist must choose between two points in its demand curve: it can sell 100 units for $3 or it can sell 140 for $2. Which of the following is true.
Various models of health care organizations : What triggered the various models of health care organizations to come and go? explain your answer.
What are computer information transactions : Computer information transactions involve licenses, not sales.Small companies play a more important role in the computer information industry than many other industries.
Assume you are an aid to a government official deciding : Assume you are an aid to a government official deciding on some recently proposed excise tax on the welfare of her constituents.
Explain description of business models : Explain Description of business models and Imagine that you are a consultant for a start-up website company that collects information and resources on health and fitness
Investigate and analyse the effect of applying cmmi practice : ITECH3501- 6501 Principles of Software Engineering:  Investigate and analyse the effect of applying CMMI practices/processes in an Agile environment in terms of business performance improvement and the limitations/restrictions of using both, and writ..
Equity financing and debt financing : Explain, using examples, the differences between equity financing and debt financing. Name two types of long-term debt financing and list the relative advantages and disadvantages (to the borrower) of each.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Write down a program to test class rectangle

make a class Rectangle. The class has attributes length and width, each of which defaults to 1. It has methods that calculate the perimeter and the area of the rectangle

  Define the affect the amendments have on evidence discovery

define the affect the amendments have on evidence discovery, collection, and preservation techniques and the legal aspects of search warrants and the related device and data seizure.

  Health care services

Compare and contrast the cost-effectiveness, benefit-cost, and cost-utility analysis and find which is most useful to assess value of the health care services overall.

  Digital technique for transmission of voice-telephone system

State four benefits and one de-merits of utilizing the digital (rather than analog) techniques for transmission of the voice-telephone signals.

  Find out largest, smallest, and median values of array c

Your program must ask for a number and print "YES" if the number is in array a, otherwise print "not found"

  Programming field as career

Unfortunately, there are fewer women within the programming fields that there are men, encourage women to go into these fields

  Desirable to force users to creat an explicit choice

Why is it not desirable to force users to build an explicit choice of a query processing strategy? Are there cases where it is desirable for users to be aware of the costs of competing query-processing strategie.

  Give a two to three paragraphs explaining soap

Simple Object Access Potoccol. How is SOAP linked to XML and HTTP? Assume that your readers are familiar with browsing the internet, but they have no technical knowledge of how it works behind the scene.

  Make instances of each class

plan a Java class named Person with fields for holding a person's name, address and telephone number.

  Advantages and disadvantages to using cots

What are the advantages and disadvantages to using COTS (Commercial Off-the-Shelf) software versus writing your own software within a company environment? Give some examples of problems you have had.

  Design a basic jsp page

Submit your JSP page along with your screenshots that show what your code has produced

  Read and follow the directions in creating an archive

How do the algorithm techniques of fragmentation affect the end result of sorting by larger amounts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd