Difference between revisions of "Student Projects:Database Protection:Introduction"

From CSEP590TU
Jump to: navigation, search
(David's stuff here)
Line 1: Line 1:
==intro of intro (collaborative -- everyone pitch in)==
+
In recent years, a good deal of concern has arisen regarding the right of entities that own databases to control how those databases are used. Many believe that databases require more protection than existing copyright law provides. Without additional protection, assert proponents of database protection, companies are discouraged from investing in the creation of databases because the fruits of their efforts could be stolen by any number of parties. Several countries have recently adopted or considered legislation designed to protect the rights of database owners.  
In recent years, a good deal of concern has arisen regarding the right of entities that own databases to control how those databases are used. Many believe that databases require more protection that is given by existing copyright law. Without additional protection, assert proponents of database protection, companies are discouraged from investing in the creation of databases because the fruits of their efforts could be stolen by any number of parties. Several countries have recently adopted or considered legislation designed to protect the rights of database owners.
 
  
Database owners and their competitors, however, are not the only parties concerned with this kind of legislation. Groups that are not direct competitors of the database owners, rely on access to data from many different sources. Additional protection may make their tasks more difficult or even impossible.
+
Database owners and their competitors, however, are not the only parties concerned with this kind of legislation. Groups that are not direct competitors of the database owners, rely on access to data from many different sources. Additional protection may make their tasks more difficult or even impossible.  
  
Assuming that protection for databases is necessary, what methods are available? There are several potential methods that will be discussed in the body of this paper.  In order to understand the methods, some background on the applicability of existing law is necessary.  Certain foreign contries have employed database legislation (EU Directive)that represents one method of protection and so we will examine that legislation and the feedback/results that been generated from it thusfar.  Similarly, the Health Insurance Portability and Accountability Privacy Rule (HIPAA) represents an example of what database protection may look like.  As with the EU Directive, we will look at the HIPAA and the views surrounding itIt is our hope that consideration of (1) the various choices (of protection) available and (2) the effects flowing from implementation of particular protection (EU Directive and HIPAA) will allow for informed decision making with respect to the future database protection in this country.
+
Assuming that more protection for databases is desirable, what methods are available? This paper discusses several possible mechanisms.   
  
==David's stuff here==
+
There are at least three potential avenues to consider when determining what protection methodology to employ:  
The current debate surroundind database protection asks the question: "what type of protection should be utilized?"  There are at least three potential avenues to consider when determining what protection methodology to employ: (1) Institution of Legislation imitating Copyright Law and the offering similar protection to databases; (2) Extension of a body of case law know as the "hot news" cases; and (3) Retention of the status quo.
+
1. Institution of Legislation imitating Copyright Law and the offering similar protection to databases
 +
2. Extension of a body of case law known as the "hot news" cases
 +
3. Retention of the status quo.  
 +
We will start by providing some background on the current state of affairs (the applicability of copyright law and the hot news cases), discussing the three options listed above, and touching on the legislation currently under consideration in the United States.
  
This section provides some background on the current state of affairs (the applicability of copyright law and the hot news cases), discusses the three options listed above; and touhes on the legislation currently under consideration in the United States.
+
Next we will examine the state of affairs in Europe.  In 1996 the European Union enacted a major Directive to bolster the rights of database owners. Not only does the Directive explicitly extend copyright protection to databases, but it also creates a new type of sui generis right for database owners. The Directive has drawn a great deal of criticism from groups who fear its unintended effects on scientists, libraries, and other groups. We examine the track record of the Directive in EU courts, and the first official efforts to evaluate the Directive's effects, and provide some hope for groups concerned about the Directive's direct or indirect effects on their ability to make use of data.
  
==(Damon's stuff)==
+
In the next section, we explore the clinical researchers’ views on statutory database protection in the form of the Health Insurance Portability and Accountability Acts’ Privacy Rule, HIPAA. Our goal is to reconcile the researchers’ generally negative views on the subject with the costs and benefits of HIPAA implementation as he perceives them.
In 1996 the European Union enacted a major Directive to bolster the rights of database owners.  Not only does the Directive explicitly extend copyright protection to databases, but it also creates a new type of ''sui generis'' right for database owners.  The Directive has drawn a great deal of criticism from groups who fear its unintended effects on scientists, libraries, and other groups. We examine the track record of the Directive in EU courts, and the first official efforts to evaluate the Directive's effects, and provide some hope for groups concerned about the Directive's direct or indirect effects on their ability to make use of data.
 
  
==(Don's stuff)==
+
== (Elijah's and Charistel's stuff goes here) ==
Next we aim to explore the clinical researchers’ views on statutory database protection in the form of the Health Insurance Portability and Accountability Acts’ Privacy Rule, HIPAA.  Our goal is to reconcile the researchers’ generally negative views on the subject with the costs and benefits of HIPAA implementation as he perceives them.
 
  
==Elijah's and Charistel's stuff here==
+
These types of database protection are in their infancy.  There are a great variety of approaches to the problem, all of them largely untried and therefore, in a sense, equally valid. We make a comparison between these different approaches, evaluate their effects to date, and show that all such approaches carry inherent impediments to scientific research.
 
 
==summary of intro (collaborative -- everyone pitch in)==
 
These types of database protection are in their infancy, and so there are a great variety of approaches to the problem, all of them largely untried and therefore, in a sense, equally valid. We make a comparison between these different approaches, evaluate their effects to date, and show that all such approaches carry inherent impediments to scientific research.
 

Revision as of 00:31, 11 December 2004

In recent years, a good deal of concern has arisen regarding the right of entities that own databases to control how those databases are used. Many believe that databases require more protection than existing copyright law provides. Without additional protection, assert proponents of database protection, companies are discouraged from investing in the creation of databases because the fruits of their efforts could be stolen by any number of parties. Several countries have recently adopted or considered legislation designed to protect the rights of database owners.

Database owners and their competitors, however, are not the only parties concerned with this kind of legislation. Groups that are not direct competitors of the database owners, rely on access to data from many different sources. Additional protection may make their tasks more difficult or even impossible.

Assuming that more protection for databases is desirable, what methods are available? This paper discusses several possible mechanisms.

There are at least three potential avenues to consider when determining what protection methodology to employ: 1. Institution of Legislation imitating Copyright Law and the offering similar protection to databases 2. Extension of a body of case law known as the "hot news" cases 3. Retention of the status quo. We will start by providing some background on the current state of affairs (the applicability of copyright law and the hot news cases), discussing the three options listed above, and touching on the legislation currently under consideration in the United States.

Next we will examine the state of affairs in Europe. In 1996 the European Union enacted a major Directive to bolster the rights of database owners. Not only does the Directive explicitly extend copyright protection to databases, but it also creates a new type of sui generis right for database owners. The Directive has drawn a great deal of criticism from groups who fear its unintended effects on scientists, libraries, and other groups. We examine the track record of the Directive in EU courts, and the first official efforts to evaluate the Directive's effects, and provide some hope for groups concerned about the Directive's direct or indirect effects on their ability to make use of data.

In the next section, we explore the clinical researchers’ views on statutory database protection in the form of the Health Insurance Portability and Accountability Acts’ Privacy Rule, HIPAA. Our goal is to reconcile the researchers’ generally negative views on the subject with the costs and benefits of HIPAA implementation as he perceives them.

(Elijah's and Charistel's stuff goes here)

These types of database protection are in their infancy. There are a great variety of approaches to the problem, all of them largely untried and therefore, in a sense, equally valid. We make a comparison between these different approaches, evaluate their effects to date, and show that all such approaches carry inherent impediments to scientific research.