This website uses cookies to ensure you have the best experience. Learn more

Bug Inc Essay

2471 words - 10 pages

BUG, Inc. PAGE \* MERGEFORMAT 1
Running head: BUG, INC.BUG, Inc.Rebecca Barnes, Dennis Benipayo, Glenda Henriquez, Chuck Major, Myaunza MyersUniversity of PhoenixBusiness LawBUS/415Patricia A. TurnageJanuary 26, 2009BUG, Inc.In today's uncertain market, businesses may encounter innumerable challenges. Owners of any size or type of business cannot merely be concerned with profits, growth, and recognition; they must also be concerned with the protection of their property, assets, customers, and the activities of their employees. Many businesses lose sight of these issues and find that they are liable for negligent wrongdoing, or find that their business advantages no longer exist.Protection of intellectual property, product liability, fraud, assumption of risk, and protection when utilizing on-line commerce are all common issues a modern business may encounter. Bug, Inc., a company based in the US that manufactures and sells electronic recording devices, has run into these types of issues. To follow are six scenarios involving Bug, Inc. and its employees. For each scenario, we will explain the conflict, and then state what liabilities exist for Bug, Inc. We will also detail any conflict of law issues and our recommendations on how these may be handled.BUG should have a few different types of legal protections for its intellectual property. Intellectual property is valuable in distinguishing a business from its competitors. Trade secrets, patents, copyrights, and trademarks serve to encourage fair competition in business. Through the use of such devices, consumers are protected from confusing one company's products from another and companies are protected from competitors profiting from their ingenuity.First of all, Bug must take precautions to guard its trade secrets from being discovered by others. Under the Uniform Trade Secrets Act, if its trade secrets are stolen, BUG can bring an action to recover profits from the competition, recover for damages, and the court can order an injunction to keep the competitor from using the secret or sharing it with others.Under the Federal patent laws, BUG is entitled to patent its unique software and hardware. As a patent holder, BUG owns exclusive rights to its patents for 14 years. If someone uses the software or unique hardware design without authorization, BUG can sue to recover damages caused by the misuse of the product. Software copyrights can also protect BUG's intellectual property. Congress has enacted the Computer Software Copyright Act which authorizes BUG to register software programs with the Registrar of Copyright. If a competitor or anyone else infringes upon the copyright, BUG may sue to recover profits and damages and can request the court to issue an order to destroy the infringing work and order an injunction protecting against further infringement. The court can also award statutory damages of $150,000 instead of actual damages if it so chooses.Federal law protects trademarks, service...

Find Another Essay On Bug Inc

Bug, Inc. paper

1652 words - 7 pages Bug, Inc. is a successful United States company that wants to expand into international markets. In doing so, many legal issues arise. Some of these legal issues deal with intellectual property, civil liability, torts, e-commerce responsibilities, tort liability, and strict liability.Patents, copyrights, and trademarks are types of intellectual property rights that help to legally protect companies like Bug, Inc. (Cheeseman, 2004, chap. 17

Bug Inc. Paper

1581 words - 6 pages people who have bought goods or services from various companies online and that those companies are not able to sell the information to other companies without the consent of the individual. (Cheeseman, 2004)Patents protect the design of the electronic invention devices manufactured by BUG Inc. from other parties copying them. Patents can be protected for 20 years from the date of the patent application is filed with the United States Patent and

Bug, Inc. Paper

1089 words - 4 pages Bug PAGE \* Arabic 6 BUG, INC. PaperUniversity of PhoenixTeam EBUS / 415 Business LawDr. Deborah AlsupApril 16, 2008Bug, Inc. PaperNew age technologies are on the rise in the United States (U.S.) and abroad. Bug, Inc. (Bug) manufactures, designs, and sells electronic recording devices in the U.S. They also manufacture products internationally. Demands for their products are increasing in the International sales markets. Bug is currently making

BUG, Inc. Paper

1052 words - 4 pages agencies and therefore warrant just as many reasons as there are available to protect their "trade secret". According to the Uniform Trade Secrets Act, it is legitimate for BUG, Inc. to sue Canadian based WIRETAP for misappropriation and present criminal charges against Steve for the theft and copyright infringement. The violation of the Espionage Act is punishable by law of criminal penalties and punitive damages fine of up to $10 million per act as

BUG, INC. Paper

1069 words - 4 pages New age technologies are on the rise in the United States (U.S.) and abroad. Bug, Inc. (Bug) manufactures, designs, and sells electronic recording devices in the U.S. They also manufacture products internationally. Demands for their products are increasing in the International sales markets. Bug is currently making decisions to expand the sales department to market products internationally. Bug has some ongoing concerns and issues that must be

BUG, Inc - legal protection

956 words - 4 pages driven by software written by BUG employees. BUG has exclusive contracts with most state and federal law enforcement agencies throughout the United States. This paper will discuss the legal protections BUG should have for its intellectual property.BUG, Inc - legal protectionIntellectual PropertyIntellectual property law is conventionally categorized according to subject matter: inventions, artistic expression, secrets, semiconductor designs, and

The Internet: How Private is Your Privacy?

1437 words - 6 pages , companies were caught off guard by the discovery of what is now known as the Heartbleed Bug. This bug unveiled just how shaky the Internet really is. This bug has not only affected major companies but also everyday Internet users by allowing hackers to access what is supposed to be private information under the protection of OpenSSL software, or open source. This bug is so malicious that it has been causing trouble undetected for more than two

Clothing Store: Urban Outfitters INC

1143 words - 5 pages Since the 1970’s Urban Outfitters INC. has produced a wide selection of clothing brands for the younger generation. Urban Outfitters INC. includes Free People, BHLDN, Anthropologie, Terrain and Urban Outfitters. The beginning of Urban Outfitters INC. started out in Philadelphia for college students, their fun loving affordable clothing appealed to students who were living under a college budget. It’s known for its “hipster” and “free thinking

Transport Layer Security

1305 words - 5 pages -a-6491/op-1>. Mutton, Paul. Half a million widely trusted websites vulnerable to Heartbleed bug. 8 April 2014. Web. 26 April 2014. . Qualys, Inc. SSL Pulse. 5 April 2014. Web. 25 April 2014. . Sherr, Ian and Nick Wingfield. Play by Play: Sony's Struggles on Breach. 7 May 2011. Web. 26 April 2014. .

Marxist Lens Analysis of Kafka's Metamorphosis

1507 words - 6 pages Marxist Lens Analysis of the Metamorphosis Alyssa Chacon Franz Kafka’s The Metamorphosis is a novella that follows the story of Gregor Samsa who, one day, wakes up as an insect. On the surface, it’s just a story about a man who’s transformed into a bug; but, when deeper analyzed, you come to understand that it’s a about a man who was always a bug conflicted by his identity in a class struggle between what is known as the proletariat and the

The Recent History of Computers

1075 words - 4 pages ://www.computerhistory.org/timeline>. Dingman, Shane. "How the Heartbleed bug works, and what passwords you need to change." The Globe and Mail. Philip Crawly, 9 Apr. 2014. Web. 11 Apr. 2014. . "Happy Birthday, Mac.." Apple. Apple Inc., n.d. Web. 11 Apr. 2014. . "What is a computer virus?." Computer Virus: What It Is and What It Does. Microsoft, n.d. Web. 17 Apr. 2014. .

Similar Essays

Bug, Inc Essay

1211 words - 5 pages BUG, Inc., a Delaware corporation whose main office is located in Los Angeles, California, designs, manufactures, and sells electronic recording devices. (University of Phoenix, 2009) Some of BUG, Inc.’s products are used for surveillance purposes specific to recording and monitoring wire transmittals, conversations, sounds and various telecommunication systems. The company’s clients include law enforcement agencies in throughout

Bug Inc Essay

1975 words - 8 pages Heading One - Legal ProtectionsBUG will have several types of legal protections to consider, such as patents, copyrights, trademarks, and contractual. A patent is a grant or contract of property rights, approved by the Patent and Trademark Office. This will be useful, seeing that part of BUG Inc.'s equipment is driven by software, which was designed by employees of the company. A Trademark is a distinctive way in which businesses goods and

Bug Inc Essay

2011 words - 8 pages Bug, Inc’s., logo is a “ladybug with headphones” (Cheeseman, 2007). This trademark will “prevent consumers from being confused as to the origin of goods and services” (Cheeseman, 2007)This leads to trademark infringement which means any person whom is not authorized to use any part of the logo or mark will and can get sued under this infringement. Having patents on products are supported by law of “Patent

Bug Inc Essay

2315 words - 9 pages investing in top of the line equipment to incorporating a diverse labor force and looking at the legal matters regarding all aspects relative to the international market. This paper will discuss BUG, Inc. and their journey into expanding sales to international markets. The team will elaborate on the legal protections necessary for Bug's intellectual property and the legal implications regarding the betrayal of internal employees. Certain scenarios will