This website uses cookies to ensure you have the best experience. Learn more

Bug Inc. Essay

1975 words - 8 pages

Heading One - Legal ProtectionsBUG will have several types of legal protections to consider, such as patents, copyrights, trademarks, and contractual. A patent is a grant or contract of property rights, approved by the Patent and Trademark Office. This will be useful, seeing that part of BUG Inc.'s equipment is driven by software, which was designed by employees of the company. A Trademark is a distinctive way in which businesses goods and services are represented. These could be in the form of a logo, symbol, words, or brand names for packaging purposes. This will provide security for BUG's company logo when expanding internationally.A Copyright, which is the protection the law affords original literary, artistic works, and sound recordings, will aide BUG Inc. in protecting their products, their software, their design of the "ladybug wearing a set of microphones" and their electronic recording devices. This also known as Intellectual property, which refers to the inventions of ones mind such as artistic or literary works, images, and designs, commonly used in commerce.Seeing that BUG Inc. is also involved with state and federal law enforcement agencies, which means there will be contracts involved, they should also think about contractual protections. This type of protection will prove its worthiness when BUG begins expansion of its sales to international markets. It will provide policyholders insurance against the actions, or omissions of actions, by a foreign government that would or could prevent or restrict the performance of a contract and also deprive a company of all or part of its financial investment and assets.Heading Two - Civil Liability of WiretapIn today's competitive market trust and honesty are at a shortfall. Many employees lack those important characteristics which is why organizations should not give someone 100% trust, some may think that this is not a good idea because of the fact that the employees are the ones who help a company function so it is only reasonable to say that trust is bestowed upon them but there should be limits to that trust.When limits are set then the possibility of wrongdoings occurring is not as high. In the case of BUG and WIRETAP, I would say that WIRETAP's strategy is definitely unprofessional and should not have been used as a means of beating out the competition. Steve is wrong by partaking in this plan of sharing information that is confidential; clearly the trust given to Steve by BUG was more than it should have been. If an organization is going to be successful and proud of it being corrupt is absolutely not the way of achieving this.If Steve gets caught by BUG he would definitely face a civil liability. Why? Simply because he is injuring property of BUG by knowingly sharing information with the competition. As per the definition of civil liability, the liability can incurred regardless of whether or not the injury was an accident or intentional. What Steve is doing is unethical and he should...

Find Another Essay On BUG Inc.

Bug, Inc. paper

1652 words - 7 pages Bug, Inc. is a successful United States company that wants to expand into international markets. In doing so, many legal issues arise. Some of these legal issues deal with intellectual property, civil liability, torts, e-commerce responsibilities, tort liability, and strict liability.Patents, copyrights, and trademarks are types of intellectual property rights that help to legally protect companies like Bug, Inc. (Cheeseman, 2004, chap. 17

Bug Inc. Paper

1581 words - 6 pages people who have bought goods or services from various companies online and that those companies are not able to sell the information to other companies without the consent of the individual. (Cheeseman, 2004)Patents protect the design of the electronic invention devices manufactured by BUG Inc. from other parties copying them. Patents can be protected for 20 years from the date of the patent application is filed with the United States Patent and

Bug, Inc. Paper

1089 words - 4 pages Bug PAGE \* Arabic 6 BUG, INC. PaperUniversity of PhoenixTeam EBUS / 415 Business LawDr. Deborah AlsupApril 16, 2008Bug, Inc. PaperNew age technologies are on the rise in the United States (U.S.) and abroad. Bug, Inc. (Bug) manufactures, designs, and sells electronic recording devices in the U.S. They also manufacture products internationally. Demands for their products are increasing in the International sales markets. Bug is currently making

BUG, Inc. Paper

1052 words - 4 pages agencies and therefore warrant just as many reasons as there are available to protect their "trade secret". According to the Uniform Trade Secrets Act, it is legitimate for BUG, Inc. to sue Canadian based WIRETAP for misappropriation and present criminal charges against Steve for the theft and copyright infringement. The violation of the Espionage Act is punishable by law of criminal penalties and punitive damages fine of up to $10 million per act as

BUG, INC. Paper

1069 words - 4 pages New age technologies are on the rise in the United States (U.S.) and abroad. Bug, Inc. (Bug) manufactures, designs, and sells electronic recording devices in the U.S. They also manufacture products internationally. Demands for their products are increasing in the International sales markets. Bug is currently making decisions to expand the sales department to market products internationally. Bug has some ongoing concerns and issues that must be

BUG, Inc - legal protection

956 words - 4 pages driven by software written by BUG employees. BUG has exclusive contracts with most state and federal law enforcement agencies throughout the United States. This paper will discuss the legal protections BUG should have for its intellectual property.BUG, Inc - legal protectionIntellectual PropertyIntellectual property law is conventionally categorized according to subject matter: inventions, artistic expression, secrets, semiconductor designs, and

The Internet: How Private is Your Privacy?

1437 words - 6 pages , companies were caught off guard by the discovery of what is now known as the Heartbleed Bug. This bug unveiled just how shaky the Internet really is. This bug has not only affected major companies but also everyday Internet users by allowing hackers to access what is supposed to be private information under the protection of OpenSSL software, or open source. This bug is so malicious that it has been causing trouble undetected for more than two

Clothing Store: Urban Outfitters INC

1143 words - 5 pages Since the 1970’s Urban Outfitters INC. has produced a wide selection of clothing brands for the younger generation. Urban Outfitters INC. includes Free People, BHLDN, Anthropologie, Terrain and Urban Outfitters. The beginning of Urban Outfitters INC. started out in Philadelphia for college students, their fun loving affordable clothing appealed to students who were living under a college budget. It’s known for its “hipster” and “free thinking

Transport Layer Security

1305 words - 5 pages -a-6491/op-1>. Mutton, Paul. Half a million widely trusted websites vulnerable to Heartbleed bug. 8 April 2014. Web. 26 April 2014. . Qualys, Inc. SSL Pulse. 5 April 2014. Web. 25 April 2014. . Sherr, Ian and Nick Wingfield. Play by Play: Sony's Struggles on Breach. 7 May 2011. Web. 26 April 2014. .

Marxist Lens Analysis of Kafka's Metamorphosis

1507 words - 6 pages Marxist Lens Analysis of the Metamorphosis Alyssa Chacon Franz Kafka’s The Metamorphosis is a novella that follows the story of Gregor Samsa who, one day, wakes up as an insect. On the surface, it’s just a story about a man who’s transformed into a bug; but, when deeper analyzed, you come to understand that it’s a about a man who was always a bug conflicted by his identity in a class struggle between what is known as the proletariat and the

The Recent History of Computers

1075 words - 4 pages ://www.computerhistory.org/timeline>. Dingman, Shane. "How the Heartbleed bug works, and what passwords you need to change." The Globe and Mail. Philip Crawly, 9 Apr. 2014. Web. 11 Apr. 2014. . "Happy Birthday, Mac.." Apple. Apple Inc., n.d. Web. 11 Apr. 2014. . "What is a computer virus?." Computer Virus: What It Is and What It Does. Microsoft, n.d. Web. 17 Apr. 2014. .

Similar Essays

Bug Inc Essay

2471 words - 10 pages BUG, Inc. PAGE \* MERGEFORMAT 1 Running head: BUG, INC.BUG, Inc.Rebecca Barnes, Dennis Benipayo, Glenda Henriquez, Chuck Major, Myaunza MyersUniversity of PhoenixBusiness LawBUS/415Patricia A. TurnageJanuary 26, 2009BUG, Inc.In today's uncertain market, businesses may encounter innumerable challenges. Owners of any size or type of business cannot merely be concerned with profits, growth, and recognition; they must also be concerned with the

Bug, Inc Essay

1211 words - 5 pages BUG, Inc., a Delaware corporation whose main office is located in Los Angeles, California, designs, manufactures, and sells electronic recording devices. (University of Phoenix, 2009) Some of BUG, Inc.’s products are used for surveillance purposes specific to recording and monitoring wire transmittals, conversations, sounds and various telecommunication systems. The company’s clients include law enforcement agencies in throughout

Bug Inc Essay

2011 words - 8 pages Bug, Inc’s., logo is a “ladybug with headphones” (Cheeseman, 2007). This trademark will “prevent consumers from being confused as to the origin of goods and services” (Cheeseman, 2007)This leads to trademark infringement which means any person whom is not authorized to use any part of the logo or mark will and can get sued under this infringement. Having patents on products are supported by law of “Patent

Bug Inc Essay

2315 words - 9 pages investing in top of the line equipment to incorporating a diverse labor force and looking at the legal matters regarding all aspects relative to the international market. This paper will discuss BUG, Inc. and their journey into expanding sales to international markets. The team will elaborate on the legal protections necessary for Bug's intellectual property and the legal implications regarding the betrayal of internal employees. Certain scenarios will