Skip to main content
Top
Published in:
Cover of the book

2020 | OriginalPaper | Chapter

1. Introduction

Author : Dr. Marcelo Corrales Compagnucci

Published in: Big Data, Databases and "Ownership" Rights in the Cloud

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information technology law (or IT Law) is a new field that was practically unknown just a few decades ago. It goes back, however, to an era before the personal computer entered into mainstream markets. It was not until the mid-1990s and the rise of the Internet that the union of the fields of IT and Law into a unique system became more necessary.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Oskamp and Lodder (2006, pp. 3–4).
 
2
Alikhan and Mashelkar (2009, p. 19).
 
3
With the exception of Mexico and South Korea where database rights similar to the European countries also exists. See Article 108 of Mexico’s Federal Law on Copyright (Ley Federal del Derecho de Autor–LFDA). For a comparative study of the sui generis right between Mexico and the EU, see De La Parra Trujillo (pp. 101–124).
 
4
The work of Yale Braunstein, see Alikhan and Mashelkar (2009, p. 20).
 
5
Corrales Compagnucci et al. (2010, p. 287), Guadamuz (2006, p. 321).
 
6
Bainbridge (2008), Corrales Compagnucci et al. (2010, p. 287), Guadamuz (2006, p. 321).
 
7
See, generally, Kinsella (2008).
 
8
Schiaudone (2013, p. 332).
 
9
Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases.
 
10
See Digital Single Market, Summary Report of the Public Consultation on the Evaluation of Directive 96/9/EC on the Legal Protection of Databases, [online]. Available at: https://​ec.​europa.​eu/​digital-single-market/​en/​news/​summary-report-public-consultation-legal-protection-databases. Accessed June 10, 2019.
 
11
See Study in Support of the Evaluation of Directive 96/9/EC on the Legal Protection of Databases. Available at: https://​www.​technopolis-group.​com/​wp-content/​uploads/​2018/​07/​Study-in-Support-of-th-Evaluation-of-the-Database-Directive-.​pdf. Accessed June 10, 2019. In response to technological changes, the European Commission concluded the following: “(i) it is not (yet) clear how the sui generis right interacts; (ii) it could be advisable to clarify the notion of database maker; (iii) as far as possible, clarify the notions of substantial investment and substantial part including the notion of recorded and of created data; (iv) introduce a text and data mining exception; (v) as with European Commission’s own conclusion to the Digital Economy Package, it is advisable to wait before proceeding to a legislative intervention in this respect.” See also, Vollmer Database Directive Study: Options for Neutralising the Sui Generis Right, [online]. Available at: https://​www.​communia-association.​org/​2018/​05/​10/​database-directive-study-options-neutralising-sui-generis-right/​. Accessed June 10, 2019.
 
12
Murugesan and Ananth (2016, p. 4).
 
13
Muller (2015, p. 168).
 
14
Horten (2016, p. 135).
 
15
Lightman (2002), preface.
 
16
See, generally, Van Schewick (2010).
 
17
Lessig (1999), Reidenberg (1998, pp. 553–593).
 
18
See Bygrave and Bing (2009, pp. 3–4) (eds).
 
19
Balasubramanyam (2013, p. 102).
 
20
Srinivasan (2014, p. 5).
 
21
Millham (2012, p. 2).
 
22
Catlett et al. (2013) (eds.), preface.
 
23
Kasemsap (2015, p. 31).
 
24
Biswas (2014, p. 333).
 
25
Marinescu (2013), preface.
 
26
Kannan et al. (2016) (eds.), preface.
 
27
Chen (2014, pp. 12–13).
 
28
Mosco (2014).
 
29
Lake and Drake (2014, p. 164), Iannarelly and O’Shaughnessy (2015, p. 40).
 
30
Mackaay (1982, p. 173).
 
31
See, generally, Klarman (1991).
 
32
Viscusi (1998).
 
33
McCormick (2010, pp. 1–2).
 
34
An “end-user” is any natural or juridical person (i.e., one individual or a company) using a service deployed on a cloud. An end-user can also be a service software owner that has deployed the service on a given cloud, however, this is not the interpretation adopted in this book.
 
35
COM (2012) 529, final. Unleash the Potential of Cloud Computing in Europe. Available at: http://​eur-lex.​europa.​eu/​LexUriServ/​LexUriServ.​do?​uri=​COM:​2012:​0529:​FIN:​EN:​PDF. Accessed 10 July 2017.
 
36
Corrales Compagnucci (2012).
 
37
See, generally, Carr (2008).
 
38
See, generally, McAfee and Brynjolfsson (2012).
 
39
See, generally, Hashem et al. (2015, pp. 98–115).
 
40
See, generally, Al-Khouri (2012, pp. 1–8).
 
41
Property rights can be categorized in different ways, most of which fall outside the scope of this book. Generally, this term can be broken down in two main areas: (i) corporeal: covering items which relate to an object, a thing. Something tangible that is a physical good, i.e., a car, a computer; (ii) incorporeal: covering items which are not visible to the human eye. Something virtual and intangible by nature, i.e., data or information. See Robson and McCowan (1998, p. 15), Corrales Compagnucci et al. (2010, pp. 293–294), Elkin-Koren and Salzberger (2013, p. 44).
 
42
Article 11 paragraphs (1) and (2) of the Database Directive. See also Davison (2003, p. 97).
 
43
See Wu et al. (2013, pp. 235–244).
 
44
Alkhatib et al. (2014).
 
45
Thaler and Sunstein (2003, pp. 175–179), Sunstein and Thaler (2003, pp. 1159–1202).
 
46
Thaler, Sunstein and Balz (2010).
 
47
Wright and Ginsburg (2012, p. 1033).
 
48
See Coleman (2001).
 
49
Trochim (2006).
 
50
See Hon, Millard and Walden (2012, pp. 79–127).
 
51
See Vincent, Hart and Morton (2011, pp. 1–29).
 
52
COM (2012) 529 final, Commission Staff Working Document, Accompanying the document; Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Unleashing the Potential of Cloud Computing in Europe, Brussels, 27 September 2012.
 
53
Vincent, Hart and Morton (2011, p. 4).
 
Literature
go back to reference Alikhan S, Mashelkar R (2009) Intellectual property and competitive strategies in the 21st century, 2nd edn. Kluwer Law International, Alphen aan den Rijn, p. 19 Alikhan S, Mashelkar R (2009) Intellectual property and competitive strategies in the 21st century, 2nd edn. Kluwer Law International, Alphen aan den Rijn, p. 19
go back to reference Al-Khouri A (2012) Data ownership: who owns “my data”? Int J Manag Inf Technol 2(2):1–8 Al-Khouri A (2012) Data ownership: who owns “my data”? Int J Manag Inf Technol 2(2):1–8
go back to reference Bainbridge D (2008) Introduction to information technology law. Person Longman, London Bainbridge D (2008) Introduction to information technology law. Person Longman, London
go back to reference Balasubramanyam S (2013) Cloud-based development using classic life cycle model. In: Mahmood Z, Saqib S (eds) Software engineering frameworks for the cloud computing paradigm. Springer, London, p 102 Balasubramanyam S (2013) Cloud-based development using classic life cycle model. In: Mahmood Z, Saqib S (eds) Software engineering frameworks for the cloud computing paradigm. Springer, London, p 102
go back to reference Biswas S (2014) Relationship marketing: concepts, theories and cases, 2nd edn. Learning Private Limited, Delhi, p 333 Biswas S (2014) Relationship marketing: concepts, theories and cases, 2nd edn. Learning Private Limited, Delhi, p 333
go back to reference Bygrave L, Bing J (2009) (eds) Internet governance: infrastructure and institutions. Oxford University Press, Oxford, pp 3–4 Bygrave L, Bing J (2009) (eds) Internet governance: infrastructure and institutions. Oxford University Press, Oxford, pp 3–4
go back to reference Carr N (2008) The big switch: rewiring the world: from Edison to Google. W.W. Norton & Company, New York Carr N (2008) The big switch: rewiring the world: from Edison to Google. W.W. Norton & Company, New York
go back to reference Catlett C et al (2013) (eds) Cloud computing and big data, preface. IOS Press, Amsterdam Catlett C et al (2013) (eds) Cloud computing and big data, preface. IOS Press, Amsterdam
go back to reference Chen M et al (2014) Big data: related technologies, challenges and future prospects. Springer, Cham, pp 12–13 Chen M et al (2014) Big data: related technologies, challenges and future prospects. Springer, Cham, pp 12–13
go back to reference Coleman J (2001) The practice of principle: in defence of a pragmatist approach to legal theory. Oxford University Press, Oxford Coleman J (2001) The practice of principle: in defence of a pragmatist approach to legal theory. Oxford University Press, Oxford
go back to reference Corrales M et al (2010) Intellectual property rights in e-health: balancing out the interest at stake–a Herculean task? Int J Private Law 3(3):287CrossRef Corrales M et al (2010) Intellectual property rights in e-health: balancing out the interest at stake–a Herculean task? Int J Private Law 3(3):287CrossRef
go back to reference Corrales M (2012) EU commission calls to “unleash the potential of cloud computing in Europe.” Beck-Online, ZD-Aktuell, No. 03228 Corrales M (2012) EU commission calls to “unleash the potential of cloud computing in Europe.” Beck-Online, ZD-Aktuell, No. 03228
go back to reference Davison M (2003) The legal protection of databases. Cambridge University Press, Cambridge, p 97 Davison M (2003) The legal protection of databases. Cambridge University Press, Cambridge, p 97
go back to reference Elkin-Koren N, Salzberger E (2013) The law and economics of intellectual property in the digital age: the limits of analysis. Routledge, London, p 44 Elkin-Koren N, Salzberger E (2013) The law and economics of intellectual property in the digital age: the limits of analysis. Routledge, London, p 44
go back to reference Guadamuz A (2006) Open science: open source licenses in scientific research. N C J Law Technol 7(2):321 Guadamuz A (2006) Open science: open source licenses in scientific research. N C J Law Technol 7(2):321
go back to reference Hashem A et al (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115CrossRef Hashem A et al (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115CrossRef
go back to reference Hon W, Millard C, Walden I (2012) Negotiating cloud contracts: looking at clouds from both sides now. Stan Tech L Rev 81 16(1):79–129 Hon W, Millard C, Walden I (2012) Negotiating cloud contracts: looking at clouds from both sides now. Stan Tech L Rev 81 16(1):79–129
go back to reference Horten M (2016) Closing of the net. Polity Press, Cambridge Horten M (2016) Closing of the net. Polity Press, Cambridge
go back to reference Iannarelly J, O’Shaughnessy M (2015) Information governance and security: protecting and managing your company’s proprietary information. Butterworth Heinemann, Oxford, p 40 Iannarelly J, O’Shaughnessy M (2015) Information governance and security: protecting and managing your company’s proprietary information. Butterworth Heinemann, Oxford, p 40
go back to reference Kannan R et al (2016) (eds) Managing and processing big data in cloud computing. Preface. Information Science Reference (IGI Global), Hershey Kannan R et al (2016) (eds) Managing and processing big data in cloud computing. Preface. Information Science Reference (IGI Global), Hershey
go back to reference Kasemsap K (2015) The role of cloud computing adoption in global business. In: Chang V, Walters R, Wills G (eds) Delivery and adoption of cloud computing services in contemporary organizations. Information Science Reference (IGI Global), Hershey, p 31 Kasemsap K (2015) The role of cloud computing adoption in global business. In: Chang V, Walters R, Wills G (eds) Delivery and adoption of cloud computing services in contemporary organizations. Information Science Reference (IGI Global), Hershey, p 31
go back to reference Kinsella N (2008) Against intellectual property. Ludwig von Mises Institute, Auburn (AL) Kinsella N (2008) Against intellectual property. Ludwig von Mises Institute, Auburn (AL)
go back to reference Klarman S (1991) Margin of safety: risk-averse value investing strategies for the thoughtful investor, 1st edn. HarperCollins, New York Klarman S (1991) Margin of safety: risk-averse value investing strategies for the thoughtful investor, 1st edn. HarperCollins, New York
go back to reference Lake P, Drake R (2014) Information systems management in the big data era. Springer, Cham, p 164 Lake P, Drake R (2014) Information systems management in the big data era. Springer, Cham, p 164
go back to reference Lessig L (1999) Code, and other laws of cyberspace. Basic Books, New York Lessig L (1999) Code, and other laws of cyberspace. Basic Books, New York
go back to reference Lightman A (2002) Brave new unwired world: the digital big bang and the infinite internet, preface. Wiley, New York Lightman A (2002) Brave new unwired world: the digital big bang and the infinite internet, preface. Wiley, New York
go back to reference Mackaay E (1982) Economics of information and law. Kluwer Boston Inc., Boston, p 173CrossRef Mackaay E (1982) Economics of information and law. Kluwer Boston Inc., Boston, p 173CrossRef
go back to reference Marinescu D (2013) Cloud computing: theory and practice, preface. Morgan Kaufmann, WalthamCrossRef Marinescu D (2013) Cloud computing: theory and practice, preface. Morgan Kaufmann, WalthamCrossRef
go back to reference McCormick R (2010) Legal risks in the financial market, introduction, 2nd edn. Oxford University Press, Oxford, pp 1–2 McCormick R (2010) Legal risks in the financial market, introduction, 2nd edn. Oxford University Press, Oxford, pp 1–2
go back to reference Millham R (2012) Software asset re-use: migration of data-intensive legacy system to the cloud computing paradigm. In: Yang H, Liu X (eds) Software reuse in the emerging cloud computing era. Information Science Reference (IGI Global), Hershey, p 2 Millham R (2012) Software asset re-use: migration of data-intensive legacy system to the cloud computing paradigm. In: Yang H, Liu X (eds) Software reuse in the emerging cloud computing era. Information Science Reference (IGI Global), Hershey, p 2
go back to reference Mosco V (2014) To the cloud: big data in a turbulent world. Routledge, New York Mosco V (2014) To the cloud: big data in a turbulent world. Routledge, New York
go back to reference Muller H (2015) The big shift in IT leadership: How great CIOs leverage the power of technology for strategic business growth in the customer-centric economy. Wiley, Hoboken, p 168 Muller H (2015) The big shift in IT leadership: How great CIOs leverage the power of technology for strategic business growth in the customer-centric economy. Wiley, Hoboken, p 168
go back to reference Murugesan S, Ananth A (2016) Cloud computing: an overview. In: Murugesan S, Bojanova I (eds) Encyclopedia of cloud computing. Wiley, Chichester, p 4CrossRef Murugesan S, Ananth A (2016) Cloud computing: an overview. In: Murugesan S, Bojanova I (eds) Encyclopedia of cloud computing. Wiley, Chichester, p 4CrossRef
go back to reference Oskamp A, Lodder A (2006) Introduction: Law, Information Technology and Artificial Intelligence. In: Lodder A, Oskamp A (eds) Information technology and lawyers: advanced technology in the legal domain. From challenges to daily routine. Springer, Dordrecht, pp 3–4 Oskamp A, Lodder A (2006) Introduction: Law, Information Technology and Artificial Intelligence. In: Lodder A, Oskamp A (eds) Information technology and lawyers: advanced technology in the legal domain. From challenges to daily routine. Springer, Dordrecht, pp 3–4
go back to reference Reidenberg J (1998) Lex informatica: the formulation of information policy rules through technology. Tex Law Rev 71:553–593 Reidenberg J (1998) Lex informatica: the formulation of information policy rules through technology. Tex Law Rev 71:553–593
go back to reference Robson P, McCowan A (1998) Property law, Green’s concise scots law, 2nd edn. Sweet & Maxwell, Edinburgh, p 15 Robson P, McCowan A (1998) Property law, Green’s concise scots law, 2nd edn. Sweet & Maxwell, Edinburgh, p 15
go back to reference Schiaudone R (2013) Dealing with IP matters in cross-border cases. J Intellect Prop Law Pract 8(4):332CrossRef Schiaudone R (2013) Dealing with IP matters in cross-border cases. J Intellect Prop Law Pract 8(4):332CrossRef
go back to reference Srinivasan S (2014) Cloud computing basics. Springer Briefs in Electrical and Computer Engineering. Springer, New York, p 5CrossRef Srinivasan S (2014) Cloud computing basics. Springer Briefs in Electrical and Computer Engineering. Springer, New York, p 5CrossRef
go back to reference Sunstein C, Thaler R (2003) Libertarian paternalism is not an oxymoron. Univ Chic Law Rev 70(4):1159–1202CrossRef Sunstein C, Thaler R (2003) Libertarian paternalism is not an oxymoron. Univ Chic Law Rev 70(4):1159–1202CrossRef
go back to reference Thaler R, Sunstein C (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179CrossRef Thaler R, Sunstein C (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179CrossRef
go back to reference Van Schewick B (2010) Internet architecture and innovation. The MIT Press, CambridgeCrossRef Van Schewick B (2010) Internet architecture and innovation. The MIT Press, CambridgeCrossRef
go back to reference Viscusi W (1998) Rational risk policy: The 1996 Arne Ryde memorial lectures. Clarendon Press, OxfordCrossRef Viscusi W (1998) Rational risk policy: The 1996 Arne Ryde memorial lectures. Clarendon Press, OxfordCrossRef
go back to reference Wright J, Ginsburg D (2012) Behavioral law and economics: its origins, fatal flaws, and implications for liberty. Northwest Univ Law Rev 106(3):1033 Wright J, Ginsburg D (2012) Behavioral law and economics: its origins, fatal flaws, and implications for liberty. Northwest Univ Law Rev 106(3):1033
go back to reference Wu L et al (2013) Automated SLA negotiation framework for cloud computing. In: Balaji P, Epema D, Fahringer T (eds) Cluster, cloud, and grid computing, 13th IEEE/ACM International Symposium, May 13-16 2013 Delft, Netherlands. IEEE Computer Society, Los Alamitos, pp 235–244 Wu L et al (2013) Automated SLA negotiation framework for cloud computing. In: Balaji P, Epema D, Fahringer T (eds) Cluster, cloud, and grid computing, 13th IEEE/ACM International Symposium, May 13-16 2013 Delft, Netherlands. IEEE Computer Society, Los Alamitos, pp 235–244
Metadata
Title
Introduction
Author
Dr. Marcelo Corrales Compagnucci
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0349-8_1