Skip to main content

Part of the book series: Perspectives in Law, Business and Innovation ((PLBI))

  • 816 Accesses

Abstract

Information technology law (or IT Law) is a new field that was practically unknown just a few decades ago. It goes back, however, to an era before the personal computer entered into mainstream markets. It was not until the mid-1990s and the rise of the Internet that the union of the fields of IT and Law into a unique system became more necessary.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Oskamp and Lodder (2006, pp. 3–4).

  2. 2.

    Alikhan and Mashelkar (2009, p. 19).

  3. 3.

    With the exception of Mexico and South Korea where database rights similar to the European countries also exists. See Article 108 of Mexico’s Federal Law on Copyright (Ley Federal del Derecho de Autor–LFDA). For a comparative study of the sui generis right between Mexico and the EU, see De La Parra Trujillo (pp. 101–124).

  4. 4.

    The work of Yale Braunstein, see Alikhan and Mashelkar (2009, p. 20).

  5. 5.

    Corrales Compagnucci et al. (2010, p. 287), Guadamuz (2006, p. 321).

  6. 6.

    Bainbridge (2008), Corrales Compagnucci et al. (2010, p. 287), Guadamuz (2006, p. 321).

  7. 7.

    See, generally, Kinsella (2008).

  8. 8.

    Schiaudone (2013, p. 332).

  9. 9.

    Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases.

  10. 10.

    See Digital Single Market, Summary Report of the Public Consultation on the Evaluation of Directive 96/9/EC on the Legal Protection of Databases , [online]. Available at: https://ec.europa.eu/digital-single-market/en/news/summary-report-public-consultation-legal-protection-databases. Accessed June 10, 2019.

  11. 11.

    See Study in Support of the Evaluation of Directive 96/9/EC on the Legal Protection of Databases . Available at: https://www.technopolis-group.com/wp-content/uploads/2018/07/Study-in-Support-of-th-Evaluation-of-the-Database-Directive-.pdf. Accessed June 10, 2019. In response to technological changes, the European Commission concluded the following: “(i) it is not (yet) clear how the sui generis right interacts; (ii) it could be advisable to clarify the notion of database maker; (iii) as far as possible, clarify the notions of substantial investment and substantial part including the notion of recorded and of created data ; (iv) introduce a text and data mining exception; (v) as with European Commission ’s own conclusion to the Digital Economy Package, it is advisable to wait before proceeding to a legislative intervention in this respect.” See also, Vollmer Database Directive Study: Options for Neutralising the Sui Generis Right , [online]. Available at: https://www.communia-association.org/2018/05/10/database-directive-study-options-neutralising-sui-generis-right/. Accessed June 10, 2019.

  12. 12.

    Murugesan and Ananth (2016, p. 4).

  13. 13.

    Muller (2015, p. 168).

  14. 14.

    Horten (2016, p. 135).

  15. 15.

    Lightman (2002), preface.

  16. 16.

    See, generally, Van Schewick (2010).

  17. 17.

    Lessig (1999), Reidenberg (1998, pp. 553–593).

  18. 18.

    See Bygrave and Bing (2009, pp. 3–4) (eds).

  19. 19.

    Balasubramanyam (2013, p. 102).

  20. 20.

    Srinivasan (2014, p. 5).

  21. 21.

    Millham (2012, p. 2).

  22. 22.

    Catlett et al. (2013) (eds.), preface.

  23. 23.

    Kasemsap (2015, p. 31).

  24. 24.

    Biswas (2014, p. 333).

  25. 25.

    Marinescu (2013), preface.

  26. 26.

    Kannan et al. (2016) (eds.), preface.

  27. 27.

    Chen (2014, pp. 12–13).

  28. 28.

    Mosco (2014).

  29. 29.

    Lake and Drake (2014, p. 164), Iannarelly and O’Shaughnessy (2015, p. 40).

  30. 30.

    Mackaay (1982, p. 173).

  31. 31.

    See, generally, Klarman (1991).

  32. 32.

    Viscusi (1998).

  33. 33.

    McCormick (2010, pp. 1–2).

  34. 34.

    An “end-user” is any natural or juridical person (i.e., one individual or a company) using a service deployed on a cloud. An end-user can also be a service software owner that has deployed the service on a given cloud, however, this is not the interpretation adopted in this book.

  35. 35.

    COM (2012) 529, final. Unleash the Potential of Cloud Computing in Europe. Available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF. Accessed 10 July 2017.

  36. 36.

    Corrales Compagnucci (2012).

  37. 37.

    See, generally, Carr (2008).

  38. 38.

    See, generally, McAfee and Brynjolfsson (2012).

  39. 39.

    See, generally, Hashem et al. (2015, pp. 98–115).

  40. 40.

    See, generally, Al-Khouri (2012, pp. 1–8).

  41. 41.

    Property rights can be categorized in different ways, most of which fall outside the scope of this book. Generally, this term can be broken down in two main areas: (i) corporeal: covering items which relate to an object, a thing. Something tangible that is a physical good, i.e., a car, a computer; (ii) incorporeal: covering items which are not visible to the human eye. Something virtual and intangible by nature, i.e., data or information. See Robson and McCowan (1998, p. 15), Corrales Compagnucci et al. (2010, pp. 293–294), Elkin-Koren and Salzberger (2013, p. 44).

  42. 42.

    Article 11 paragraphs (1) and (2) of the Database Directive. See also Davison (2003, p. 97).

  43. 43.

    See Wu et al. (2013, pp. 235–244).

  44. 44.

    Alkhatib et al. (2014).

  45. 45.

    Thaler and Sunstein (2003, pp. 175–179), Sunstein and Thaler (2003, pp. 1159–1202).

  46. 46.

    Thaler, Sunstein and Balz (2010).

  47. 47.

    Wright and Ginsburg (2012, p. 1033).

  48. 48.

    See Coleman (2001).

  49. 49.

    Trochim (2006).

  50. 50.

    See Hon, Millard and Walden (2012, pp. 79–127).

  51. 51.

    See Vincent, Hart and Morton (2011, pp. 1–29).

  52. 52.

    COM (2012) 529 final, Commission Staff Working Document, Accompanying the document; Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Unleashing the Potential of Cloud Computing in Europe, Brussels, 27 September 2012.

  53. 53.

    Vincent, Hart and Morton (2011, p. 4).

References

  • Alkhatib H et al (2014) IEEE CS 2022 http://www.computer.org/cms/Computer.org/ComputingNow/2022Report.pdf#page=5. Accessed 10 May 2019

  • Alikhan S, Mashelkar R (2009) Intellectual property and competitive strategies in the 21st century, 2nd edn. Kluwer Law International, Alphen aan den Rijn, p. 19

    Google Scholar 

  • Al-Khouri A (2012) Data ownership: who owns “my data”? Int J Manag Inf Technol 2(2):1–8

    Google Scholar 

  • Bainbridge D (2008) Introduction to information technology law. Person Longman, London

    Google Scholar 

  • Balasubramanyam S (2013) Cloud-based development using classic life cycle model. In: Mahmood Z, Saqib S (eds) Software engineering frameworks for the cloud computing paradigm. Springer, London, p 102

    Google Scholar 

  • Biswas S (2014) Relationship marketing: concepts, theories and cases, 2nd edn. Learning Private Limited, Delhi, p 333

    Google Scholar 

  • Bygrave L, Bing J (2009) (eds) Internet governance: infrastructure and institutions. Oxford University Press, Oxford, pp 3–4

    Google Scholar 

  • Carr N (2008) The big switch: rewiring the world: from Edison to Google. W.W. Norton & Company, New York

    Google Scholar 

  • Catlett C et al (2013) (eds) Cloud computing and big data, preface. IOS Press, Amsterdam

    Google Scholar 

  • Chen M et al (2014) Big data: related technologies, challenges and future prospects. Springer, Cham, pp 12–13

    Google Scholar 

  • Coleman J (2001) The practice of principle: in defence of a pragmatist approach to legal theory. Oxford University Press, Oxford

    Google Scholar 

  • Corrales M et al (2010) Intellectual property rights in e-health: balancing out the interest at stake–a Herculean task? Int J Private Law 3(3):287

    Article  Google Scholar 

  • Corrales M (2012) EU commission calls to “unleash the potential of cloud computing in Europe.” Beck-Online, ZD-Aktuell, No. 03228

    Google Scholar 

  • Davison M (2003) The legal protection of databases. Cambridge University Press, Cambridge, p 97

    Google Scholar 

  • Elkin-Koren N, Salzberger E (2013) The law and economics of intellectual property in the digital age: the limits of analysis. Routledge, London, p 44

    Google Scholar 

  • Guadamuz A (2006) Open science: open source licenses in scientific research. N C J Law Technol 7(2):321

    Google Scholar 

  • Hashem A et al (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115

    Article  Google Scholar 

  • Hon W, Millard C, Walden I (2012) Negotiating cloud contracts: looking at clouds from both sides now. Stan Tech L Rev 81 16(1):79–129

    Google Scholar 

  • Horten M (2016) Closing of the net. Polity Press, Cambridge

    Google Scholar 

  • Iannarelly J, O’Shaughnessy M (2015) Information governance and security: protecting and managing your company’s proprietary information. Butterworth Heinemann, Oxford, p 40

    Google Scholar 

  • Kannan R et al (2016) (eds) Managing and processing big data in cloud computing. Preface. Information Science Reference (IGI Global), Hershey

    Google Scholar 

  • Kasemsap K (2015) The role of cloud computing adoption in global business. In: Chang V, Walters R, Wills G (eds) Delivery and adoption of cloud computing services in contemporary organizations. Information Science Reference (IGI Global), Hershey, p 31

    Google Scholar 

  • Kinsella N (2008) Against intellectual property. Ludwig von Mises Institute, Auburn (AL)

    Google Scholar 

  • Klarman S (1991) Margin of safety: risk-averse value investing strategies for the thoughtful investor, 1st edn. HarperCollins, New York

    Google Scholar 

  • Lake P, Drake R (2014) Information systems management in the big data era. Springer, Cham, p 164

    Google Scholar 

  • Lessig L (1999) Code, and other laws of cyberspace. Basic Books, New York

    Google Scholar 

  • Lightman A (2002) Brave new unwired world: the digital big bang and the infinite internet, preface. Wiley, New York

    Google Scholar 

  • Mackaay E (1982) Economics of information and law. Kluwer Boston Inc., Boston, p 173

    Chapter  Google Scholar 

  • Marinescu D (2013) Cloud computing: theory and practice, preface. Morgan Kaufmann, Waltham

    Chapter  Google Scholar 

  • McAfee A, Brynjolfsson E (2012) Big data: the management revolution. Harv Bus Rev. https://hbr.org/2012/10/big-data-the-management-revolution/ar. Accessed 10 May 2019

  • McCormick R (2010) Legal risks in the financial market, introduction, 2nd edn. Oxford University Press, Oxford, pp 1–2

    Google Scholar 

  • Millham R (2012) Software asset re-use: migration of data-intensive legacy system to the cloud computing paradigm. In: Yang H, Liu X (eds) Software reuse in the emerging cloud computing era. Information Science Reference (IGI Global), Hershey, p 2

    Google Scholar 

  • Mosco V (2014) To the cloud: big data in a turbulent world. Routledge, New York

    Google Scholar 

  • Muller H (2015) The big shift in IT leadership: How great CIOs leverage the power of technology for strategic business growth in the customer-centric economy. Wiley, Hoboken, p 168

    Google Scholar 

  • Murugesan S, Ananth A (2016) Cloud computing: an overview. In: Murugesan S, Bojanova I (eds) Encyclopedia of cloud computing. Wiley, Chichester, p 4

    Chapter  Google Scholar 

  • Oskamp A, Lodder A (2006) Introduction: Law, Information Technology and Artificial Intelligence. In: Lodder A, Oskamp A (eds) Information technology and lawyers: advanced technology in the legal domain. From challenges to daily routine. Springer, Dordrecht, pp 3–4

    Google Scholar 

  • Reidenberg J (1998) Lex informatica: the formulation of information policy rules through technology. Tex Law Rev 71:553–593

    Google Scholar 

  • Robson P, McCowan A (1998) Property law, Green’s concise scots law, 2nd edn. Sweet & Maxwell, Edinburgh, p 15

    Google Scholar 

  • Schiaudone R (2013) Dealing with IP matters in cross-border cases. J Intellect Prop Law Pract 8(4):332

    Article  Google Scholar 

  • Srinivasan S (2014) Cloud computing basics. Springer Briefs in Electrical and Computer Engineering. Springer, New York, p 5

    Book  Google Scholar 

  • Sunstein C, Thaler R (2003) Libertarian paternalism is not an oxymoron. Univ Chic Law Rev 70(4):1159–1202

    Article  Google Scholar 

  • Thaler R, Sunstein C (2003) Libertarian paternalism. Am Econ Rev 93(2):175–179

    Article  Google Scholar 

  • Thaler R, Sunstein C, Balz J (2010) Choice architecture http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1583509. Accessed 10 May 2019

  • Trochim W (2006) Philosophy of research, research methods knowledge base http://www.socialresearchmethods.net/kb/philosophy.php. Accessed 10 May 2019

  • Van Schewick B (2010) Internet architecture and innovation. The MIT Press, Cambridge

    Book  Google Scholar 

  • Vincent M, Hart N, Morton K (2011) Cloud computing contracts white paper: a survey of terms and conditions. Truman Hoyle Lawyers, Sydney, Australia, pp 1–21. www.it-news.com.au/pdf/CloudComputing-Contracts-White-Paper.pdf. Accessed 10 May 2019

  • Viscusi W (1998) Rational risk policy: The 1996 Arne Ryde memorial lectures. Clarendon Press, Oxford

    Book  Google Scholar 

  • Wright J, Ginsburg D (2012) Behavioral law and economics: its origins, fatal flaws, and implications for liberty. Northwest Univ Law Rev 106(3):1033

    Google Scholar 

  • Wu L et al (2013) Automated SLA negotiation framework for cloud computing. In: Balaji P, Epema D, Fahringer T (eds) Cluster, cloud, and grid computing, 13th IEEE/ACM International Symposium, May 13-16 2013 Delft, Netherlands. IEEE Computer Society, Los Alamitos, pp 235–244

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcelo Corrales Compagnucci .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Corrales Compagnucci, M. (2020). Introduction. In: Big Data, Databases and "Ownership" Rights in the Cloud. Perspectives in Law, Business and Innovation. Springer, Singapore. https://doi.org/10.1007/978-981-15-0349-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0349-8_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0348-1

  • Online ISBN: 978-981-15-0349-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics