Mami Systems Case Summary

Great Essays
Underscoring virtually all of the conceptual difficulties of copyright protection for computer software is an uneasy match between a legal mechanism aimed at protecting the fruits of creative labor, which has evolved for centuries around artistic and literary concepts, and devices that control a machine. It is not surprising, therefore, that prior to the enactment of the Copyright Act of 1976 and the advent of mass-marketed computers for use in homes and small businesses, the interests of program developers were protected largely by trade secrecy and by contract. Nevertheless, when Congress enacted the 1976 Act it appointed CONTU 6 to study, inter alia, the possibility of extending copyright protection to computer programs,17 while provisionally …show more content…
Among the software provided by MAI is the operating system software necessary for the computers' operation.29 Peak Computer, Inc. provides routine maintenance and ordinary repairs for computer systems. Prior to the dispute, a majority of Peak's business came from the repair of MAI computers." On March 17, 1992, MAI filed suit in district court against Peak, alleging in part that Peak's use of MAI software constituted copyright infringement and seeking a temporary restraining order and a preliminary injunction. MAI received a preliminary injunction that barred Peak from "infringing MAI's copyrights in any manner and from using.., or otherwise disposing of any copies or portions of copies of [certain] MAI copyrighted [programs]."3 The order also barred Peak from "maintaining any MAI computer system."33 The court subsequently granted partial summary judgment for MAI and entered a permanent injunction enjoining Peak from "copying, disseminating, selling, purchasing, distributing, loaning, or otherwise infringing MAI's copyrighted works, or any derivatives thereof."' The …show more content…
Finally, the court dismissed the possibility that Peak's use might be protected by section 117, asserting that the Peak customers did not qualify as "owners" under section

Related Documents

  • Improved Essays

    On March 5, 2018, at approximately 1745 hours, Investigator Mems was notified by Sgt. Schmeckenbecher of a deceased person at 10900 Panther Mountain Road in Little Rock AR, Sgt Schmeckenbecher advised Investigator Mems the deceased had been in the residence for a period of time. Investigator Mems responded to the scene and met with Investigator Geary and patrol deputies. Sgt. Schmeckenbecher also arrived on scene meeting with investigators Geary and Mems outside the residence.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Plaintiff at trial was Cellco Partnership, now Appellant. Defendant at trial, Shelby County, now Appellee. Facts: Cellco Partnership, Appellant, originally entered a lease agreement in 1995 with Cellco Partnership (Verizon) allowing an easement to Stonebridge Water Tower. In 2000, Highway 64 learned that Verizon had installed cellular equipment on Stonebridge Water Tower and accused them of trespassing and threatened to file a suit against them. In 2001, Verizon (Cellco Partnership) filed a complaint against Shelby County and Highway 64 seeking a declaratory judgement stating the Verizon has the right to use the gravel access road or a declaratory judgement stating that Shelby County must provide Verizon with access to Stonebridge Water Tower, security from Shelby County to cover liability Verizon incurred from third parties as a result of a breach of the Verizon Lease, and an injunction…

    • 549 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Village Key Case

    • 516 Words
    • 3 Pages

    The court did not forbid Gupton in engaging in competition with Village Key. In petition to the Fifth District Court of Appeal they found that the 1990 amendment shouldn’t be taken into account because the parties entered into their contract in 1989 and the amendment should be applied prospectively not retrospectively. However, the district court noted that the trial court only applied the 1990 amendment because no one had brought the pre-1990 version upfront. It is also important to note that under the 1989 statue the court’s authority was limited regarding non-compete agreements, they could only authorize a non-compete agreement based on timeliness and geographical limitations. The district court reversed and remanded the trial court because the trial jury’s decision did not stop Gupton from entering into competition with Village Key.…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Knowing all of the above alternatives, the smartest strategic plan for Mercan Systems, Inc. is to enter the market through a joint venture. After they chose a partner to enter into business with, it is most cost effective for them to expand into four regions initially and employ selling through dealer channels. Implementation Plan for the Chosen Alternative Choosing a joint venture is the best all-around entry process for such a large corporation. It allows the right amount of risk to reward ratio, allowing them to maintain more control over operations as well as saving some initial outlay.…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Feist Publication, Inc v. Rural Telephone Service Co and Maverick Recording Co. v Harper are two cases of copyright infringement. The court ruled in both cases that there was evidence of copying. However, in Maverick Recording Co. v. Harper, the court determined that there was infringement. In the Feist v. Rural, there was copying of the yellow pages (advertisement) and not the white pages. In Maverick v. Harper, the courts determined that there was infringement because Harper admitted to copyright infringement for 6 songs.…

    • 576 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Syllabus: A statute in the state Kansas make it a misdemeanor for any person participating in “debt adjusting”, with an exception to the practice of law. This statute does not violate the Fourteenth Amendment Due Process Clause since states have the power to enact what they consider injurious practices in commercial and business affairs. The statute is valid as long as the laws do not conflict with specific constitutional rulings and federal law. Procedural History: This case was filed by Skrupa doing business as “Credit Advisors” alleged that Skrupa engaged in “debt adjusting”. A three judge court heard evidence from Skrupa alleging the usefulness and desirability of the business as well as evidence by the state alleging that “debt advising” leads to grave abuses against distressed debtors, particularly in lower income brackets.…

    • 304 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Dynamic Vs Dynamic Court

    • 1797 Words
    • 8 Pages

    Some cases in the Supreme Court’s history stand out more than others. The case of Microsoft v. AT&T is an example of such a case. This case, which resulted in a major and influential ruling on the inclusion of software coding in patent laws, is an example of a dynamic ruling. This claim will be further explored, but first it is necessary to build an understanding of the meaning of both the dynamic and constrained perspectives. 1.…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Blown To Bits Analysis

    • 893 Words
    • 4 Pages

    Blown to Bits Chapter 6: Balance Toppled Summary: Chapter 6 of Blown to Bits is a very interesting chapter. Chapter six dives into the often undefined world of copyright rights in computing. Copyright laws allow people to have full rights over their creative works and ideas, but this concept does not translate very well into the world of technology. Because information can be transferred with unparalleled ease in the computing age, intentional and unintentional copyright violations have become common.…

    • 893 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In “Piracy is Stealing and Affecting Music Industry”, Beverly Storrs informs about the outcome of pirating music on the music industry. Using the Webster’s Dictionary definition, Storrs defines what piracy is and then puts it into context for music piracy. Then, the essay begins to explain how people think that it is not that big of a deal to illegally download music but Storrs uses statistics from the Recording Industry Association of America to show otherwise. The Recording Industry Association of America claims that when pirating music, this not only affects the artist but the individuals who work in the music industry as well with 70,000 music industry workers without a job and losing two billion dollars in compensation. The author uses…

    • 1501 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Polymem Case Studies

    • 78 Words
    • 1 Pages

    Upon my arrival in the patient’s room, he was on contact precaution because of MDR stenotrophomonas maltophilia. He was a mechanically ventilated patient with a tracheostomy of size 8 mm. He also had a special kind of gauze which is called polymem to prevent any skin sore. I heard crackles bilaterally, so I performed in line suctioning, his secretions were thick, color was greenish yellow with moderate amount. The yellow color of the secretion mostly indicates an infection.…

    • 78 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    H.R. 5800/S. 2981- Secure Data Act of 2014 The United States Constitution under the Fourth Amendment ensures our right to be free from unreasonable searches and seizures, and by extension has been interpreted to protect our right of privacy. The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” (The Charters of Freedom). There has been much controversy as to what is considered to be protected under constitutional law relating to one’s right of privacy. Although a reasonable right to privacy is not explicitly stated in the Constitution, this particular right has developed into a civil liberty protected by the Fourth, Fifth and Fourteenth amendments.…

    • 1800 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    “Should Gamers be Prosecuted for Virtual Stealing?” By Alex Weiss Textual Analysis Alex Weiss, a graduate from Arizona State University, wrote this essay on virtual theft for his Work and Play in Contemporary Fiction/Digital Media class. It was later published in the online magazine Slate (Bullock and Goggin 731). Weiss is clearly an educated writer, but refrains from fairly acknowledging the other side of his argument: that gamers should not be prosecuted for virtual theft.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the essay, “How Computers Change the Way We Think”, written by Sherry Turkle, begins by explaining her first experience on how PCs change the way we think. Turkle, a Professor of the Social Studies of Science and Technology at the Massachusetts Institute of Technology, talks about the move from slide guidelines to calculators and how it was troublesome for that move for college students. Turkle proceeds on and discusses how technology gives individuals another approach to consider knowing and understanding. Likewise, Turkle concentrates on privacy and how middle-school and high-school students have a tendency to give out personal information without any safeguard. In the essay, Turkle discusses some computer programs that are being created…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Mabo Case Analysis

    • 1040 Words
    • 5 Pages

    Aboriginal and Torres Strait Islander people have struggled to gain equality and cultural recognition among the people that took away their rights and freedoms along with taking their land. Although through many years of struggling, with resilience and strength, the ATSI people have repossessed the rights and freedoms they always deserved. Aboriginal and Torres Strait Islander people may have gained back their rights, but they are still at a disadvantage in our society, as a matter of fact, they rate as among the most disadvantaged peoples in Australia; so how much of society’s attitudes have really changed? The treatment of the ATSI people is a part of what has shaped contemporary Australia today, our behaviour and actions towards Aboriginal…

    • 1040 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This organization is enrolled by means of the USA copyright office, for example, Service Provider, for example, "Advanced Millennium Copyright Act 17 USC 512. Likewise, an announcement that confirm affiliation has a decent conviction that apply the material in feedback of unapproved through the copyright proprietor, the operators or laws (apple, 2015). Apple 's security approach is to make the methodology for utilizing, putting away, exchanging and gathering individual data of clients. Site of Apple is an intuitive applications, email messages, online administrations and commercials may be apply cookies and different innovations in particular web signals and pixel labels. These innovations support organization to better comprehend the conduct of clients, illuminate them which some piece of their site they went to, measure and encourage the viability of web inquiries and notice.…

    • 905 Words
    • 4 Pages
    Improved Essays