Software Design OUR THESIS Software companies should be liable for damages caused by buggy software.

Slides:



Advertisements
Similar presentations
In the case of an accident in your country during a transboundary movement of hazardous wastes, who will be liable for the damage caused according to domestic.
Advertisements

TAKAFUL VS INSURANCE.
Chapter 21: Strict Liability
CHAPTER Current Future Contract Law for E-Commerce Current Future Contract Law for E-Commerce 9.
Chapter 18 Torts.
COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.
Trends in Licensing Models NINCH Copyright Town Meeting March 23, 2002 ARLIS-NA/VRA.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
1 ON-LINE CONTRACTING n What law applies? –Uniform Commercial Code, Article 2 –Uniform Computer Information Transaction Act (UCITA) - formerly UCC, Art.
Computer Security and Liability Roxana Hernandez-Pastrana Ryan Herring Jinghua Luo Kevin Mack Shahram Rezaei Dec. 6, 2005.
Nabarro Nathanson Workshop on Software Quality and the Legal System Friday 13th February 2004 Safety Related Systems: The Legal Framework Dai Davis Solicitor.
Module 8: Software Issues: Risks and Liabilities
Air Traffic Control. 1.1 Reliability It is extremely important that the air traffic control systems are reliable and do not end up crashing. If the air.
Finance 431: Property-Liability Insurance Lecture 5: Claims Adjusting.
Copyright © 2008 by Robert B. Carton Selected Business Law Topics.
Tech 435 – Legal Aspects of Safety Dr. E. Hansen, CIE Department of Technology NIU-DeKalb, IL.
Claims Adjusting Objectives Complying with contractual promise Achieving profit objective Collection of information Marketing Underwriting Actuarial Definitions.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Different Interests at Stake: Who should bear the risk? By Emad Abdel Rahim Al- Dahiyat 19th ANNUAL CONFERENCE School of Law.
Consumer Protection Bill Retailers’ Association Oral Submission: National Assembly August 2008 (written submission endorsed by BUSA) J Jefferies and C.
Chapter 14 E- Contracts. 2 Chapter Objectives 1. Discuss whether shrink-wrap and click- on agreements are enforceable. 2. Describe the nature and function.
Liability for Computer Errors Not covered in textbook.
Security and Reliability THERAC CASE STUDY TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES
Souces Liability Law and Software Development Ravi Belani, Charles.
© 2011 South-Western | Cengage Learning GOALS LESSON 6.1 COMMERCIAL PAPER List the various types of commercial paper, and describe the use and proper negotiation.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Legal Issues for Entrepreneurs. Legal Issues Intellectual Property Intellectual Property Do we need lawyers? Do we need lawyers? What they do What they.
The State of Computer & Data Security in Corporations Independent Survey.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
What’s New in Database Licensing? An Infopeople Webcast Presenter: Sybil Boutilier Thursday, December 16, :00 noon to 1:00 p.m.
Government of Brazil Ministry of Justice Department of Consumer Protection and Defense Consumer Protection and Defense in Electronic Commerce Eliane Moreira.
Financial Responsibility. Reference PART 387 MINIMUM LEVELS OF FINANCIAL RESPONSIBILITY FOR MOTOR CARRIERS.
INTERNATIONAL ENVIRONMENTAL LAW Nuclear energy. OECD Convention on Third Party Liability in the Field of Nuclear Energy (Paris 1960) Convention on Civil.
IBT - E-Commerce Contracts Issues Victor H. Bouganim WCL, American University.
Computer Basics SystemsViruses Alternative Input Speech.
SQA Introduction CSCI626 Day One. Basic Questions What is the point of SQA? How necessary is SQA? How good is software? Is software production different.
Software Design Software Companies Should NOT Be Held Responsible for Damages Due to Buggy Software.
AFFIRMATIVE: Software companies should be held responsible for damages due to buggy software. Nyam Adodoadji, Julia Cormano, Michael Noonan, Ren Provey.
Copyright © Texas Education Agency, All rights reserved. 1 Risk Management Data Statistics & Risk Management.
Damages for Late Payment of Insurance and Reinsurance Claims Mexican Legal Framework AIDA Europe, Reinsurance Working Group, Paris 2 December, 2015 Yves.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 18 E-Contracts.
Using Technology to Manage Information Chapter 13.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Welcome to the ICT Department Unit 3_5 Security Policies.
 Description of the Problem  Contemporary Legal Questions of Robotics  Legal Status: Rights and Obligations of Robots?  Legal regulation of technological.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
International Legal Systems and Liability. When businesspeople conduct business in a country other than their own, they must observe the laws of the host.
Chapter 12 E-Contracts.  What are some important clauses that offerors should include when making offers to form e-contracts?  What are shrink-wrap.
LAW 531 Week 2 DQ 4 Discuss one defense to negligence or strict liability and explain how it works. To purchase this material click
Economy of Iceland 2014 Powerpoint charts.
The Legal Context of Business
The Legal Context of Business
Chapter 06: LEGAL ISSUES FOR THE ENTREPRENEUR
Chapter 13: Product Liability
Chapter 14 Online Commerce and E-Contracts
Chapter 10 Consumer Education.
Food Fight – Is It Covered?
الباب الثاني الأنواع المختلفة للشركات
Claims Adjusting Objectives Definitions
Claims Adjusting Objectives Definitions
Unit 3 Information Systems
E-Contracts and Internet Law
Code of conduct Year 13.
What is Information Security?
Chapter 5: E-Commerce and Online Contracts.
Cyber Law and E-Commerce
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Software Design OUR THESIS Software companies should be liable for damages caused by buggy software

Helpful Definitions “software” “software” “buggy” “buggy” Strict Liability Strict Liability Negligence Negligence Damages- monetary, financial, personal safety Damages- monetary, financial, personal safety Inconvenience damages v. Safety/Financial Inconvenience damages v. Safety/Financial

Liability Exemptions User misuse/alteration of software User misuse/alteration of software Hardware incompatibility Hardware incompatibility External effects (some hackers and viruses) External effects (some hackers and viruses)

Due to Buggy Software… Due to Buggy Software… State of Wisconsin voter registration problems State of Wisconsin voter registration problems MCI Triangle phone shutdown MCI Triangle phone shutdown THERAC-25 radiation machine THERAC-25 radiation machine Air traffic control accidents Air traffic control accidents

End User License Agreements (EULA) Software line of defense from litigation Software line of defense from litigation “In the box” agreement- balance of power “In the box” agreement- balance of power Most users don’t read Most users don’t read Unreadable- not consumer friendly Unreadable- not consumer friendly

Uniform Computer Information Transactions Act (UCITA) Legal “suggestion” for software liability law Legal “suggestion” for software liability law Heavily favors software companies Heavily favors software companies Vaguely written Vaguely written Makes law more ambiguous Makes law more ambiguous Allows “shrinkwrap” licenses Allows “shrinkwrap” licenses

Production Alternatives Carnegie Mellon- Whyline Carnegie Mellon- Whyline Microsoft- Security Development Lifecycle Microsoft- Security Development Lifecycle Yale et al- imbedded proof Yale et al- imbedded proof SAS Institute- rigorous, frequent testing SAS Institute- rigorous, frequent testing Enerjy Enerjy

Policy Alternatives Uniform Commercial Code- body of legislation that spawned UCITA Uniform Commercial Code- body of legislation that spawned UCITA UCC designed to meet needs of both consumers and producers, gives neither absolute liability protection UCC designed to meet needs of both consumers and producers, gives neither absolute liability protection Ideal software legislation would follow this model Ideal software legislation would follow this model

Policy Alternatives Two Limitation on EULAs Limitation on EULAs Refined, more complete definition of negligence Refined, more complete definition of negligence