Free Essay

Importance of Legal Database

In:

Submitted By rheafreebird
Words 3243
Pages 13
IMPORTANCE OF ONLINE LEGAL DATABASES

Submitted by:

Rhea Srivastava
Division B (BBA LLB)
Roll No – 11

Class 2016 of Symbiosis Law School, NOIDA
Symbiosis International University, PUNE
In
February 2012

Under the guidance of:

Ms. Harjinder Kaur and Mr. Nilesh Aeer

Course in Charge,
Use of Legal Database

Symbiosis Law School,
NOIDA 201301

D E C L A R A T I O N

I Rhea Srivastava, student of BBA LLB Semester II of Symbiosis Law School, Noida hereby declare that the Advanced ICT Training research paper titled “IMPORTANCE OF ONLINE LEGAL DATABASES ” is submitted by me in the line of partial fulfillment of course objectives for the BBA LLB degree. I assure that this synopsis is the result of my own efforts and that any other institute for the award of any degree or diploma has not submitted it.

C E R T I F I C A T E

The project entitled “IMPORTANCE OF ONLINE LEGAL DATABASES” submitted to the Symbiosis Law School, Noida for Use of Legal Databases as part of internal assessment is based on my original work carried out under the guidance of Ms. Harjinder Kaur and Mr. Nilesh Aeer.

The research work has not been submitted elsewhere for award of any degree.
The material borrowed from other sources and incorporated in the thesis has been duly acknowledged.

I understand that I myself could be held responsible and accountable for plagiarism, if any, detected later on.

RHEA SRIVASTAVA Date: 23rd March, 2012

A C K N O W L E D G E M E N T S

With my deepest appreciation, I would like to thank Ms. Harjinder Kaur and Mr. Nilesh Aeer for providing me the opportunity to undertake a research work on IMPORTANCE OF ONLINE LEGAL DATABASES

I would like to thank them for providing me all the necessary help in completing this project. Without their help, it would be very difficult for me to complete the project on time.

I would like to thank Symbiosis Law School, Noida for providing me an excellent environment which helped in my project.

I would also like to thank all my classmates for helping me, in one way or the other, for the success of this research paper.

INTRODUCTION

The definition of the term ‘database’ is essential mainly within the context of introducing a sui generis right for database protection. In fact, international measures addressing database copyright refer to ‘compilations’ although it is understood that the objects of protection are databases. However, the introduction of a new intellectual property right demands a precise definition regarding its object of protection. It seems that the accepted legal definition of a ‘database’, for the purpose of intellectual property law, is modeled on the definition given in the European Union Database Directive. The definition is as follows:
‘Database’ shall mean a collection of independent works, data or other materials arranged in a systematic or methodical way and individually accessible by electronic or other means.
The definition implies that a database is based upon pre-existing materials and will not necessarily be performed by the originator or right-holder of the materials on which the database is based. Furthermore, incorporation of materials in a database is subject to any right in those materials. This implies that the rights in the databases are distinct from the rights in the underlying materials that form the database and do not extend to such materials.
The significant distinction is that between unprotected and protected works or data and works respectively. Works are protected in their own rights, whereas data is normally in the public domain. The category of ‘other materials’ is of a general nature. Materials in this sense could be in any form, so different kinds of expressed information may be included in a particular database. For instance, segments of musical or artistic works which don’t amount to works, might be considered as materials.
Indeed, the Database Directive provides not less than three qualifying attributes. Firstly, the materials incorporated into the database have to be ‘independent’. This presumably means that each of the items included in the database should be known and recognised. Secondly, the materials have to be arranged in a systematic or methodical way. Thirdly, the materials are individually accessible by electronic and other means. This last attribute is closely related to the ‘independent’ attribute. If the items in the database could be ‘individually accessible’ then they are identified and discrete items.
The requirement of ‘systematic or methodical arrangement’ is slightly more confusing. If ‘arrangement’ is required, it suggests that any arrangement is sufficient unlike copyright protection where a requirement exists for the arrangement must be original. If the arrangement of materials in a database, at least in electronic ones, are done by the software employed in creating the database and are changeable according to the software user’s requests, then what is the meaning or arranged materials?
The ‘systematic and methodical’ requirement seems to assert the structured nature of databases. A database, by its inherent nature, information with respect to the materials, such as description, location, relationship to other materials etc... This process is probably the ‘systematic arrangement’ requirement.
The objective of the Database Directive, namely leaving the protection of computer programs to be dealt with by the Software Directive is very clear. It did this by confining the Database Directive to ‘databases’ as distinguished from ‘computer programs’. However, the distinction between these two entities is not as clear-cut. It is true that data processed and presented by computer programs could form part of the coding of a particular program. Once this particular program is compiled to form an executable object code, the distinction between the data and the set of instructions that form the ‘computer program’ is inseparable. In this case, one should make a logical distinction between the data and the computer program, and not a physical distinction based on the examination of the converged coding. This means that the test for distinguishing between data and computer programs is the examination of the purpose, the content and the context of the information at issue. If this information were intended to control the flow, the processing, the manipulation and the presentation of objects held in the computer storage, this would be a ‘computer program’.
However, when the information is the object to be processed, manipulated or presented, it is ‘data’ and not a ‘computer program’. Otherwise, any data held in the computer memory could be defined as a ‘computer program’ by virtue of being able to be presented by an output device. If this were the case, there would be no need for a Directive dealing with databases, since databases are, by definition, stored in computer storage, and therefore, according to this line of reasoning, constitute a ‘computer program’. Although the flaw in the above argument is obvious, it is still hard to draw the exact line to separate ‘data’ or a ‘database’ and a ‘computer program’

USES
Legal Research is one of the basic skills of being a lawyer and also one of the standards to evaluate a lawyer's practice skill. Some scholar said that" Legal research is kind of art and a kind of wisdom and a technical activity of solving a problem. We should analyze every topic to be researched and evaluate the tools we exploit so as to choose the best appropriate method. "For different lawyers in different majors have different applications and requirements on legal database, right choice and proper use are one of the key points of legal research and will have influence on the quality and efficiency of legal service. I briefly compared the following database on the basis of the usage of database from the view of foreign related intellectual property practice so as to attract professions to participate in discussion and complementation.
"Chinalawinfo", Search System of Laws in China, is a intelligent legal search system produced by Peking University Center for Legal Information and www.chinalawinfo.com. Shanghai Bar Association provides every lawyer practicing in Shanghai an account for Chinalawinfo which is used as basic database by me. The characteristic of this database:
1. It provides laws, regulations, cases, documents, contracts, data and so on. The previous translations of database in English is just on average level, but the integrate cost performance is quite good.
2. "Intelligent Association" two-direction connection technology primarily solves association search. Besides some related laws and cases, jurisprudence documents can also be searched.
3. The disc provided can be installed into local computer and is very useful for off-line search.
Westlaw: http://www.westlawindia.com
"Westlaw" is an intellectual solution for legal study in India which is established by Thomson Reuters for legal professions in India and English-speaking countries based on the technology and experience of the leading legal information platform of Westlaw.
Westlaw is one of the primary online legal research services for lawyers and legal professionals in the United States and is a part of West. In addition, it provides proprietary database services. Information resources on Westlaw include more than 40,000 databases of case law, state and federal statutes, administrative codes, newspaper and magazine articles, public records, law journals, law reviews, treatises, legal forms and other information resources.
The characteristic of this database:
1. It provides bilingual search in English on laws, regulations, legal topics, instruments of ruling and legal news.
2. "Legal Topic" is a unique feature of Westlaw which provide 32 legal topics. It covers 25000 legal points and every point collects statutes, rulings, related files and references, which enables you to get a general idea of the unfamiliar legal area.
3. It does not include bilingual data of cases, contracts and forms and its translations of those data are quite good but with small quantity.
LexisNexis: http://www.lexiscn.com
LexisNexis was established in India in 2001. It is spread widely in India due to its mega information resources and high-quality information services. Its characteristics are:
1. Providing bilingual database search on regulations, professional books and periodicals, practical materials, experts' opinions and case analysis and so on in English. It is a relatively comprehensive database;
2. Bilingual regulations with good quality of translations are of large quantity, providing some free-translation services for commercial clients, lacking case analysis and bilingual ruling documents.

Manupatra: www.manupatra.com
Manupatra are publishers and providers of legal, tax, corporate and business policy databases in India
The Company started operations in 2000 and launched its flagship product, the online database www.manupatra.com in August 2001. Today, it has delivery capabilities in print and electronic media. The Company launched its CD ROM suite of products in 2004 and forayed into Print in 2006. Company's range of information products encompasses traditional and new media formats - Online Databases; CD-ROMs; E-mail Service; E-zine; Books and Journals.

CCH: http://www.cchchina.com.cn
CCH Asia is founded in 1987 which is a Wolters Kluwer business. CCH Asia aims at providing high standard repots to clients and enjoys high reputation all over the world.The data of CCH can be divided into five parts and the characteristic is:
1. Large amount of reports on specific topics in Chinese or English, laws and regulations and cases and so forth. For example: China Intellectual Property Law Reference Case Analyses, Case Digest and Full Text Judgments, Laws and Regulations are not so profound that the database can meet the requirements of professional intellectual property lawyers.
2. The reports on specific topics cover the whole Asian area (legal topics not involving China are all in English version) which can help lawyers to immediately get a general idea about the legal system in Asian countries in the aspects of accounting, business, human resources, laws and tax.
These four legal databases all provide laws of both English and Chinese version and bilingual cases. But they do not use GIM Technology to manage the current data, or at least they do not use GIM Technology to provide clients with high level bilingual or multi-lingual data with efficiency, which makes the terminologies and translations in the legal database, are not consistent under the same special topic. Moreover, legal databases still have some drawbacks like coving a very narrow area, lacking bilingual contracts and legal forms. Although we have advised four database suppliers to use GIM Technology, no substantial change will appear in a short period. So we can only try to establish an internal intellectual property database through GIM Technology.
The four legal databases mentioned above mainly provide information through the modes as follows:
1. Collecting laws, regulations, cases, forms and so on; providing research service for clients through classification and keywords. For example: Chinalawinfo, LexisNexis. ( I call them "data derived from mechanized search")
2. Laws, regulations, cases and documents are systematical inducted and coordinated by professionals to provide clients with integrated legal reports on specific topic. For example: CCH.( I call them "data derived from professional generalization")
3. The combination of "data derived from mechanized search" and "data derived from professional generalization"; For example: Westlaw (the blending of some topic and its sub-topic builds a complete legal report on specific topic)
I classified them based on the source of data and the search method. In fact, the above four databases more or less simultaneously use "data derived from mechanized search" and "commentary data". This classification makes it easy for users to get to know the characteristics or trend of database if users need to quote legal advice to search data derived from mechanized search base and if they need to search in the data derived from professional generalization base for studying some legal topic.
Taking an overall look at these four databases, I think Chinalawinfo's data is more comprehensive and its advantages are the good combination of legal documents and data derived from mechanized search and the local installation and usage of the disc. Westlaw's advantage lies in the good combination of the clear and rich classification of legal topics and data derived from mechanized search. LexisNexis also has a comprehensive database to provide certain amount of free-translation services, which will show its advantages on bilingual data in the future. The reports on special topics of CCH are the best among these databases. Chinlawinfo is more suitable for non-foreign-related lawyers. Foreign-related lawyers can choose LexisNexis; Those who have a higher requirement on database can combine Chinalawinfo with CCH. (The combination of "data derived from mechanized search" and "data derived from professional generalization)If Westlaw increases the quantity of his database in the future, it will be a better choice.
I reckon that under the irrevocable trend of global economy integration, a new multi-lingual database will appear which provides bilingual or even multi-lingual Translation Unit (TU), terminology search and comparison based on GIM technology under the preconditions of ensuring the quality and quantity of such a database and the efficiency of searching, Such database will become the tycoon in the on-line legal database market.
The comments above are only the feelings after my using of the databases and they are only for your references to raise the efficiency of legal research. Due to lacking time of systematically assessing the database products mentioned above, I do not ensure the accuracy and integration of such information. The information and opinions contained in this article do not indicate any support or prejudice to some database project.

ORGANIZATION OF LEGAL DATABASES
The two most popular legal data retrieval systems are Lexis (1985) and Westlaw (1985). Both databases contain the texts of published judicial decisions for both federal and state courts at all levels (trial and appellate) . Access is also available to several specialized reference encyclopedias, most of the major legal journals, the Congressional Record, federal and state laws and regulations, plus other specialized materials. While subtle differences between the two networks do exist, these do not affect their use as described here. Thus, only the Lexis system will be discussed. Lexis is organized into four levels, libraries, files, documents and segments (going from broadest to narrowest in scope). A library contains all materials in a particular research area and is subdivided into several files, which contain several documents (composed of various segments)

PUBLIC CONTROL/THE PUBLIC NATURE OF THE COURT'S ACTIVITIES
The public nature of the activities of the Constitutional Court is explicitly declared by the Constitutional Court Act (Para. 1 of Article 3) and by the Rules of Procedure (Articles 23 to 33, Official Gazette RS, No. 86/07). This principle may be realized in some different forms: 3.1. Public hearings Save where expressly provided by statute (Article 35 etc. of the Constitutional Court Act), all Court proceedings are conducted in public and all decisions are delivered in open Court (the public nature of court hearings; the public nature of delivering decisions). These public activities function as a control or supervision of the impartibility and legality of the decision making process. The principle of the public nature of the activities, declared by the above mentioned provision, is of general importance concerning all kinds of proceedings; the purpose of the mentioned principle is to ensure a control on the activities of the Court to the parties of the proceedings and also other citizens (the unlimited circle of individuals). The respective function is ensured e.g. also by the legal provision on public hearings before the Constitutional Court (Article 35 and 36 of the Constitutional Court Act). The constitutional Court may exclude the public from a hearing or part thereof on the grounds of protecting public morals, public order, national security, the right to privacy and personal rights (Articles 37 and 38 of the Constitutional Court Act). The public nature of the activities of the Constitutional Court results also from some former internal regulations or systems adopted by the Constitutional Court - the then Legal Information System of the Constitutional Court introduced in 1987, the computerised database of Slovenian Constitutional Case-Law as a public database, in principle accessible to all users of legal information.

SIGNIFICANCE OF (COMPARATIVE) CONSTITUTIONAL CASE-LAW INFORMATION FOR THE ACTIVITIES OF THE CONSTITUTIONAL COURT
Limiting myself to issues regarding constitutional courts (what may from the legal information point of view concern any ordinary court as well) I would emphasize that the universal participation of constitutional courts in the modern information exchange became a very important change, in particular because until 1990 legal informatics in the domain of constitutional matters, with a few exceptions, generally speaking, did not keep up with general trends in other domains. In many cases the documents issued by constitutional courts (mainly decisions) used to be processed by other subjects, at that time more advanced in informatics. On these grounds from the beginning on the initiative by the then founded Venice Commission of the Council of Europe was welcomed through which constitutional courts belonging to a common information (documentation) centre would enable their potential users to access the information on constitutional matters. Nowadays, the number of legal information is still on the increase, which entails more troubles in orientation within one's own and other legal systems. In this situation the solutions providing appropriate professional comparative information exchange as well as comparative studies on constitutional matters are very welcome.

BIBLIOGRAPLY

1. Footprint (United Nations Development Programme Iraq) (1): 4, http://www.iq.undp.org/UploadedFiles/Sections/4d44a371-9496-40d3-b54e-6effc017a277.pdf 2. http://sbaweb.wayne.edu/~absel/bkl/vol17/17az.pdf

Similar Documents

Premium Essay

Cognitive Computing Project

...17 Appendix G – Implementation Plan 17 Executive Summary In today’s world, technology is moving at an incredibly fast pace. Industries such as healthcare, retail and finance have all implemented one or another form of modern technology. Out of the many advancements in the past decade, the most significant is cognitive computing. Defined in simple terms, cognitive computing refers to a computer system that is modeled after the human brain (Cognitive Computing). Such a computer system has the ability to naturally communicate with humans and assist them in their everyday lives. Today, IBM’s Watson cognitive computing system presents this technology thoroughly. Thus, the technology provided by IBM will be used to further develop new databases. The LawAssist, Law Assistants Co.’s most recent development, acts as a tool to criminal lawyers that...

Words: 7562 - Pages: 31

Free Essay

Security Threats

...Security Threats Vulnerability can be defined as “a security exposure that results from a product weakness that the product developer did not intend to introduce and should fix once it is discovered” (Microsoft TechNet, 2014). There are possibility that the two databases could have vulnerabilities such as a weakness in the technology, configuration or security policies. The vulnerabilities can lead to potential risks in the personnel records systems. Security risks can be described as actions that could cause loss or damage to computer hardware, software, data or information. Potential security risks to milPDS and Remedy are computer viruses, unauthorized access of systems, personal information theft, personally identifiable information (PII) being compromised or violated, and system failure. These vulnerabilities and security risks can result in serious issue to the center. As a center that has a main purpose of managing personal records, any compromise, whether it is information stolen or a database system losing information can be disastrous for many different reasons. After threats and vulnerabilities have been identified, an assessment should be processed to figure out how the threat and vulnerability affected the system(s). This will assist in determining what measures are needed to ensure the vulnerability is handled. There are policies, Air Force Instructions and procedures in place if threats and vulnerabilities have been detected. The Commander will...

Words: 474 - Pages: 2

Premium Essay

Mgt/431 Staffing Plan

...Marketing University of Phoenix Environmental Factors of Global and Domestic Marketing MKT/421 February 21, 2011   Environmental Factors of Global and Domestic Marketing Trying to market in a foreign country can be much more difficult than one might think. Oftentimes the response you are hoping for just do not happen, and unexpected negative responses can result instead. With the introduction of the internet it is very important not to compare characterizations of 20 or 30 years ago. People can now easily communicate by just a couple of clicks on a computer keyboard and the world has become accessible for almost all of us. However, even now in our digital age, with the world essentially at everyone’s fingertips, it is still crucial to carefully research the foreign market you wish to enter, as cultural, and ethical differences still very much exist and must still be considered and respected for successful marketing (Osaki, T. (2008). Influence of Global Economic Interdependence Global trade and interdependence is extremely important for every country in the world. When a country is involved with global trade it opens the doors for improving local conditions by providing employment and providing better opportunities for the people. On its own a country cannot function independently with absolutely no involvement from others, and to be successful, a country must be have some kind of trade and commerce relationship with other countries. (Armstrong, G., Kotler, P. 2009)...

Words: 1238 - Pages: 5

Premium Essay

Courseoutline

...Term 1 COURSE OUTLINE COURSE CODE: LGST101 COURSE TITLE: BUSINESS LAW Course Instructor: Justin Chan Junhao COURSE DESCRIPTION A. Revised on 8 June 2015 This is an introductory course designed to help non-law students acquaint themselves with the framework of Singapore’s legal system and to understand the legal environment within which businesses operate. A substantial part of the course is dedicated to contract law, as the making and performance of contracts form the rudiment of all businesses. Students will also be introduced to the law of torts, in particular the tort of negligence. Other legal areas and concepts which, at the instructors’ discretion, will be taught include privity of contract, agency, business torts, commercial crime, e-commerce law, law of business organizations, intellectual property and international legal aspects of business. Upon completion of the course, students should: Understand the framework of Singapore business law; Understand and be able to apply the methodology of legal reasoning; Be able to identify key legal issues in a given commercial scenario and apply principles they have learnt; and o Be able to take steps to manage legal risks. o o o B. PRE-REQUISITES None. C. TEXTS AND REFERENCE MATERIAL PRESCRIBED TEXT George Shenoy and Loo Wee Ling (gen. ed.), Principles of Singapore Business Law (2nd Ed, Cengage Learning, 2013) REFERENCE MATERIAL Andrew Phang Boon Leong (gen. ed.), The Law of Contract...

Words: 975 - Pages: 4

Free Essay

Business Law- in This Unit You,

...assignment is two-fold: 1. To give you the opportunity to read a real court decision. 2. To challenge you to think about how you would have decided the case. In your case law analyses, you must be able to navigate the court's decision and summarize it; you are not expected to act as a judge or an advocate. Using your selected court decision, prepare an analysis that responds to the following: 1. Articulates the importance, context, purpose, and relevance of law in a business environment: • Identify the parties who are before the court. • Provide a brief background to problem. Summarize the facts in no more than 2–3 paragraphs. • Identify what is the specific disagreement between the parties. • Explain the ruling of the court in no more than 1–2 paragraphs. 2. Evaluate legal options to create a business entity. • Was there a dissenting opinion? If so, explain why some of the judges or justices disagreed with the majority in the decision. • Compare to other types of business entities-would the party have been in a better position if they formed as a different type of legal business entity? • Do you agree with the court's decision? Why or why not? You may choose any court case, either state or federal, as the basis for your case law analysis; however, the case should be applicable to the assignment topic. The recommended Web sites for researching and locating a case are listed in the Resources area. Your analysis should be no more than two pages, double-spaced. References and...

Words: 420 - Pages: 2

Premium Essay

Research

...information and then sends lawyers to represent their clients. In the past years, there have been situations of case/data mismatch because documentation is not done properly (it is done manually) and every Lawyer has his special kind of case to handle. Getting things done at the right time is very important for everybody and even a company. Time management makes an institution successful and Evelyn Avi’s firm is not an exception. The Legal Case Scheduler service offers an efficient interface for all Lawyers and administrative staff to plan their office and business endeavors resourcefully. Until you value yourself, you won't value your time. Until you value your time, you will not do anything with it (M. Scott Peck 2010) This write up provides a comprehensive explanation of the development of a Legal Case Scheduler. The new system intends to resolve the problem of, case/data mismatch, improper time management technique experienced by the administrative staff of the firm. The workers shall also be able to search and retrieve data from the database. Also included in this report will be the problem statement, aim, objectives, scope and the justification of the project. Firstly, the problem statement shall be discussed comprehensively with the best methodology approach to be applied. Then the aim shall be mentioned. From the aim, the objectives shall be outlined. The scope and justification of the entire project shall be discussed in details too. The entire project goes through...

Words: 941 - Pages: 4

Free Essay

Business Law- in This Unit You,

...assignment is two-fold: 1. To give you the opportunity to read a real court decision. 2. To challenge you to think about how you would have decided the case. In your case law analyses, you must be able to navigate the court's decision and summarize it; you are not expected to act as a judge or an advocate. Using your selected court decision, prepare an analysis that responds to the following: 1. Articulates the importance, context, purpose, and relevance of law in a business environment: • Identify the parties who are before the court. • Provide a brief background to problem. Summarize the facts in no more than 2–3 paragraphs. • Identify what is the specific disagreement between the parties. • Explain the ruling of the court in no more than 1–2 paragraphs. 2. Evaluate legal options to create a business entity. • Was there a dissenting opinion? If so, explain why some of the judges or justices disagreed with the majority in the decision. • Compare to other types of business entities-would the party have been in a better position if they formed as a different type of legal business entity? • Do you agree with the court's decision? Why or why not? You may choose any court case, either state or federal, as the basis for your case law analysis; however, the case should be applicable to the assignment topic. The recommended Web sites for researching and locating a case are listed in the Resources area. Your analysis should be no more than two pages, double-spaced. References and...

Words: 420 - Pages: 2

Premium Essay

No Electronic Theft Act

...NO ELECTRONIC THEFT ACT (NET) Within the Internet culture of unlicensed use, theft of intellectual property is growing. Pirating works online is the same as shoplifting a video tape, book, or computer program from a department store. Through a loophole in the law, however, copyright infringers who intentionally pirate works, as long as they do not do so for profit, are outside the reach of our nation's law enforcement officials. In 1997 President Bill Clinton introduced the No Electronic Theft Act (NET), which allows criminal enforcement against people who have no profit motive in the infringement. HR 2265 was viewed as a closing a loophole in the criminal law. Under the old statutory scheme, people who intentionally distributed copied software over the Internet did not face criminal penalties as long as they did not profit from their actions. The act was strongly backed by the software and entertainment industries but opposed by library and academic groups. The No Electronic Theft Act, as its name suggests, was enacted to criminalize the violation of copyrights through the posting of copyrighted materials on the Internet. The posting of a work on the Internet makes it extremely easy to access, read and copy that work. Because of the popularity of the Internet, moreover, any single copy of a work that is posted on the Internet could be read and copied many times over each month. Copyright law establishes rights for both copyright holders and for purchasers of copyrighted...

Words: 3388 - Pages: 14

Premium Essay

Dbm 502 Expert Tutor/ Indigohelp

...DBM 502 Entire Course For more classes visit www.indigohelp.com DBM 502 Individual Assignment: Implementing an Enterprise DBMS DBM 502 Individual Assignment: Comparing Database Software PART 2 OF 2 DBM 502 Individual Assignment: Comparing Database Software PART 1 OF 2 DBM 502 Individual Assignment: Data Dictionary DBM 502 Individual Assignment: Database Security DBM 502 Learning Team Assignment: DBMS Implementation Plan ………………………………………………… DBM 502 Individual Assignment Comparing Database Software PART 1 OF 2 For more classes visit www.indigohelp.com Individual Assignment: Comparing Database Software Create a list of criteria that can be used to compare database software. Create a table that uses the list of criteria to compare and contrast Microsoft® Access, SQL, DB2, and Oracle®. Write a 2- to 3-page paper that discusses Refer to “Standards for Written Work” and “Standards•your results. for Presentations” in your Program Handbook, which can be accessed through the student Web site. ………………………………………………… DBM 502 Individual Assignment Comparing Database Software PART 2 OF 2 For more classes visit www.indigohelp.com Individual Assignment: Comparing Database Software Create a list of criteria that can be used to compare database software. Create a table that uses the list of criteria to compare and contrast Microsoft® Access, SQL, DB2, and Oracle®. Write a 2- to 3-page paper that discusses your results. Refer to “Standards for Written Work...

Words: 537 - Pages: 3

Premium Essay

Service Request Sr-Kf-013 Paper

...customers, develop a closer relationship with each member, and foster a stable platform for efficiency in operations. In this paper I will discuss the potential legal, ethical, and specific costs related to the issues of developing a frequent shopper program. Finally, I will discuss how this information system has an effect on the organizational structure. The loyalty rewards program has many benefits to both the customer and the company; however, there are legal concerns that must be addressed. Membership will begin on a sign-up basis. Customers who want a membership will provide personal information and be subjected to legal terms, privacy agreements, and security policies. Sensitive data is collected at different times in conjunction with loyalty programs. The first instance is created during the loyalty card application. The second instance develops when purchases are recorded, and finally when the spending histories are recorded; creating a consumer profile. Kudler has illustrated what information it will collect in the Database Diagram – PNG under customer table. This information includes Full Name, address, phone number, anniversary, e-mail address, and date of birth. Class action lawsuits can develop if a customer believes his or her privacy has been compromised. Cost for legal representation, governance fines, and legal awards can reach millions of dollars in penalties. Ethical concerns can be an issue, but asking customers to provide...

Words: 732 - Pages: 3

Premium Essay

Dbm 502 Learning Consultant / Tutorialrank.Com

...www.tutorialrank.com DBM 502 Individual Assignment: Implementing an Enterprise DBMS DBM 502 Individual Assignment: Comparing Database Software PART 2 OF 2 DBM 502 Individual Assignment: Comparing Database Software PART 1 OF 2 DBM 502 Individual Assignment: Data Dictionary DBM 502 Individual Assignment: Database Security DBM 502 Learning Team Assignment: DBMS Implementation Plan ---------------------------------------------------------------------------- DBM 502 Individual Assignment: Comparing Database Software PART 1 OF 2 (UOP) For more course tutorials visit www.tutorialrank.com Individual Assignment: Comparing Database Software Create a list of criteria that can be used to compare database software. Create a table that uses the list of criteria to compare and contrast Microsoft® Access, SQL, DB2, and Oracle®. Write a 2- to 3-page paper that discusses Refer to “Standards for Written Work” and “Standards•your results. for Presentations” in your Program Handbook, which can be accessed through the student Web site. ------------------------------------------------------------------- DBM 502 Individual Assignment: Comparing Database Software PART 2 OF 2 (UOP) For more course tutorials visit www.tutorialrank.com Individual Assignment: Comparing Database Software Create a list of criteria that can be used to compare database software. Create a table that uses the list of criteria to compare and contrast Microsoft® Access, SQL, DB2, and Oracle®. Write...

Words: 548 - Pages: 3

Premium Essay

Wierich Solutions

...CHAPTER 1 INTRODUCTION TO PROFESSIONAL RESEARCH Discussion Questions 1. Research in general involves the investigation and analysis of an issue in question. The researcher usually applies reasonable and reflective thinking to develop an answer to the issue or problem at hand. Research requires a clear definition of the problem, using professional databases to search the authoritative literature, reviewing and evaluating the data collected, drawing conclusions and communicating your results. 2. Accounting, auditing, or tax research involve a systematic and logical investigation of an issue or problem using the accountant’s professional judgment. Furthermore, accountants approach this problem using critical-thinking skills to obtain and document evidence underlying a conclusion relating to an issue or problem currently confronting the accountant or auditor. 3. Accounting, auditing, or tax research are necessary in order to determine the proper recording, classification, and disclosure of economic events; to determine compliance with authoritative pronouncements; or to determine the preferability of alternative accounting procedures. 4. The objective of accounting, auditing, or tax research is a systematic investigation of an issue or problem utilizing the researcher’s professional judgment to arrive at appropriate and timely conclusions regarding the issues at hand. 5. Research plays an important role within an accounting firm or department. It is critical...

Words: 6804 - Pages: 28

Premium Essay

Msme

...Qian Finance Department Carroll School of Management Boston College qianju@bc.edu Sankar De Centre for Analytical Finance Indian School of Business Hyderabad 500 032, India Sankar_De@isb.edu Meijun Qian Finance Department NUS Business School National University of Singapore bizqmj@nus.edu.sg Last Revised: December 2011 Forthcoming, Journal of Financial Intermediation Abstract With extensive cross-country datasets and India firm samples, as well as our own surveys of small and medium firms, we examine the legal and business environments, financing channels, and growth patterns of different types of firms in India. Despite the English common-law origin and a British-style judicial system, Indian firms face weak investor protection in practice and poor institutions characterized by corruption and inefficiency. Alternative finance, including financing from all non-bank, non-market sources, and generally backed by non-legal mechanisms, constitutes the most important form of external finance. Bank loans provide the second most important external financing source. Firms with access to bank or market finance are not associated with higher growth rates. Our results indicate that bank and market finance is not superior to alternative finance in fast-growing economies such as India. Keywords: India, banks, markets, alternative finance, growth. JEL Classifications: O5; K0; G0.  We appreciate helpful comments from George Pennacchi (editor), two...

Words: 23426 - Pages: 94

Premium Essay

Kudler Foods

...Legal Focus Legal Focus Abstract There is a vast legal world in relation to product liability. This paper will identify what product reliability involves as it relates to the food industry. It will also highlight Kudler Fine Foods and show different strategies to assist in avoiding legal issues with product liability. Finally, the paper will highlight database tools researched specifically to help avoid product liability legal issues. Legal Focus Product liability has taken a turn over the years and has forced the public and government to pay closer attention to food labels, especially dietary supplements. The food industry is highly competitive and the high regulations could cause severe profit margin decreased in companies who do not legally represent themselves appropriately. Claims against companies in the food industry There are several areas where companies need to watch out for. The world is changing into this environmental friendly monster, which is outstanding, and it is affecting the food industry in the claims companies have to deal with. State consumer protection acts are other avenues where lawsuits can develop. “Food and beverage companies often face litigation in more than one jurisdiction, with more than one plaintiff, represented by separate sets of plaintiffs’ counsel” (http://www.sidley.com/productsliabilitylitigationfoodindustry/)...

Words: 928 - Pages: 4

Premium Essay

Work Scheme

...principles • Work through activity in Chapter 3 • Complete sample test questions and discuss Spreadsheets • Use slides to explain facilities • Work through activity in Chapter 4 • Complete sample test questions and discuss Databases • Use slides to explain facilities • Work through activity in Chapter 5 • Complete sample test questions and discuss Research Techniques • Use slides to explain facilities • Work through activity in Chapter 6 • Complete sample test questions and discuss Health & Safety • Use slides to explain basic principles • Work through Chapter 7 • Complete sample test questions and discuss Legislation • Go through chapter 7 plus additional information on sample cases • Use slides to discuss: o Copyright o Data Protection Act o Computer Misuse Act • Complete sample test questions and discuss Sample test paper • Use sample paper in Appendix B or from the Payne-Gallway web site (to be marked by teacher/lecturer from answers provided on web 2&3 To demonstrate the importance of good housekeeping routines To introduce word processing techniques 4&5 6&7 To introduce spreadsheet techniques 8&9 To introduce database techniques 10 & 11 To investigate research techniques 12 To explain health & safety issues involved with the use of IT To explain legal issues surrounding the use of IT 13 14 To test Knowledge base 15...

Words: 817 - Pages: 4