File Sharing Matthew Prenzler.

Slides:



Advertisements
Similar presentations
Internet Piracy. Piracy The Unauthorized use of anothers production or invention. The Unauthorized use of anothers production or invention.
Advertisements

COPYRIGHT INFRINGEMENT C AROL K OTERMANSKI C HRIS I OFFREDA M IRKO A ZIS M IKE B OLSTER E THAN F RIER.
Pirates of the Internet. Introduction - Francisco Escobar What is Copyright Infringement? Copyright infringement in the classical sense is the unauthorized.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Sources from web ADELINE MENSAH CSC /10/2009.
Intellectual Property Boston College Law School February 4, 2008 Copyright – Digital Issues.
 a web site usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Port 21 (Distribution and Promotion Remix) Brian Geoghagan Winter 2005 COM546 Professor Gill.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
SHAWN WILLIAMS The War on File Sharing Companies.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
: is a web site, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or.
Brought to you in part by: Sean Viers V.S Certain Systems allow file sharing Many have virus protection systems Most Free at cost Simple to Install and.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Paul Kelly CIS Music Piracy  Music Piracy  File Sharing  Peer-to-Peer  History of illegal music Downloads.
C LIENT /S ERVER AND P EER TO P EER National 4/5 Computing Science.
Professional Development for Media and Technology Digital Copyright Presented by: Barry S. Britt This presentation will be published online at
© Folens 2008 Cultural changes in music Brought about by ICT.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
I’m Only Sharing... It’s not hurting anyone.
V IDEO D ISCUSSION 1: C OPYRIGHT AND P2P A PPLICATIONS 23 Sep DT052.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Copyright Jim Martin The Internet Dr. Jim Martin
P2P: Grid-Oriented Distribution Systems KCCMG Fall Impact 2005 Lorin Olsen, Sprint Nextel.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
: harmful to the artist, the recording company, or neither?
The Start Shawn Fanning (19-yr-old student nicknamed Napster) developed the original Napster application and service in January 1999 while a freshman.
Exam Unit G % of A2 - 2 hour exam marks - (50/50) Section A: Theoretical Evaluation of Production Section B: Contemporary Media Issues (Online.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
Principles of AAVTC Ethics & Copyright Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Richard E. Caplan The University of Akron 5. Recordings Christopher Burnett California State, Long Beach.
Internet  ’60 = an invention of the US army  Universities and libraries also start to use this communication tool  Protocol + physical network=> backbone.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
– Purposes & Uses 20 – Purposes & Uses 20.
Third Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
The Copyright, Designs and Patents Act 1988
McGraw-Hill Technology Education
A Gift of Fire Third edition Sara Baase
The War on File Sharing Companies
Digital citizenship and piracy and cyberbullying
REPORT PREPARED FOR:   BY SUMIT MAGGON JENNY CHONG
LAUSD Responsible Use Policy (RUP)
Digital Learning in Portree Primary School
Peer-to-Peer Internet Networks
Using Images in a Course
PEER TO PEER BitTorrent.
The Internet and the World Wide Web
Copyright, Designs and Patents Act 1988
College Life and the Internet
Client/Server and Peer to Peer
Presentation transcript:

File Sharing Matthew Prenzler

What is File Sharing? The practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images and video), documents, or electronic books.

Types of File Sharing FTP (File Transfer Protocol) P2P (Peer-to-Peer) BitTorrent Online sharing services Email

Legal Issues Who owns the file? The creator of the file? Anyone who has the file on their machine? It’s everyone’s file!!!! It’s my file!!!

Grey areas and loopholes Who’s violating copyrights? The downloaders? The ones providing the files?

Court Battles Capitol v. Thomas case A&M Records, Inc. v. Napster, Inc Arista Records LLC v. Lime Group LLC (Limewire)

Silly Lawyers….. Napster - $26 million Limewire - $75 trillion (greater than GDP of entire world economy) (settled $105 million out of court) The Pirate Bay - ~$10 million….for now

The Pirate Bay Swedish company in the front lines of anti-copyright movement 2004- site online as thepiratebay.org 2006- servers taken by police and shut down for three days. Result: site traffic doubled. 2009- Sued for $3.5 million and forced to change name to thepiratebay.se in 2010 - injunction against their bandwidth provider

“"The world's most resilient BitTorrent site" Political activists who are trying to prove a point If it is on the internet it is for anybody Peter Sunde on his source code: "I wouldn't actually want to have that source code because it sucks – but don't blame me. You could ask the police because they have a copy of it and its public information – they stole it!“ http://www.youtube.com/watch?v=6PZpJCTsNtw

Questions?