Asmt. 5: Thwarting copiers Oscar Mendez. (1) Some record companies upload to unauthorized music-sharing sites a large number of files that have the titles.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Pirates of the Internet and how not to be one!. Prepared by: Linda Sears, Library Media Specialist Oak Mountain Intermediate School February, 2005.
Let’s Talk about Intellectual Property
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
All About Piracy A Donny the Downloader guided PowerPoint lesson.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
PowerPoint® Slides to Accompany
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.
Copyright Infringement
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Intellectual Property
By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Intellectual Property
Computer Ethics.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Copyright Law An Review on Computer Music Files and P2P File Sharing.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Unethical use of Computers and Networks
The Copyright, Designs and Patents Act (1988) A POWERPOINT PRESENTATION By Add your name(s) here Copyright and Piracy.
I’m Only Sharing... It’s not hurting anyone.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Downloads What is safe? What won’t crash your computer What is not? What will make your computer run slowly or not at all.
Computer Crimes Career & Technology Education Department.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Software Piracy By: B. Kaniecki.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Woodland Hills School District Computer Network Acceptable Use Policy.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Intellectual Property By: Michael Bunt, Matthew Challender, Clancy Carlisle, and Catherine Parker.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Google Form Report Presentation Fatin Kamilia Mohd Arif Natasha Zaireen Zubir Anis Marjan Azmimurad Nurakhma Shabani Jasni.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Computer Ethics, Viruses, and Copyrights
Internet Acceptable Use Policy
Crimes Against Property
Copyright law The law is in place to stop members of the pubic to make illegal copies of anyone else work. You wouldn’t able to get a version of software.
Software Piracy and Copyright
Social, Legal, and Ethical Issues for Computing Technology
Legislation in ICT.
Using a Computer Network
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Presentation Title Your company information.
Presentation Title Your company information.
Five Unethical Uses of Computers
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Copyright, Designs and Patents Act 1988
What is Information Security?
A Donny the Downloader guided PowerPoint lesson
Copyright, Design and Patents Act (1988)
Presentation transcript:

Asmt. 5: Thwarting copiers Oscar Mendez

(1) Some record companies upload to unauthorized music-sharing sites a large number of files that have the titles of popular songs but actually contain squawks and other unpleasant noise. (1) Some record companies upload to unauthorized music-sharing sites a large number of files that have the titles of popular songs but actually contain squawks and other unpleasant noise.

This is not the most effective way to prevent piracy, but at least prevents people from accessing more music by clogging the networks. This is not the most effective way to prevent piracy, but at least prevents people from accessing more music by clogging the networks. □ The record companies protect their property without causing any damage to other’s.

(2) A software company provides to major "pirate" software distributors copies of its software containing a virus that wipes out all files on the disk on which it is installed. (The pirates are led to believe the contaminated software is coming from other pirates; they are not aware of the virus.) (2) A software company provides to major "pirate" software distributors copies of its software containing a virus that wipes out all files on the disk on which it is installed. (The pirates are led to believe the contaminated software is coming from other pirates; they are not aware of the virus.)

By introducing a virus into the “pirate” Software, Software companies are not only penalizing the lawbreakers but they are also victimizing innocent people. By introducing a virus into the “pirate” Software, Software companies are not only penalizing the lawbreakers but they are also victimizing innocent people. If Someone steals a book from the library, it will If Someone steals a book from the library, it will be illegal to go to the house of the thief and burn be illegal to go to the house of the thief and burn his house down. his house down.