Copyright and Identity Theft Copyright Definition:  Copyright is defined as “right to authorise the use of one’s work in different ways. It is the.

Slides:



Advertisements
Similar presentations
COPYRIGHT & YOU! SLANZA Conference THINK OUTSIDE THE BOX.
Advertisements

What’s Yours In Mine: Intellectual Property and Copyright For the Magazine Media Publisher Jim Sawtelle Partner and Co-leader, Media, Publishing and Marketing.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Tuesday, January 21, 2014 Review Copyright Basics and Fair Use (for test) Share “Case Research”
Presented By The Plano Police Department Crime Prevention Unit.
UNIT 10: COPYRIGHT & E- PUBLISHING. What is Copyright? Copyright is the exclusive right given to the owner of a copyright for specific period. Copyright.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Copyright vs. trademark
© Copyright Law for Churches
Copyright & Fair Use. What is copyright? The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication,
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Keywords: Legislation, Guidelines, Ownership, Copyright, Permissions, Copyright Free LO: You will be able to understand and explain Copyright, Designs.
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
Ethical and Social...J.M.Kizza 1 Module 6: Intellectual Property Rights and Computer Technology Computer Products and Services Instruments of Protection.
ZSAMBEK MEETING (HUNGARY) NOVEMBER Words fly away, writings remain.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
R ESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY.
Copyright and Fair Use Implications for Assistive Technology and Education.
Mrs. Jefferson Business Information Management I.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
Protecting your product What is Intellectual Property (IP)? Legal rights that result from intellectual activity in the industrial, scientific, literary.
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
Copyright Multimedia content comes from somewhere Either you make it or you acquire it Who owns the content? Do you or your users have the property rights?
COPYRIGHT. WHAT THE LAW SAYS  The law of Copyright protects “intellectual property” – the product of a person’s skill, creativity or labour.  It protects.
Principles of Arts, Audio/Video Production Copyright Law ©
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Copyright Laws Copyright Protection and Fair Use.
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
Copyright Law Summer Crider Loeffler University of Texas at Brownsville Summer II July 8-August 12th EDTC 6340 Ms. Evans and Dr. Sullivan.
COPYRIGHT RULES AND REGULATIONS -- What do they permit?
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
Copyright Law “The genius of United States copyright law is that, in conformance with its constitutional foundation, it balances the intellectual property.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
CETAK COPY RIGHT Written by Asma’ Humaira Binti Suhaimi.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Intellectual Property And Fair Use
Security and Ethics Basics of Fair Use A Fair(y) Use Tail.
Presented By Plano Police Department Crime Prevention Unit.
Ignite Technology Transfer Office INTELLECTUAL PROPERTY RIGHTS Lily O’Brien IP & Commercialization Contracts Manager Ignite Technology Transfer Office.
Identity Theft One of America's fastest growing crimes.
Copyright By: Team 2. What Is Copyright?  Copyright is a form of protection provided by the laws, to the authors of “original works of authorship,” including.
The Ethical Use of Electronic Media. Guilford County SciVis V
Copyright. What is Copyright? Copyright is a form of legal protection for the creator of a piece of work. It gives the creator (an author, composer, artist,
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Copyright Rules and Regulations. What is copyright Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
What is Copyright?
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Identity Theft It’s a crime!
The Ethical Use of Electronic Media.
The Ethical Use of Electronic Media
You will be given the answer. You must give the correct question.
U. S. Copyright Basics.
Intellectual Property Rights
Copyright Presentation
Ethical issues in relation to Copyright
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
COPYRIGHT.
The Ethical Use of Electronic Media.
Copyright & Fair Use.
Presentation transcript:

Copyright and Identity Theft

Copyright

Definition:  Copyright is defined as “right to authorise the use of one’s work in different ways. It is the permission or the right to copy. The emphasis is not so much on the right to copy but on the right to prevent others from unfairly taking advantage ownership of the original owner of the copyright, who in most cases is the author, composer, artist and sculptor where the work originated.” (N.Krishnasamy, 2006 Pg1) According to Intellectual Property Corporation of Malaysia, copyright is defined as:  Copyright is the exclusive right given to the owner of a copyright for a specific period. Copyright protection in Malaysia is governed by the Copyright Act There is no system of registration for copyright in Malaysia. A work that is eligible is protected automatically upon fulfillment of the following conditions:-  sufficient effort has been expected to make the work original in character;  the work has been written down, recorded or reduced to a material form;  the author is qualified person or the work is made in Malaysia or the work is first published in Malaysia

Copyright What does copyright protect?  literary works;  musical works;  artistic works;  films;  sound recordings;  broadcasts; and  derivative works Source: (Intellectual Property Corporation of Malaysia) What does not copyright protect?  The copyright protection shall only extend to expression and not ideas, procedures, methods of operation or mathematical concepts as such. Source: (

Identity Theft

 Identity theft may refer to somebody using another person’s information to gain benefits from the identity of that person.  According to Jeff Lanza, one of the FBI Agent in US, “Identity theft occurs when someone becomes you. What’s the motivation for this surreptitious subrogation? Of course in most cases, it’s financial gain, but perpetrators also use false identities to get a job, to get healthcare, or to commit a different crime.”  Identity theft could be worst into an extent where “personal information can be accessed from your computer or at a public computer terminal. With sufficient information, criminals can make credit card purchases, apply for loans or transfer money directly from your bank, while pretending to be you.” (Source:  Identity Theft Video-

Identity theft  Identity theft is always on the news, however cases are often happened although precautions steps are introduced by most of the bank industries. Here are some examples how the identity theft become you:  “While some identity thieves may focus on getting your credit cards and maxing them out before you even realize they're missing, an increasing number are using one piece of information about you -- often a credit card number -- in order to steal your entire identity” (Source:  “Watch your personal documents, be careful to whom you give out your data over the phone, and be careful of mail theft.” (Source:  “Your identity and personal information are valuable. Criminals can find out your personal details and use them to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driving licenses in your name.” (Source:  “They might steal your wallet or purse. They might snatch your mail. They might invade your trash. They might watch or listen for your personal information while you’re shopping or on your cell phone.” (Source: Jeff Lanza, FBI-

References Copyright Intellectual Property Corporation of Malaysia Video for Copyright, Symbol for Copyright Photo for Copyright Article from Nagasvare Krishnasamy Singer DJ Dave wins copyright infringement suit over Merdeka do-The Star

References Identity Theft Women declared bankrupt claims identity theft-The Star Article from Identitytheft.org Article from Mybank2u Article from Jeff Lanza, FBI Video for Identity Theft Article from Cybersmart Picture for Maybank secure login

Thank you… (Source: