Prepared by : April Rose B. Zamora.   Piracy, or theft, of trademarks and copyrighted material is a growing concern. As improved communication methods.

Slides:



Advertisements
Similar presentations
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Advertisements

Let’s Talk about Intellectual Property
Introduction and Overview of Digital Crime and Digital Terrorism
1 Lesson 15 Evaluating Electronic Information Computer Concepts BASICS 4 th Edition Wells.
All About Piracy A Donny the Downloader guided PowerPoint lesson.
Apples Physical, Technological and Human Resources
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Elementary Copyright © Barbara Benford. What is copyright? Laws that protect the work of people like  Authors – stories, poems, letters  Artists – drawings,
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
What is Marketing?.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 7 The environment of electronic commerce: legal, ethical, and tax issues Joseph Mitchum and TsunSheng, Tao.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Computer Related Issue
Small Business Ideas: Creativity, Opportunity, and Feasibility Chapter 4 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Intellectual Property
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
Online Video Streaming and You Within this PowerPoint I plan to discuss the benefits and consequences of streaming online videos directly to your computer.
Vonda S. Beavers, Ed.D. Fall Take the quiz…. Jo Cool or Jo Fool?
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Intellectual Property Rights (Pirating). use or reproduce (another's work) for profit without permission, usually in contravention of patent or copyright.
Adult Toy Vault Consulting for Protecting IP: Copyrights and Trademarks.
Copyright, Designs and Patents Act 1988
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Online Video Streaming and You Within this PowerPoint I plan to discuss the benefits and consequences of streaming online videos directly to your computer.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
 Copyright © Texas Education Agency, All rights reserved. 1.
Don’t be an Internet Pirate! A Lesson in Digital Ethics By Mrs. Grann.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Monitoring Employees on Networks: Unethical or Good Business?
Intellectual Property Basics
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Intellectual Property Rights Pornography Using The Internet
History of Sports and Entertainment Marketing Similarities in Marketing 2 Differences in Marketing.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
About By: Noe Ganado TST – Besteiro Middle School.
4.8 Ecommerce. Ecommerce Ecommerce: The buying and selling of goods and services on the Internet. Ecommerce: The buying and selling of goods and services.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By Toby Reed.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Mary Kathryn C. Metillo BEEd-3. Intellectual Property Rights (Pirating) Piracy, or theft, of trademarks and copyrighted material is a growing concern.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Earn money by sharing files on P2P networks
Similarities in Marketing.  To explain how sports and entertainment marketers use tools to sell their products Objective.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Software piracy and software patents
Web Design and Development
Ethical issues in relation to Copyright
Lesson 2- Ethical Use of Digital Resources
Copyright, Designs and Patents Act 1988
Copyright, Designs and Patents Act 1988
Intellectual Property Rights
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Presentation transcript:

Prepared by : April Rose B. Zamora

  Piracy, or theft, of trademarks and copyrighted material is a growing concern. As improved communication methods simplify sending data across international boundaries, theft of intellectual property has become a global affair. Cases that involve the piracy or theft of intellectual property are complex. If you are involved in such a case, consult an attorney with experience in the area. 1. Intellectual Property Piracy

  Piracy and counterfeiting describe the sale of copies of products without the permission of the owner of the rights to those products. Piracy and Counterfeiting

  Piracy usually refers to the sale of unauthorized copies, without necessarily claiming that it is an authorized copy. For example, selling a recording of a movie made by someone sitting in a theater with a video camera is a type of piracy.

  Counterfeiting means selling a copy that looks like an authorized copy and falsely claiming that it was authorized or licensed, such as selling unauthorized or unlicensed copies of software in a package that looks exactly like a legitimate package. Some counterfeit copies of products may be so accurate that it is difficult to tell them from legitimate products.

 2. Pornography using the internet

  The study objectives were to evaluate the prevalence, predictors, and implications of pornographic Internet site, use among Greek adolescents. A cross-sectional study was conducted among 529 randomly selected Greek high school students.

 3. Pyramiding scam using the internet

  The internet is filled with various forms of multi-level marketing schemes, selling cosmetics, investments, prepaid legal services, diet plans, diet pills, energy boosters; anything that is part of the latest fad. To lure people into the scam the websites use "make money now", Earn dollars/pesos in a few hours per day" and similar hype. The websites continue to become slicker. Some even try to make themselves look more legitimate or credible by warning you about OTHER scams!

 4. Gaming or lottery

  Internet gaming or e-gaming refers to a gambling activity that is played on or through a computer connected to the Internet.

  The Internet totally transformed the whole concept of the way companies conduct business as well as gaming on a world level. It has revolutionized the way people participate in the lottery through modern technology. Flash and Java applications provide instant access to lotteries through PCs. Web based lotteries have flourished in recent years and have also become a means for traditional real world lotteries that can be purchased online. Playing the lottery online has regenerated the way people engage in one of the oldest games in recorded history. Online Lottery