R ESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY
Copyright
C OPYRIGHT Definition: Copyright is defined as “ right to authorise the use of one’s work in different ways. It is the permission or the right to copy. The emphasis is not so much on the right to copy but on the right to prevent others from unfairly taking advantage ownership of the original owner of the copyright, who in most cases is the author, composer, artist and sculptor where the work originated.” (N.Krishnasamy, 2006 Pg1) According to Intellectual Property Corporation of Malaysia, copyright is defined as : Copyright is the exclusive right given to the owner of a copyright for a specific period. Copyright protection in Malaysia is governed by the Copyright Act There is no system of registration for copyright in Malaysia. A work that is eligible is protected automatically upon fulfillment of the following conditions :- sufficient effort has been expected to make the work original in character ; the work has been written down, recorded or reduced to a material form ; the author is qualified person or the work is made in Malaysia or the work is first published in Malaysia
C OPYRIGHT What does copyright protect? literary works; musical works; artistic works; films; sound recordings; broadcasts; and derivative works Source: (Intellectual Property Corporation of Malaysia) What does not copyright protect? The copyright protection shall only extend to expression and not ideas, procedures, methods of operation or mathematical concepts as such. Source: ( )
C OPYRIGHT What is copyright infringement? Copyright is infringed by any person who, without the consent or licence of the owner of the copyright, imports an article into Malaysia for the purpose of: (a) Selling, letting for hire, or by way of trade, offering or exposing for sale or hire, the article; (b) distributing the article: (i) for the purpose of trade ; or (ii) for any other purpose to an extent that it will affect prejudicially the owner of the copyright ; or (c) by way of trade, exhibiting the article in public. What could the author do for copyright infringement? The author of copyright has two methods of enforcing his rights. The author may enforce his or her rights through civil actions or criminal proceedings Copyright Video- (Source:
S INGER DJ D AVE WINS COPYRIGHT INFRINGEMENT SUIT OVER M ERDEKA DO -T HE S TAR
Identity Theft
I DENTITY T HEFT Identity theft may refer to somebody using another person’s information to gain benefits from the identity of that person. According to Jeff Lanza, one of the FBI Agent in US, “Identity theft occurs when someone becomes you. What’s the motivation for this surreptitious subrogation? Of course in most cases, it’s financial gain, but perpetrators also use false identities to get a job, to get healthcare, or to commit a different crime.” Identity theft could be worst into an extent where “personal information can be accessed from your computer or at a public computer terminal. With sufficient information, criminals can make credit card purchases, apply for loans or transfer money directly from your bank, while pretending to be you.” (Source: Identity Theft Video-
I DENTITY THEFT Identity theft is always on the news, however cases are often happened although precautions steps are introduced by most of the bank industries. Here are some examples how the identity theft become you: “While some identity thieves may focus on getting your credit cards and maxing them out before you even realize they're missing, an increasing number are using one piece of information about you -- often a credit card number -- in order to steal your entire identity” (Source: “Watch your personal documents, be careful to whom you give out your data over the phone, and be careful of mail theft.” (Source: “Your identity and personal information are valuable. Criminals can find out your personal details and use them to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driving licenses in your name.” (Source: “They might steal your wallet or purse. They might snatch your mail. They might invade your trash. They might watch or listen for your personal information while you’re shopping or on your cell phone.” (Source: Jeff Lanza, FBI-
H OW TO PROTECT YOURSELF FROM IDENTITY THEFT ? Criminals commit identity theft by stealing your personal information. This is often done by taking documents from your rubbish or by making contact with you and pretending to be from a legitimate organization. (Source: If a cashier or salesperson takes your card and either turns away from you or takes too long to conduct what is usually a normal transaction, she may be scanning your card into a handheld skimming terminal to harvest the information. (Source: Lock your mailbox and be sure to stop mail when you’re out of town for more than a few days. Shred your trash with a cross cut shredder. Be careful what you say about yourself in public— especially when you’re on your cell phone. You can protect your computer with a fire-wall, anti-virus software, or a program that removes spyware. (Source: Jeff Lanza, FBI-
W OMEN DECLARED BANKRUPT CLAIMS IDENTITY THEFT -T HE S TAR Do not expose our identity to anyone we do not know. We never know what they will do with our identity. An identity theft could caused us bought something we never bought, something we never use and something we never ever could even pay for.
REFERENCES Copyright Intellectual Property Corporation of Malay sia Video for Copyright, Symbol for Copyright Photo for Copyright Article from Nagasvare Krishnasamy Singer DJ Dave wins copyright infringement suit over Merdeka do- The Star &sec=courts
Identity Theft Women declared bankrupt claims identity theft-The Star &sec=courts Article from Identitytheft.org Article from Mybank2u Article from Jeff Lanza, FBI Video for Identity Theft Article from Cybersmart Picture for Maybank secure login ion=Login REFERENCES
T HANK YOU … (Source: