R ESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY.

Slides:



Advertisements
Similar presentations
COPYRIGHT & YOU! SLANZA Conference THINK OUTSIDE THE BOX.
Advertisements

Copyrights for Creatives April 16, 2014 Brocach Irish Pub.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Tuesday, January 21, 2014 Review Copyright Basics and Fair Use (for test) Share “Case Research”
UNIT 10: COPYRIGHT & E- PUBLISHING. What is Copyright? Copyright is the exclusive right given to the owner of a copyright for specific period. Copyright.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
© Copyright Law for Churches
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Copyright & Fair Use. What is copyright? The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication,
Keywords: Legislation, Guidelines, Ownership, Copyright, Permissions, Copyright Free LO: You will be able to understand and explain Copyright, Designs.
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
Intellectual Property
Copyright and Identity Theft Copyright Definition:  Copyright is defined as “right to authorise the use of one’s work in different ways. It is the.
INTELLECTUAL PROPERTY LAWS and Fair Use Guidelines for Educational Multimedia.
A Guide to Digital Citizenship
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Mrs. Jefferson Business Information Management I.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Copyright, Fair Use, and Public Domain Computer 1.
Leah Hachey. Intellectual Property (IP) crime, copyright piracy and trademark counterfeiting, is a growing international phenomenon that generates huge.
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Principles of Arts, Audio/Video Production Copyright Law ©
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property Basics
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Ethical Use of Electronic Media.
 By the end of the presentation, you should: › Be able to define and give examples of intellectual property › Explain the basics of Copyright Law  Know.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
By: Asfa Khan and Huda Mukhtar
You. are at risk for the fastest growing crimes crime.
Intellectual Property And Fair Use
BBB IDENTITY THEFT By Blake Bowland Computers III.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Copyright By: Team 2. What Is Copyright?  Copyright is a form of protection provided by the laws, to the authors of “original works of authorship,” including.
The Ethical Use of Electronic Media. Guilford County SciVis V
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
What is Copyright?
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
WHAT IS COPYRIGHT? A right given by the law to creators of literary, dramatic, musical and artistic works and producers of cinematographic films.
The Ethical Use of Electronic Media.
The Ethical Use of Electronic Media
U. S. Copyright Basics.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
COPYRIGHT.
The Ethical Use of Electronic Media.
Marion Kelt Copyright and images, or how not to be a pirate!
Presentation transcript:

R ESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY

Copyright

C OPYRIGHT Definition:  Copyright is defined as “ right to authorise the use of one’s work in different ways. It is the permission or the right to copy. The emphasis is not so much on the right to copy but on the right to prevent others from unfairly taking advantage ownership of the original owner of the copyright, who in most cases is the author, composer, artist and sculptor where the work originated.” (N.Krishnasamy, 2006 Pg1) According to Intellectual Property Corporation of Malaysia, copyright is defined as :  Copyright is the exclusive right given to the owner of a copyright for a specific period. Copyright protection in Malaysia is governed by the Copyright Act There is no system of registration for copyright in Malaysia. A work that is eligible is protected automatically upon fulfillment of the following conditions :-  sufficient effort has been expected to make the work original in character ;  the work has been written down, recorded or reduced to a material form ;  the author is qualified person or the work is made in Malaysia or the work is first published in Malaysia

C OPYRIGHT What does copyright protect?  literary works;  musical works;  artistic works;  films;  sound recordings;  broadcasts; and  derivative works Source: (Intellectual Property Corporation of Malaysia) What does not copyright protect?  The copyright protection shall only extend to expression and not ideas, procedures, methods of operation or mathematical concepts as such. Source: ( )

C OPYRIGHT What is copyright infringement?  Copyright is infringed by any person who, without the consent or licence of the owner of the copyright, imports an article into Malaysia for the purpose of: (a) Selling, letting for hire, or by way of trade, offering or exposing for sale or hire, the article; (b) distributing the article: (i) for the purpose of trade ; or (ii) for any other purpose to an extent that it will affect prejudicially the owner of the copyright ; or (c) by way of trade, exhibiting the article in public. What could the author do for copyright infringement?  The author of copyright has two methods of enforcing his rights. The author may enforce his or her rights through civil actions or criminal proceedings Copyright Video- (Source:

S INGER DJ D AVE WINS COPYRIGHT INFRINGEMENT SUIT OVER M ERDEKA DO -T HE S TAR

Identity Theft

I DENTITY T HEFT Identity theft may refer to somebody using another person’s information to gain benefits from the identity of that person. According to Jeff Lanza, one of the FBI Agent in US, “Identity theft occurs when someone becomes you. What’s the motivation for this surreptitious subrogation? Of course in most cases, it’s financial gain, but perpetrators also use false identities to get a job, to get healthcare, or to commit a different crime.” Identity theft could be worst into an extent where “personal information can be accessed from your computer or at a public computer terminal. With sufficient information, criminals can make credit card purchases, apply for loans or transfer money directly from your bank, while pretending to be you.” (Source: Identity Theft Video-

I DENTITY THEFT  Identity theft is always on the news, however cases are often happened although precautions steps are introduced by most of the bank industries. Here are some examples how the identity theft become you:  “While some identity thieves may focus on getting your credit cards and maxing them out before you even realize they're missing, an increasing number are using one piece of information about you -- often a credit card number -- in order to steal your entire identity” (Source:  “Watch your personal documents, be careful to whom you give out your data over the phone, and be careful of mail theft.” (Source:  “Your identity and personal information are valuable. Criminals can find out your personal details and use them to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driving licenses in your name.” (Source:  “They might steal your wallet or purse. They might snatch your mail. They might invade your trash. They might watch or listen for your personal information while you’re shopping or on your cell phone.” (Source: Jeff Lanza, FBI-

H OW TO PROTECT YOURSELF FROM IDENTITY THEFT ?  Criminals commit identity theft by stealing your personal information. This is often done by taking documents from your rubbish or by making contact with you and pretending to be from a legitimate organization. (Source:  If a cashier or salesperson takes your card and either turns away from you or takes too long to conduct what is usually a normal transaction, she may be scanning your card into a handheld skimming terminal to harvest the information. (Source:  Lock your mailbox and be sure to stop mail when you’re out of town for more than a few days. Shred your trash with a cross cut shredder. Be careful what you say about yourself in public— especially when you’re on your cell phone. You can protect your computer with a fire-wall, anti-virus software, or a program that removes spyware. (Source: Jeff Lanza, FBI-

W OMEN DECLARED BANKRUPT CLAIMS IDENTITY THEFT -T HE S TAR Do not expose our identity to anyone we do not know. We never know what they will do with our identity. An identity theft could caused us bought something we never bought, something we never use and something we never ever could even pay for.

REFERENCES Copyright Intellectual Property Corporation of Malay sia Video for Copyright, Symbol for Copyright Photo for Copyright Article from Nagasvare Krishnasamy Singer DJ Dave wins copyright infringement suit over Merdeka do- The Star &sec=courts

Identity Theft Women declared bankrupt claims identity theft-The Star &sec=courts Article from Identitytheft.org Article from Mybank2u Article from Jeff Lanza, FBI Video for Identity Theft Article from Cybersmart Picture for Maybank secure login ion=Login REFERENCES

T HANK YOU … (Source: