He Taonga te digital data: A tikanga perspective. Karaitiana Taiuru Digital Indigenous Philosopher.

Slides:



Advertisements
Similar presentations
Victoria’s IP Policy and Records Management Richard Vinciullo, Manager, Government IP Policy.
Advertisements

© 2014 Microsoft Corporation. All rights reserved.
4. Intellectual Property and Ethics on the Web 59.
What is the purpose of powhiri?
Tangata whenua values Piloting the process in Murihiku.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Matariki Waihi Matariki During Matariki we celebrate our unique place in the world. We give respect to the whenua on which we live, and admiration.
Culture in Aotearoa New Zealand Level 3 Social practice : Bridgepoint Waitakere :
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Intellectual Property
HSC: All My Own Work Copyright.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
ISIC Rev.4 draft, Section K “Information and communication” United Nations Statistics Division WS-ECE 09/04.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
 Copyright is a form of protection given to authors/creators of original works.  This property right can be sold or transferred to others.
1 Intellectual Property “Gift of Fire”. 2 Intellectual Property - Have you ever give a CD to a friend that contained a copy of a computer game or a programs?
STATE UNIVERSITY FOR LIBRARY STUDIES AND INFORMATION TECHNOLOGIES INTELLECTUAL PROPERTY OF INFORMATION RESOURCES ON THE INTERNET. Assist.Prof. Tereza Trencheva.
Electronic Use Policies.   Social Media  Internet.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Who Owns Snow White? Copyright Issues for Youth Librarians ALSC ALA Annual Orlando June 28 th, 2004 Carrie Russell, Copyright Specialist ALA Office for.
SYMPOSIUM ON OPEN EDUCATIONAL RESOURCES OPEN TEXT BOOKS – A VIGNETTE G. DHANARAJAN WAWASAN OPEN UNIVERSITY PENANG, MALAYSIA.
26-Oct-2005cse ip © 2005 University of Washington1 Intellectual Property INFO/CSE 100, Autumn 2005 Fluency in Information Technology
Intellectual property rights & Internet A research about the effect of Internet on Intellectual property rights & tort in China Qiong Tang Course: Internet.
1 Digital Rights Management Dissenting Argument: Users of Digital Media should obey digital rights management systems to guarantee the integrity and protect.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Digital Citizenship Created By: Kelli Stinson June 2011.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Social contexts of IS Ch. 3 – Boddy et al.
CRICOS No J a university for the world real R The OAK Law Project Queensland University of Technology CRICOS No J 1.
Awareness of the need for an Indigenous Knowledge Notice: A digital perspective. NZ IR Community Day 2015 Canterbury University.
1 Copyright Issues Considerations for Educational Designers: The Big Picture Created by DETA and adapted by SBIT Library 2009.
Training II: Software, Publications, IP, and Export Control Issues L. Meixler Many researchers tend not to regard software as IP. They often share software.
Chris Reed Professor of Electronic Commerce Law. The perceived problem “If I put my information in the Cloud then I lose all my rights to it” But is this.
© Copyright Licensing Agency Limited 2007 CLA Licence for NHS England.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Contents: 1. The copyright context 2. Image copyright and teaching 3. Image databases: copyright clearance 4. Image databases: copyright management 5.
Ka whawhai tonu ake: The last crusade: Māori cultural & intellectual property rights Spencer Lilley Te Atiawa, Muaupoko, Ngāpuhi Aotearoa, New Zealand.
P O W H I R I What is the purpose of powhiri?.  The powhiri is a ritual of encounter between:  The host people and the visitors  The rituals clears.
HSC: All My Own Work What is copyright and what does it protect? How does it relate to me?
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
MOBILE INFORMATION LITERACY CURRICULUM Module 4 Slides: Working Online and Using Information via Mobile Devices.
MOBILE INFORMATION LITERACY CURRICULUM Module 1 Slides: Introduction to Mobile Information & Communication Technologies (ICTs)
© 2015 albert-learning.com Internet 101. © 2015 albert-learning.com Internet 101 Vocabulary  Browser - a program used to view the Internet.  Click -
Edit the text with your own short phrase. The animation is already done for you; just copy and paste the slide into your existing presentation.
Copyright for teaching. 2 katelyncollins/category/week-5 CC BY.
Working with Māori clients. Tikanga Guides correct thought, attitudes behaviour in all areas Marae protocol Understanding of tikanga assists the budget.
Creative Commons terms and definitions By Chelsey Maton.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Group E - Enrico Costanza Sam Holder, Jonathan Stephens-Jones, Joseph Buckingham, Crispin Clark, Benjamin Dixon Creative Commons, Open Source, Open Movements.
Presented by Dominique’ Harbour COPYRIGHT GUIDELINES FOR VIDEO USE.
HOW DOES COPYRIGHT AFFECT USING AND CREATING PRINT AND ELECTRONIC MATERIALS? Charles Oppenheim Crosshouse Hospital, 24 th November 2011.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Plagiarism, Fair Use and Copyright Laws
Connectivity to bank and sample account structure
UTS Library 2016 workshop Copyright for Researchers
Creative Commons Introduction webinar for librarians
Copyright & Licensing.
Confidentiality October 14, 2005.
Training of Trainers Workshop
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
On a daily basis an academic can deal with one of three scenarios:
Copyright Crash Course
Presentation transcript:

He Taonga te digital data: A tikanga perspective. Karaitiana Taiuru Digital Indigenous Philosopher

This work is licensed under a Creative Commons Attribution 3.0 New Zealand License. Except as otherwise specified, this is the copyright of Karaitiana N Taiuru and is licensed under a Creative Commons Attribution 3.0 New Zealand Licence. In essence, you are free to copy, distribute and adapt the work (including commercial use of the work), as long as you attribute the work to Karaitiana Taiuru and abide by the other licence terms on this site. This presentation was first presented by Karaitiana Taiuru to the Open Source/Open Society 2015 conference (Indigenous break out session) in Wellington on April Notes from the presentation will be published separately. Original source

About Me Kāi Tahu, Ngāti Mamoe, Waitaha, Ngāti Kahungunu, Ngāti Toa Past 20 years in ICT and Web with a focus on Māori, Indigenous and Asia Pacific issues

Copyright and IP Laws ignore Indigenous Rights No NZ or International Laws recognize Indigenous Property Rights WAI 262 is overly complicated and ignores current media Traditional Knowledge Labels are an alternative but non-legal, educational strategy that can deal with cultural material already in the public domain

Respect Indigenous Data Data has whakapapa that should be recorded. Not because it is law but because it is Indigenous.

Indigenous Data has … Mauri Whakapapa Wairua

All Data is vulnerable to… Theft Manipulation IP and copyright infringement Being held to ransom

Genealogy/ Whakapapa All Māori Iwi now face an issue of recording genealogies in a cultural sensitive manner IP must fully remain with Iwi, hāpū and whānau Systems must be culturally sensitive

Commercial and Proprietary software and systems International conglomerates take Intellectual Property that has remained within traditional Indigenous knowledge for centuries. Māori can not understand the environment Help and information are not readily available. A user pays for the right to access their own information

The Internet compared to the natural world Indigenous Peoples relate to natural world. The Internet relies on the natural world to exist. Everything in the natural world has whakapapa and a god or supreme being.

Gods – Atua in the digital world Papatūānuku is the earth mother Ranginui is the Sky Father Tangaroa is the God of the ocean Tawhirimatea is the god of the air and wind

Internet - Ipurangi Internet is equivalent to the whole world. The Internet infrastructure (land, sea, air) in New Zealand is “Te Ao Māori – The Māori world”.

Internet from Southern Cross Cable A vein inside Tangaroa Connects Papatūānuku and Tangaroa Māori belief is that seafood near the cable can not be eaten

Fibre and cables Veins inside Papatūānuku Cautious of significant land areas when laying cables

Wireless Sending knowledge via Tawhirimatea. What kind of knowledge is it? Is there sacred knowledge? Will there be a wifi connection next to a sacred land area?

Caution:Wireless Digital Data is sent in packets through the air and through human bodies, resulting in an infringement of sacred knowledge.

Network Providers/iwi Network Providers are the same as Iwi. Iwi are large groups of related families who reside in the same geographic region.

Networks/Hāpū Corporate/Education/Organisation and personal networks are the same as traditional Māori hāpū. A Māori hāpū is a sub group of an Iwi that comprises of more closely related families in the same geographic region

Web sites/Whānau Web sites are the same as whanau Whanau is a Maori family of blood connections whom share the same DNA and tangata are the people.

Computers / Rorohiko Computers are the people. Systems and apps are the body parts that make the people Systems and apps need whakapapa and appropriate names.

Firewall and AntiVirus / Pā A pā is a fortified village that protected all members of a family, h ā p ū and Iwi who sought safety. Often more than one and there were traps and decoys to protect the p ā.

Social media and crowd sourcing /Marae A marae is where Iwi, hāpū, whanau and tangata met to discuss various topics, catch up with friends and to generally create a large social gathering. Māori culture are accustomed to crowd sourcing and open planning

Mobile phone/ Waea Pūkoro Traditional M āori musical instrument called a Purerehua created sounds in the wind and was used for communication

Digital Colonialism

1.A dominant culture enforcing its power and influence onto a minority culture to digitize knowledge that is traditionally reserved for different levels of a hierarchical closed society, or information that was published with the sole intent of remaining in the one format such as radio or print. 2.A blatant disregard for the ownership of the data and the digitized format, nor the dissemination. 3.Digital data that becomes the topic of data sovereignty.

Digital Colonialism (2) 4. Data and Knowledge workers who seek and claim to consult Indigenous Peoples to digitise their content, but who fail to explain the power of technology and the risks including losing all Intellectual Property Rights. 5. Conglomerates and government who use their influence to digitize data as they want. 6. A colonial view and approach to new Internet technologies such as New General Top Level Domain Names (GTLD) and Country Code Domain Names (CCTLD). 7. Digital access where an ethnic minority are the majority digital divide stakeholders; often while their knowledge and resources are being digitised.

Digital Colonialism Don’t Digitize Indigenous knowledge without consultation

Data Sovereignty

Free services such as Google, Microsoft Office 365, Facebook, Cloud, web hosting etc, are risking Indigenous ownership of their own data and knowledge

Data Sovereignty 1.Wherever your digital information is stored, it is subject to the laws, or legal jurisdiction, of the country in which it resides. 2.Indigenous Peoples expect their knowledge to be held in their own country and to be secure.

Data Sovereignty The USA PATRIOT Act of 2001, and the US PATRIOT Improvement and Reauthorization Act of 2005, permit U.S. government agencies to access any information stored within the U.S. legal jurisdiction without your permission or notification to you. This includes data held by any U.S. organization which may hold your data in a country other than the USA.

Indigenous Data Sovereignty Tapu information should not be housed overseas and in unknown places Ethnographers have Christianised Māori traditions to the point that we have lost the real meaning. Information shared in Social Media There are no laws to protect Indigenous IP.