Software licensing, site licensing, piracy, copyright, pilferage, and the Jon Johansen case. Lauren Verdi CSCI 101 Wed 2:00-3:15.

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
All About Piracy A Donny the Downloader guided PowerPoint lesson.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
Copyright Infringement
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Week 4: Intellectual Property – Background and Copyright
Describe ethical considerations resulting from technological advances.
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Mrs. Jefferson Business Information Management I.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
Copyright & Fair Use By Wendy Szatkowski Robin Ward Melanie Dahlgreen.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Leah Hachey. Intellectual Property (IP) crime, copyright piracy and trademark counterfeiting, is a growing international phenomenon that generates huge.
Intellectual Property
Copyright Research By: Ben Renton BTEC Level 3 ICT.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
PrintImagesAudioVideo Software and Internet.
Copyright and the Law For more information contact:
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
Intellectual Property Basics
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Software Licensing. Software License  Software Licenses are agreements between the user and the software developer.  The user accepts this agreement.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Software Licensing Lauren Kennington CSCI 101 Tues 3:30 Extra Credit #5.
Copyright Laws and Regulations Vocabulary Copyright © Texas Education Agency, All rights reserved.
Is It Stealing? By Amber Porter. Key Terms  Software licensing- Allowing an individual or group to use a piece of software  Piracy- The unauthorized.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Copyright Basics. Agenda What is Copyright? What is Copyright? What Can Be Copyrighted? What Can Be Copyrighted? How Long Does Copyright Last? How Long.
There’s a new kind of Pirate out there…. His ship of choice sails the internet.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Intellectual Property And Fair Use
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Week 8 Project. Extra Credit (as assigned) 1.Find information about ‘big brother’ type surveillance cameras. Problems, cost, web site showing live camera.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Copyright, Designs and Patents Act What does it cover? The Copyright, Designs and Patents Act covers work.
Copyright and the Law Your Name Goes Here.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
By: Georgina Salas EDTC What is Copyright?? The exclusive legal right, given to an originator or an assignee to print, publish, perform, film,
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
INTELLECTUAL PROPERTY PRESENTED BY: BENJAMIN BAKER & BLAZE STERLING.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Legal and ethical issues
The Copyright, Designs and Patents Act 1988
Software Piracy and Copyright
Intellectual Property
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright, Designs and Patents Act 1988
Licensing, Copyrights, Piracy, and Pilferage: The protection and theft of products By: Thomas O’Rourke.
Ethics & Privacy CSCI 101.
Ethical Use of Computers
Student Name Student Class
Computer 101 Extra Credit By: Marjorie Jackson.
Presentation transcript:

Software licensing, site licensing, piracy, copyright, pilferage, and the Jon Johansen case. Lauren Verdi CSCI 101 Wed 2:00-3:15

SOFTWARE LICENSING It allows people to use a piece of software It allows people to use a piece of software Most applications are usually licensed rather than sold Most applications are usually licensed rather than sold It does not leave publishers with liability under consumer protection law It does not leave publishers with liability under consumer protection law The purchaser has no rights The purchaser has no rights The publisher has no requirements The publisher has no requirements No requirements that program even works No requirements that program even works The licensee must use software according to specific terms (If there is a violation-termination of license or owner’s right to sue) The licensee must use software according to specific terms (If there is a violation-termination of license or owner’s right to sue) There are many different types There are many different types Some based on number of machines on which program runs Some based on number of machines on which program runs Some based on number of users that can use the program Some based on number of users that can use the program

SITE LICENSING Lets all the employees of a whole company or organization( within 160 kilometers of central point) view software Lets all the employees of a whole company or organization( within 160 kilometers of central point) view software It is different than the “single user license” which only 1 person can view It is different than the “single user license” which only 1 person can view

PIRACY It is an unauthorized duplication, or copying of an original piece without consent of the rights owner It is an unauthorized duplication, or copying of an original piece without consent of the rights owner It diverts money that aids further product development, therefore affecting the economy It diverts money that aids further product development, therefore affecting the economy It is illegally copying- which is a crime! It is illegally copying- which is a crime! EX: Music industry EX: Music industry When you copy music you are also… When you copy music you are also… Counterfeiting Counterfeiting Pirate recording Pirate recording Bootlegging Bootlegging It is easy for it to happen now because of new techniques in… It is easy for it to happen now because of new techniques in… Printing Printing Recording etc. Recording etc. Who suffers? Who suffers? Consumer Consumer Artist/ Owner Artist/ Owner Government Government

COPYRIGHT A law that gives you ownership over things you create Ex: Paintings Novels Songs Photographs etc. You have the right to… Reproduce work Distribute copies Display work publicly etc. It is a good idea to have work copyrights because… Your time and effort to create product should be protected federally

PILFERAGE The act of stealing small items, of little value, habitually. The act of stealing small items, of little value, habitually. Petty theft from organization Petty theft from organization

“DVD JON” The Jon Johansen Case Prosecuted by the Norwegian Economic Crime Unit (OKOKRIM) under Norwegian Criminal Code 145(2) Prosecuted by the Norwegian Economic Crime Unit (OKOKRIM) under Norwegian Criminal Code 145(2) He created DeCSS software that allows DVD playback on Linux, and it was argued to be a piracy tool He created DeCSS software that allows DVD playback on Linux, and it was argued to be a piracy tool THE STORY: THE STORY: He was upset that his DVD’s weren’t working the way he wanted then to ( on a PC that ran Linux) He was upset that his DVD’s weren’t working the way he wanted then to ( on a PC that ran Linux) He, along with 2 hackers, created the DeCSS program (removed encryption that limits what devices play discs)-or-movies could be played on any machine and also could be copied He, along with 2 hackers, created the DeCSS program (removed encryption that limits what devices play discs)-or-movies could be played on any machine and also could be copied He posted the program online He posted the program online He received an award from Electric Frontier Foundation He received an award from Electric Frontier Foundation He became known as “DVD Jon” He became known as “DVD Jon” Finally Norway gave up on him, and he wasn’t asked to come back to court. Finally Norway gave up on him, and he wasn’t asked to come back to court.