Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Prepared by: Nahed Al-Salah
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright Infringement
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Intellectual Property
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
 Provide a basis for determining who in the organization should control access to a particular item of information.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
Mrs. Jefferson Business Information Management I.
Unethical use of Computers and Networks
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Crime & Malpractice AS Module Heathcote Ch. 10.
Copyright Law Copyright ©2004 Stephen Marshall distributed under the terms of the GNU Free Documentation License (
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Computer security By Isabelle Cooper.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
Plagiarism, Fair Use and Copyright Laws
Copyright Computer crime and cyber security.
Add video notes to lecture
LINUX History In 1984 a project was launched by Richard Stallman to develop a complete Unix-like operating system that would be considered free software.
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Five Unethical Uses of Computers
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Intellectual Property
The Legalities of Technicalities task 4
Computer 101 Extra Credit By: Marjorie Jackson.
Laws Against Computer Hacking
Presentation transcript:

Lecture on Internet Issues and Laws

Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues? What are Cyber Crimes? What are Cyber Crimes? Laws dealing with Cyber Crimes Laws dealing with Cyber Crimes What is Hacking? What is Hacking?

Commercial Software Most software that you buy or download only comes in the compiled ready-to-run version. Most software that you buy or download only comes in the compiled ready-to-run version. It is extremely difficult to modify the compiled version of most applications and nearly impossible to see exactly how the developer created different parts of the program. It is extremely difficult to modify the compiled version of most applications and nearly impossible to see exactly how the developer created different parts of the program. Most commercial software manufacturers see this as an advantage that keeps other companies from copying their code and using it in a competing product. Most commercial software manufacturers see this as an advantage that keeps other companies from copying their code and using it in a competing product.

What does Open source mean? Open source software is at the opposite end of the spectrum. Open source software is at the opposite end of the spectrum. The source code is included with the compiled version and modification or customization is actually encouraged The source code is included with the compiled version and modification or customization is actually encouraged The software developers who support the open source concept believe that by allowing anyone who's interested to modify the source code, the application will be more useful and error-free The software developers who support the open source concept believe that by allowing anyone who's interested to modify the source code, the application will be more useful and error-free

Criteria for Open source The program must be freely distributed (It can be part of a package that is sold though, such as Red Hat has done with Linux) The program must be freely distributed (It can be part of a package that is sold though, such as Red Hat has done with Linux)Linux Source code must be included. Source code must be included. Anyone must be allowed to modify the source code. Anyone must be allowed to modify the source code. Modified versions can be redistributed. Modified versions can be redistributed. The license must not require the exclusion of other software or interfere with the operation of other software. The license must not require the exclusion of other software or interfere with the operation of other software.

Example Let's take a look at a real world example of open source software. In 1991, Linus Torvalds, a student at the University of Helsinki in Finland, developed a new operating system based on Minix, a derivative of Unix, which he dubbed Linux. Torvalds released version 0.02 of Linux under the GNU General Public License, which provides a good legal definition of open source software. A lot of people around the world downloaded Linux and began working with it. Many of these users were programmers in their own right and made modifications to the source code that Torvalds had included. Over the next three years, Torvalds received these modified versions from the other programmers and incorporated many of the changes into the baseline version and released Linux version 1.0 in Let's take a look at a real world example of open source software. In 1991, Linus Torvalds, a student at the University of Helsinki in Finland, developed a new operating system based on Minix, a derivative of Unix, which he dubbed Linux. Torvalds released version 0.02 of Linux under the GNU General Public License, which provides a good legal definition of open source software. A lot of people around the world downloaded Linux and began working with it. Many of these users were programmers in their own right and made modifications to the source code that Torvalds had included. Over the next three years, Torvalds received these modified versions from the other programmers and incorporated many of the changes into the baseline version and released Linux version 1.0 in 1994.GNU General Public LicenseGNU General Public License

What is Copyright? Copyright is a type of property that is founded on a person's creative skill and labour. It is designed to prevent the unauthorised use by others of a work, that is, the original form in which an idea or information has been expressed by the creator. Copyright is a type of property that is founded on a person's creative skill and labour. It is designed to prevent the unauthorised use by others of a work, that is, the original form in which an idea or information has been expressed by the creator.

Copyright for Computer Programs in Pakistan Under the provisions of the Copyright Ordinance, 1962 ("the Ordinance") copyright protection is only available for `works' which fit within one of the categories of works or subject matters specified in the Ordinance. Under the provisions of the Copyright Ordinance, 1962 ("the Ordinance") copyright protection is only available for `works' which fit within one of the categories of works or subject matters specified in the Ordinance. Section 10 of the Ordinance provides that copyright in original, literary, dramatic, musical and artistic works. Section 10 of the Ordinance provides that copyright in original, literary, dramatic, musical and artistic works.

As regard to the computer programmes, the definition of `literary work' is amended by the Copyright (Amendment) Act, 1992 to include computer programs. As regard to the computer programmes, the definition of `literary work' is amended by the Copyright (Amendment) Act, 1992 to include computer programs. Programs recorded on any disc, tape, perforated media or other information storage devices, which, if fed into or located in a computer or computer based equipment is capable of reproducing any information. Programs recorded on any disc, tape, perforated media or other information storage devices, which, if fed into or located in a computer or computer based equipment is capable of reproducing any information.

Even the purchasers of computer programs may not copy, adapt or make copies of adaption of the programs in connection with their use by themselves or their employees. Even the purchasers of computer programs may not copy, adapt or make copies of adaption of the programs in connection with their use by themselves or their employees. The unauthorized use is infringement of the copyright. Accordingly, if a duplicate of a computer program is acquired by someone who has no license to use it, the copyright owner has the right to prevent him using it. The unauthorized use is infringement of the copyright. Accordingly, if a duplicate of a computer program is acquired by someone who has no license to use it, the copyright owner has the right to prevent him using it.

Remedies for Copyright Violations Civil Proceedings Civil Proceedings Criminal Proceedings Criminal Proceedings Accordingly, a person whose copyright has been violated is able to sue for damages Accordingly, a person whose copyright has been violated is able to sue for damages If a person is convicted then imprisonment which may extend to 3 years, or with fine which may extent to one hundred thousand rupees (one US dollars nearly equals twenty five rupees), or with both are possible If a person is convicted then imprisonment which may extend to 3 years, or with fine which may extent to one hundred thousand rupees (one US dollars nearly equals twenty five rupees), or with both are possible

Cyber Crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Laws yet have to be passed by the parliament Laws yet have to be passed by the parliament

What is Hacking? It is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network. It is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network. There are two basic types of hacking. Some only hack because they want to see if they can do it - it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes There are two basic types of hacking. Some only hack because they want to see if they can do it - it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes

History Term invented by students of MIT Term invented by students of MIT Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. Hacking is an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information Hacking is an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information

However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in "phreaking," or phone hacking, headed by John Draper. He devised a method of making free long distance calls However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in "phreaking," or phone hacking, headed by John Draper. He devised a method of making free long distance calls In 1984 American Congress launched Computer Fraud and Abuse Act In 1984 American Congress launched Computer Fraud and Abuse Act

Over the years, there was a series of noticeable occurrences as the worst consequential effect of computer hacking on more high profile cases, such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as credit card numbers. In 1999, security software became widely known by the public Over the years, there was a series of noticeable occurrences as the worst consequential effect of computer hacking on more high profile cases, such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as credit card numbers. In 1999, security software became widely known by the public

Detecting Hackers Lights showing hard drive activity being busier than what your own activities call for Lights showing hard drive activity being busier than what your own activities call for Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Suspicious files left on your computer - often in the Windows Temp directory with a tmp. suffix Obvious tampering - destroyed files, missing files, etc. Obvious tampering - destroyed files, missing files, etc. Your firewall keeps receives multiple packets from a single web address and notifies you. Your firewall keeps receives multiple packets from a single web address and notifies you.

Case Study Harvard Business School Harvard Business School Yahoo hacked Yahoo hacked