Download presentation
Presentation is loading. Please wait.
Published byJasmine Harrington Modified over 8 years ago
1
ETHICS
2
Best Song Ever
3
DID THEY BREAK THE LAW? James Blunt Black Eyed Peas Alphaville Jason Mraz Train The Calling Elton John Akon John Denver Lady Gaga U2 The Last Goodnight Maroon 5 The Beatles Bob Marley Men at Work Jack Johnson Spice Girls Green Day A-ha Toto Eagle Eye Cherry Beyonce Kelly Clarkston Jaso Derulo Smashing Pumpkins Joan Osborn Avril Levigne The offspring Timberland OneRepubic Eminem Rhianna Bon Jovi Aqua Red Hot Chilli Peppers Gregory Brothers MGMT Andrea Bocielli Axis of Awesome Missy Higgins
4
“ ICE, ICE, BABY”
5
“ UNDER PRESSURE”
6
D D DIFFERENT? YOU BE THE JUDGE.
7
WHAT THE COURTS SAID... It came to light that Vanilla Ice had sampled Queen and David Bowie’s “Under Pressure” without consent or license. Ice Ice Baby hit number one on the charts in the United States and Vanilla Ice became the one ‘under pressure’. Vanilla Ice altered the rhythm of the baseline thinking he would thereby avoid any question of credit, royalties, license or even permission. This case never went to court as it was clear that Vanilla Ice had stolen the sample without permission. He settled out of court with Queen and David Bowie for an undisclosed but very likely very high amount. Ice Ice Baby has been released in many different versions, since then, with all of the legal procedures followed.
8
ROBIN THICKE VS. MARVIN GAYE Robin Thicke’s Song Marvin Gaye’s Song Judge awarded that Robin Thick had to pay Marvin Gaye’s family $7 Million dollars for using his song Robin Thicke’s song had previously made him over $10 Million at that point
9
ETHICS Standards of right and wrong behavior A gauge of personal integrity The basis of trust and cooperation in relationships with others
10
WHAT ETHICS ARE NOT Laws that carry a criminal penalty Detailed instructions for every possible situation
11
WHERE DO THEY COME FROM? Values of a society Values of a school, business, or organization Values from family and heritage Values of an individual
12
WHAT ARE RULES? Specific guidelines about appropriate behavior Use of computers as outlined in consequences and punishments issued by the computer owners if rules are violated. Acceptable Use Policies (AUPs) Professional Codes of Ethics Classroom Disclosure Documents
13
WHAT ARE LAWS? Regulations passed by state and federal bodies Protect against some forms of misuse of computers and information resources.
14
BUT EVERYONE IS DOING IT You may not be discovered, this time, but next time... A serial number may be traced A help line may become suspicious An acquaintance may report you A web address may record your visits And more...
15
COPYRIGHT LAWS Software developers own their programs. Software buyers only own the right to use the software according to the license agreement. No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission.
16
TYPES OF COPYRIGHT Public Domain Freeware Shareware All Rights Reserved Creative Commons
17
PUBLIC DOMAIN Has no owner and is not protected by copyright law It was either created with public funds, or the ownership was forfeited by the creator. Rare Unreliable Poor quality Virus-laden
18
FREEWARE Has an owner but you can use it without paying for it Freeware is free because the license says it is, but it’s still under the owner’s control. Examples Google Chrome Gmail Internet Explorer
19
SHAREWARE Licensed for a trial period, but you must pay for it for continued use Some shareware trials expire on a certain date Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.
20
ALL RIGHTS RESERVED Must be used exactly as the license states You can’t legally use it--or even possess it-- without the owner’s permission. Choir teacher making copies of music for class Movies (FBI Warning) Songs
21
CREATIVE COMMONS Copyright where you give permission to make changes to created work Wikipedia Wired.com Ted Talks
22
VIRUS REVIEW Virus: Software that is harmful to your computer Worm: Virus that eats through holes in the network
23
MORE VIRUS REVIEW E-mail Virus: A virus sent through email Trojan Horse: A bad program that is disguised as something good
24
HOW TO PROTECT YOUR PC Anti-virus software Firewall Be careful what you download
25
ANNOYING AND SNEAKY Malware: Software that aids in gathering personal information and sold to others Adware: Pop ups or advertisements
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.