Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Introduction to Computer Law Judy Jacobs Miller © 2006.

Similar presentations


Presentation on theme: "An Introduction to Computer Law Judy Jacobs Miller © 2006."— Presentation transcript:

1

2 An Introduction to Computer Law Judy Jacobs Miller © 2006

3 What is “computer law?” It’s many things:  Copyright law  Trademark law  Defamation law  Privacy law  Contract law  Criminal law

4 Copyright Legal protection Provided to authors/owners Of “original works of authorship”

5 What works are protected? Literary Musical Dramatic Choreographic and pantomime Pictorial, graphical, sculptural Motion pictures or video Sound recordings Architectural

6 When does protection begin? When the work is “fixed in any tangible medium of expression”  © sign not needed  Registration with U.S. Copyright Office not needed Examples  A novel is typed  Software code is stored on a computer disk  A photograph is taken  Song lyrics are scribbled on a napkin

7 How long is work protected? Currently,  Life of author plus 70 years  For works “for hire,” 95 years from publication

8 What rights does a copyright owner have? Reproduce the work Make derivative works Distribute the work Publicly perform or display the work For sound recordings, perform the work by digital audio transmissions

9 What is not protected by copyright? Idea (v. expression of idea) Fact Procedure Process Title, name, short phrase, slogan  But some of these may be trademarks

10 When may you use another’s work? If the work is in the public domain If the use is “fair use” If you have permission  How do you get permission?  Ask!  Written permission is safest

11 What work is in the public domain? Work for which the copyright has expired  Shakespeare  Dickens Works published by the federal government  Many web sites and publications  Examples Tax forms and instructions Health advice Social security information

12 What is “fair use?” Use for purposes such as  Criticism  Comment  News reporting  Teaching  Scholarship  research

13 Four factors considered in determining whether “fair use” Purpose and character of use  Commercial v. nonprofit  Parody Nature of work  Fact v. fiction; published v. non-published Amount used in relation to whole  Less is better than more Effect of use upon potential market for or value of work

14 Examples of fair use Art teacher shows class slides of impressionist paintings Student uses quotation from magazine for school paper Newspaper review of book includes short quotation Student paper for horticulture class shows photographs of various plants

15 Examples of copyright infringement: Downloading an Eminem recording Building a web site for your brother’s business using images you found on the Internet Copying an article from the National Geographic magazine for a school paper Borrowing your friend’s Microsoft Office software to put on your computer Finding a picture of Bob Marley on the Internet and posting it on Facebook

16 Consequences of copyright infringement Monetary Damages Imprisonment

17 Purchased software Covered by “shrink-wrap” or “click-wrap” agreement This is almost always a valid, enforceable contract  Whether you choose to read it or not They almost all say  You cannot load the software on more than one computer  If the software causes you any damage, the software company is not liable

18 Trademarks Word, name, or symbol used to identify and distinguish goods from those of another Registered with U.S. Patent and Trademark office (PTO)

19 Trademarks Some of the issues  Domain name dispute www.ggoogle.com www.AdultsRUs.com  Website metatag  Website framing

20 Defamation Oral or written false statement that harms a person’s reputation  Libel: written  Slander: oral Consequences  Monetary damages Bottom line  Creating a web site makes you a “publisher”  Statements made on Facebook or Twitter are public  Be careful what you say

21 Computer Fraud and Abuse Act (CFAA) Enacted in 1984, amended several times Prohibits accessing a computer and obtaining  National security information  Financial records or credit reports  Anything of value Prohibits trespassing on a gov’t computer  This includes just looking

22 Computer Fraud and Abuse Act (CFAA) continued … Prohibits  Releasing a worm or virus  Trafficking in computer passwords  Threatening to damage a computer Consequences  Monetary damages  Jail

23 Obscenity First amendment issue (freedom of speech) In determining what is obscene, courts apply “contemporary community standards”  On the Internet, which community... Regulation difficult

24 Obscenity continued Government attempts to protect minors from pornography include:  Communications Decency Act (CDA)  Child Pornography Prevention Act (CPPA)  Child Online Protection Act (COPA) Parts of each held unconstitutional Child pornography absolutely illegal, even in the privacy of your home

25 Privacy What privacy rights do you have? No explicit right to privacy in U.S. Constitution  4 th amendment: right to be secure in their persons, houses, … against unreasonable searches and seizures  Supreme Court recognizes “zones of privacy” Are websites such as MySpace and Facebook private?  No Are emails private?  From employer or school? Probably not Banners  From Government? Electronic Communication Privacy Act (ECPA) controls Amount of privacy depends upon age of email, whether it has been opened, and other factors

26 The End


Download ppt "An Introduction to Computer Law Judy Jacobs Miller © 2006."

Similar presentations


Ads by Google