The Copyright, Designs and Patents Act 1988

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to prevent infringement within [business name] September.
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
By Andy Scott, Michael Murray and Adam Kanopa
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright Infringement
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
C opyright Toni Lumley Music. Song Copyrights Copyrights identify who actually owns the rights to a song thus who gets to make money from it. When songwriters.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
© Folens 2008 Cultural changes in music Brought about by ICT.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
NOT PROTECTIVELY MARKED Data Protection Information Management & Information Security.
Unethical use of Computers and Networks
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
CRIMES AGAINST PROPERTY Chapter 10. Objectives Learn the two broad classifications of property crimes Be able to define and identify the elements of each.
Copyright legislation Copyright (Computer Programs) Regulations 1992 Elma Graham.
Intellectual Property and Copyright Ethics Atif Imran Toor Computer Science with Artificial Intelligence Profile
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Copyright 2010, The World Bank Group. All Rights Reserved. Judiciary Statistics Part 1 Crime, Justice & Security Statistics Produced in Collaboration between.
Federation Against Software Theft. What Is Copyright? What is copyright infringement? What are the penalties for copyright infringement? What is a trade.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Software licensing, site licensing, piracy, copyright, pilferage, and the Jon Johansen case. Lauren Verdi CSCI 101 Wed 2:00-3:15.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Software Piracy By: B. Kaniecki.
Laws Jamie Dunn.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
Legal and Ethical Issues in Computer Security Csilla Farkas
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Copyright, Designs and Patents Act What does it cover? The Copyright, Designs and Patents Act covers work.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
IPR Enforcement in the United Kingdom Kenny Wright Danish Patent and Trademark Office.
2.6 CRIMES AGAINST PROPERTY AND RELATED DEFENCES.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Legal and ethical issues
Misuses of ICT Malpractice and crime © Folens 2008.
Using a Computer Network
Computer Basics Technology’s Impact.
Legal and Ethical Issues in Computer Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BCT 2.00 Analyze Technology Issues
Copyright, Designs and Patents Act 1988
Unit 3 INTRODUCTION CRIMINAL LAW.
Creative Media Pre-production Learning outcome 1.
Presentation transcript:

The Copyright, Designs and Patents Act 1988 © Folens 2008

Problems in dealing with copyright Software is easy to copy. It is easy to transfer files from one country to another over the Internet. Many people do not see copying software as theft. © Folens 2008

Software piracy Software piracy - illegal copying of software or data. 27% of all software used in UK is pirated. Pirated software is sold at car boot sales, computer fairs and on e-Bay. Pirated software deprives the owners of software of billions of pounds in revenue. © Folens 2008

Problems with illegally copied software It may contain viruses. No technical support is available. It does not qualify for upgrades. It may not be complete. Above all you are committing a crime. © Folens 2008

Copyright, Designs and Patents Act 1988 Makes it a criminal offence to: copy or distribute software or manuals without permission or licence from the copyright owner run more versions of software than the software licence allows force employees to make or distribute software © Folens 2008

The Federation Against Software Theft (FAST) An organisation set up by all the main software manufacturers. It educates the public about piracy. It raises awareness of the problems with software piracy. It allows people to blow the whistle on offenders. © Folens 2008

The consequences of being found with illegal software Police can enter your premises or home and confiscate all your computer equipment as evidence. You can be taken to court and prosecuted with the possibility of a prison sentence. You can be sued by the software manufacturer who can claim damages from you for loss of revenue. © Folens 2008