How Free is Free? Downloading on the Internet U101 - Fall 2012.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Time 3 rd grade. Personal Information -Don’t post your , address, or your cell phone number. -Don’t share your last name online. -Don’t post.
Cyber Time Kaitlyn Bergen Kindergarten. Personal Information When you are online, never post: -Your address. -Your full name. -Your phone number.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Internet Safety/Cyber Ethics
How to keep your kids safe online
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Company LOGO Internet Safety A Community Approach.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
How It Applies In A Virtual World
Professional Development for Media and Technology Copyright Wisdom for Music and Digital Copyright Presented by: Barry S. Britt This presentation will.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet Safety.
COPYRIGHT AND FAIR USE for Faculty and Staff.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
HOSPITAL COPYRIGHT TOOLKIT A Guide to the Canadian Copyright Act A Presentation prepared by Jan Figurski, MLS Mary McDiarmid, MISt, AHIP c2007.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
Staying Safe Online Keep your Information Secure.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Copyright and Fair Use Online Presenter: David Wittenstein ©2007 Dow Lohnes PLLC Jon Hart David Wittenstein
Junior High Computer Lab.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Copyright Juan Romero The University of Texas at Brownsville EDTC 6340 Summer II.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Staying Safe Online A Practical Guide for Middle School Students.
Internet Safety & Online Citizenship
Digital Citizenship Created By: Kelli Stinson June 2011.
Emily Adler, Megan Gasvoda, and Kristine McNally.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Digital Citizenship Sonya McGraw June 2, Netiquette WHAT IS IT? n Set of rules for proper behavior among people on the Internet.
Cassidy Culligan Digital Citizenship Project ED 505.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
COPYRIGHT ISSUES IN EDUCATION Presentation by Ben Hilt.
Tips To Stay Safe Online By Aayush Hanson Pharaoh.
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
How Can I Stay Safe When I Use The Internet?. Do Not Give Out Personal Information Your last name Your home or cell phone numbers Where you live Where.
Take a moment to think about the electronic gadgets you use on a daily basis. Do you face digital dilemmas when using the computer, your mp3 player, or.
Digital Citizenship.
MarkScan Digital Content Protection & Advisory Introduction Document
Columbia Pictures and the Trailer Takedown
Copyright URLs © EIT, Author Gay Robertson, 2017.
ethical issues in business
E SAFETY ASSEMBLY.
Student User Agreement and Policy 2022
How might your digital footprint affect your future opportunities?
Presentation transcript:

How Free is Free? Downloading on the Internet U101 - Fall 2012

Some terms and definitions Copyright Copyright infringement DMCA and “Safe Harbor” Illegal file sharing p2p file sharing IP address Infringement notice Subpoena

Introduction to scenario USC’s “Agent to Receive Notification of Claimed Copyright Infringement” (AKA Copyright Agent) received multiple infringement notices: –Movie: “She’s out of My League” –TV Show: “Top Chef” –Music: “Our Song” by Taylor Swift The same IP address is cited in each notice

Scenario assumptions Infringement notices in each packet were received by USC’s Copyright Agent (these are actual notices with private information changed) University technical staff researched the notices to identify alleged infringer (USC student John Doe) This is at least the second alleged infringement matched to student John Doe, resulting in referral to USC Student Judicial

Scenario assumptions These infringement notices are not subpoenas, but may eventually lead to one Except for the specifics pertaining to this case (i.e. student name and infringement notices), all other information is publicly and freely available online

What is in your packet Media Owner Student University Student Judicial

Possible approaches Media owner wants/expects… –USC to stop illegal file sharing –USC to provide better education and awareness Student (alleged infringer) wants/expects… –USC to stop sending him notices –USC to defend him –To apologize for his behavior and commits to stop illegally sharing files –Free/cheaper digital media (e.g., movies, music, books, etc.) –Anonymity on the Internet

Possible approaches University wants/expects… –Faculty, staff and students to obey applicable laws and policies –To maintain “safe harbor” status –To not lose federal funding as a result of copyright infringements Student Judicial wants/expects… –Students to follow the rules and uphold the Carolina Creed

Closing security tips Staying anonymous on the Internet is very, very difficult – don’t do anything online you may regret later… The Internet has a very, very long memory On the Internet, even people/”identities” you recognize may be strangers – always stay alert Keep all of your software up to date – especially anti-virus

Questions? Marcos Vieyra Kimberly South Kenny Edwards PHONE: (803) WEB: How Free is Free: Downloading on the Internet