The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Intellectual Property Image: William J. Wynn.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe College Prep Period – Wednesday, December.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 37 How iPods, iTunes, and Podcasting Work.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright Infringement
To Protect or Not Protect Sony/BMG’s DRM Dilemma Sony’s Attempt-- Sony/BMG’s digital right’s management (DRM) “rootkit” inclusion on their music.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Brought to you in part by: Sean Viers V.S Certain Systems allow file sharing Many have virus protection systems Most Free at cost Simple to Install and.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
Hear IT- An introduction to internet audio media..
A Test of Usability By Shannon Johnson.  What is the site’s purpose? In their own words: “Barnes & Noble.com leverages the power of the Barnes & Noble.
C opyright Protection and Digital Rights Management 1.
Quiz Review.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Video Following is a video of what can happen if you don’t update your security settings! security.
The Knights Diamoneek McDougald.  Video Game Addiction is someone who constantly plays video games  Likes virtual life better than real life  MMORPG.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
Section 6 Theory Software Copyright, Viruses and Hacking.
MP3 and MP4. How has MP3 transformed music? Where: MP3 can be use every where when we transfer into mp3 player, but if you don’t have a MP3 player, the.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Development, Marketing, Licensing, and Distribution.
Computer Viruses.
Digital Planet: Tomorrow’s Technology and You
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
DRM and You. DRM – What is it? DRM is Digital Rights Management - technology used to control access to digital data or hardware, which may include (but.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
1. Contents  EULAs, piracy and copyright  So why do we use computers anyway? So why do we use computers anyway?  The Digital Divide The Digital Divide.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
Computers in Society DRM. Nagging Slide Application posters due by tomorrow – me a single slide ppt I’ll be grading the initial version of the term.
Prepared by Haverford High School Students “Against All Odds”
And the technology’s effect on consumer rights. What is DRM?  Defined by Encyclopedia of Multimedia as “technology [that] offers the ability to control.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 2.
PIRACY AND COMPUTERS Asad Patel. What is (software) piracy? ■Unauthorized copying of software ■Includes distributing and downloading ■AKA ripping, cracking,
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Are You a Pirate?. A pirate…. “one who infringes another’s copyright or business rights or who broadcasts without authorization”
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Complete Steps to slay the Apple Music DRM dragon
Social, Legal, and Ethical Issues for Computing Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
And not screw over your customers
By Jake Schmitt, Seth Raleigh, Neil McLain
Digital Rights Management (DRM)
What is Information Security?
Presentation transcript:

The Downside to DRM

What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy

Uses Limited copies of DVDs or installs of software Music CD with code to confuse ripping software Company sets server to block sensitive being forwarded

Drawbacks Stays on your computer after the file is removed Often lead to computer problems Infringes on end users “fair use”?

10 Reasons Against DRM 1. DRM doesn't prevent illegal use of files, it just makes it a bit more difficult to access them. 2. All it takes is one person to crack the file and it can be made available to everyone. 3. Anyone selling content on CD is already selling unprotected files anyway. 4. DRM adds a lot of costs for content producers - Implementing DRM isn't free of course. 5. There's a huge hidden cost in trying to sell DRM'ed content.

10 Reasons Against DRM cont. 6. Often the costs of the DRM are passed along to the consumer as well. 7. DRM-free content will play on your device of today and your device of tomorrow. 8. Your media devices of the future will be significantly different than your media devices of the present. 9. DRM fundamentally changes who is control of your media. 10. Whenever you buy DRM'ed content you support the system of DRM

Real-world Examples Sony BMG hides DRM on CD’s that opens holes for hackers Class-Action lawsuits against Electronic Arts(EA) for DRM software on games Apple iTunes music downloads

Slashdot Responses “If I uninstall software, I don't expect phantom memory use by something I'm not using anymore. I know it's not realistic, but it doesn't change that uninstalled programs should not leave shit all over my hard drive.” “While the EULA may have given them the right to eat babies, did it fully disclaim that it would install additional software that would be running all the time, hidden, and not removed by the uninstaller? To have informed consent, you need to inform. Also you need a way to not consent, which means a return policy more open than ‘piss off’.” “Why should I have to run Deep Freeze, or any type of software to return my system to a state before a program is installed? Unless I give explicit permission for a program install something, then it should not be installed. How is EA doing this different from anyone installing trojans, spyware, or virus?”

Discussion Q’s Are software companies justified in using DRM? Are there alternative methods to protect their “intellectual property”? Does it need to be so strictly protected in the first place? Personal Experience with DRM?