P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Woodland Hills School District Computer Network Acceptable Use Policy.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Boyertown Area School District Acceptable Use Policy.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security+ Guide to Network Security Fundamentals
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Music File Sharing Caitlin Smith Stewart Rutledge Jess Culpeper.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Analysis of Instant Messenger Programs Celia Hung and Nathan Miller ECE 478/578 Department of Electrical Engineering Oregon State University.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Cyber Crimes.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more.

PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Computer Programming I
Copyright Law An Review on Computer Music Files and P2P File Sharing.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
Protecting Your Organization Identity Theft and Data Breach.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Topic 5: Basic Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Security Issues & Ethics in Education By Maud Mushayamunda.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Securing Information Systems
Computer Safety and Ethics
Chapter 9: Internet Law, Social Media, and Privacy
Add video notes to lecture
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Programming I
COMPUTER MEDIATED COMMUNICATION
Introduction to Cybercrime and Security
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
Woodland Hills School District
Presentation transcript:

P2P NETWORKS Legal Risks

Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”

P2P Capabilities Instant messaging Image transfers during sessions Voice /Video Chat Game requests File transfers File Sharing Ability to Change Ports Application sharing Whiteboard Remote assistance Webcam Message Logging

P2P Vendors AIM MSN Yahoo KaZaA Morpheus Trillain Grokster Napster Gnutella eDonkey WinMX

Plethora of P2P Risks P2P software vulnerabilities –May lead to hacker exploits Infected Files –Viruses –Trojan Horses –Other malware

Plethora of P2P Risks (cont’d) Misconfigured File Sharing –May expose more than intended Unencrypted Communications –Unauthorized disclosure Social Engineering –Give up sensitive information

Plethora of P2P Risks (cont’d) File transfers reveal IP addresses –File or image transfer –Voice chat –Remote assistance sessions –Application Sharing Identity Theft –Clear text –Hijack sessions –Impersonate legitimate use

Plethora of P2P Risks (cont’d) Message logging –Session recorded to file –Fertile hunting ground Social engineering Sensitive data

Plethora of P2P Risks (cont’d) Stealth activity –Ability to change TCP/IP ports on the fly –Blocking ports may not work –May require IDS to detect activity Aggessive applications –Can cripple bandwidth –Can force increased infrastructure costs

P2P Risks Legal Risks Trade secret violations Unlawful file content –Pornography –Criminality Copyright infringement –MP3 files –Photos –Plagiarized research or papers

How Can They Sue Us? Let me count the ways…

Litigation Focus Major Claims –Invasion of privacy –Criminal Prosecution –Copyright infringement

Invasion of Privacy Failure to inform users of monitoring Misuse of information obtained

Criminal Prosecution Certain file content prohibited –Child pornography images –Possession a crime –Both federal and state laws –Much variability in state laws

Copyright Infringement Major source of litigation activity –“perfect copies” issue Increased protection under federal law –Digital Millenium Copyright Act Digital works more strongly protected Where or where has “fair use” gone?

Plaintiffs Motion picture industry Trade associations –RIAA –Business software alliance Individual Artists

Defendants You Your students Grokster

Is P2P Sharing of Copyrighted Files Illegal? Yes

MGM v. Grokster 125 S. Ct –June 27, 2005 FindLaw.com

Methods of Protection Policies and procedures Audit and Review Electronic Monitoring Intrusion Detection Systems User education and training Sanctions