PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Robin Hood and the 40 Million Thieves David Evans
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Uintah School District Acceptable Use for Computer and Network Access.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
Tackling Online Piracy without Harming Consumer Rights IES - IBBT Workshop Strengthening the European Information Society - Consumers in Media Policy and.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Security, Privacy, and Ethics Online Computer Crimes.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
INTERNET and CODE OF CONDUCT
For Students of Humble ISD
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
P2P File Sharing: The Digital Dilemma ITED 8100 Group Project: Cathie Arnold, Melissa Barker, and Allen Bullock.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Intellectual Property
 Describe ethics  List key principles you believe › How do these principles effect your ethics?  Is it sometimes ok to “break” the rules? › Whistle.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
Policy-Induced Computer Science Problems? Background for NYU Public Design Workshop Fred B. Schneider Department of Computer Science Cornell University.
Computer Ethics Christina McCorkle.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
00870B2F.0/Internet%20Safety.jpg.
Security Issues, Ethics, & Emerging Technologies in Education
Digital Citizenship Created By: Kelli Stinson June 2011.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
By Edward Frimpong MUSIC PIRACY. WHAT IS MUSIC PIRACY? Music piracy can be defined as the stealing of music. One scenario could be borrowing a friend's.
Problem Based Learning Project Presented by Penny Reagan, Elizabeth Stewart & Stephanie Watkins.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Note1 (Admi1) Overview of administering security.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Illegal downloading Allison LEROY Clara MANSUY Nabila MENSOURI Jérôme MIHOUBI.
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 7B Computing Ethics.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
INTERNET SAFETY.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright Infringement Present by: Shao-Chuan Fang Jaime McDermott Emily Nagin Michael Piston Fan Yang Carnegie Mellon Group Presentation Date:
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Internet Acceptable Use Policy
ECE362 Principles of Design
A Gift of Fire Third edition Sara Baase
Investigating the correct and legal way to use software
IP and legal issues Super-project.eu.
Presentation transcript:

PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington

Digital Dilemma Our organization has just received notice that a small system affiliated website has been implicated in a file sharing lawsuit. Illegally acquired music and software have been found on the servers.

File Sharing File sharing is the exchange of information usually by means of computers/networks. Necessary for daily business transactions.Necessary for daily business transactions. Certain documents are made available to multi-users and must remain so.Certain documents are made available to multi-users and must remain so. Means to control access to critical files must remain in place.Means to control access to critical files must remain in place.

File Sharing Problems Potentially exposes sensitive information about our business to outsiders. –Target for hackers. –Access by rival corporations. Consumes network resources. Exposes the network to viruses and spyware. May violate copyright laws.

Action Plan The committee’s charge is to develop an Acceptable Use Policy that will determine what is appropriate use of network resources and the appropriate and legal response to violators of this policy.The committee’s charge is to develop an Acceptable Use Policy that will determine what is appropriate use of network resources and the appropriate and legal response to violators of this policy.

Action Plan We have formed a committee to address this issue and its impact upon our company. The clusters are represented by: Business: Representatives from our technical services department Creators: Local artists from the music industry Legal: Members of our legal team End Users: Personnel that utilize file sharing and will be impacted by this committee’s decisions Our Business The Four Clusters BusinessCreatorsLegalEnd Users

Music Community Copyright law supports the music industry’s position on the following items: An artist owns the music that he or she creates.An artist owns the music that he or she creates. Sharing music by unlicensed performance, broadcast or publication is the same as stealing one’s physical property.Sharing music by unlicensed performance, broadcast or publication is the same as stealing one’s physical property. The DMCA outlines the legal parameters for digital streaming or sharing music files.The DMCA outlines the legal parameters for digital streaming or sharing music files.DMCA

Music Community RIAA has reported losses of $42 million annually due to file sharing.RIAA has reported losses of $42 million annually due to file sharing. –They can no longer afford to take risks on new and innovative artists. –Currently taking aggressive legal action against individuals, but may have to change focus to networks if they are not successful in stopping the flow of illegal downloads.

Corporate Policy We support copyright laws.We support copyright laws. –Copyright law allows RIAA and other litigants to request and receive the identities of those who practice P2P file sharing where copyright infringement may be an issue. Productive employees should not be using network resources for personal use such as downloading music files or software.Productive employees should not be using network resources for personal use such as downloading music files or software. Any music or software that is downloaded should be the product of a specific need and all applicable licenses and fees should be paid according to management approval.Any music or software that is downloaded should be the product of a specific need and all applicable licenses and fees should be paid according to management approval.

Corporate Policy The technology department should approve any software for network use.The technology department should approve any software for network use. Employees who use company resources for downloading music and/or software for personal use will be subject to disciplinary action.Employees who use company resources for downloading music and/or software for personal use will be subject to disciplinary action. Virus software and firewalls should be maintained to prevent unauthorized downloads and potential harm to the network from viruses and intruders.Virus software and firewalls should be maintained to prevent unauthorized downloads and potential harm to the network from viruses and intruders.

Results The committee’s findings are as follows: The Acceptable Use Policy as it now exists is inadequate.The Acceptable Use Policy as it now exists is inadequate. –Revise according to industry standards to include specific references to music, video and software sharing and consequences to the violators of said policy. The company should consistently enforce the AUP and maintain a committee to oversee said enforcement.The company should consistently enforce the AUP and maintain a committee to oversee said enforcement.

Results Train employees on company policies and procedures in regard to file sharing.Train employees on company policies and procedures in regard to file sharing. –New hires through orientation. –Existing employees must sign AUP. –Intermittent training for all employees.

Results Add to existing hardware and software means to block unauthorized file sharing.Add to existing hardware and software means to block unauthorized file sharing. –Block ports where unauthorized P2P file sharing takes place. –Add firewalls to block access to unauthorized websites and domains such as Morpheus and Kazaa. Technology Department should acquire means to detect unauthorized file sharing.Technology Department should acquire means to detect unauthorized file sharing. –Personnel –Intruders to the network

References Cromwell, S. (1998). Getting started on the Internet: Developing an Acceptable Use Policy (AUP). Education World. Retrieved February 29, 2004, from world.com/a_curr/curr093.shtml world.com/a_curr/curr093.shtmlhttp:// world.com/a_curr/curr093.shtml Dean, K. (2004). New flurry of RIAA lawsuits. Wired News. Retrieved February 29, 2004, from Dean, K. (2003). RIAA hits students where it hurts. Wired News. Retrieved February 29, 2004, from Dean, K. (2003). RIAA legal landslide begins. Wired News. Retrieved February 29, 2004, from Digital Millennium Copyright Act § US Copyright Office Summary (1998). Digital Performance Right in Sound Recordings and Ephemeral Recordings, 69 Fed. Reg – 5702 (Feb. 6, 2004). In re: Aimster Copyright Litigation, 01 C 8933, US Dist. Ct. App. (2003). Standler, R.B. (2002). Issues in a computer Acceptable Use Policy. Retrieved February 29, 2004, from Wright, B. (2003). File share software developers want copyright reform. Retrieved February 29, 2004, from

The End

Digital Millennium Copyright Act of 1998 (DMCA) Intended to halt software piracy.Intended to halt software piracy. Gives RIAA, et al. the right to request and receive the IP addresses of those who download files where there is potential copyright infringement from the host network (businesses, universities and schools).Gives RIAA, et al. the right to request and receive the IP addresses of those who download files where there is potential copyright infringement from the host network (businesses, universities and schools). Used by RIAA to sue Napster, Morpheus, Grokster, Aimster and other P2P hosts for copyright violations.Used by RIAA to sue Napster, Morpheus, Grokster, Aimster and other P2P hosts for copyright violations. Legal teams for P2P hosts claim that it stifles free speech and jeopardizes Fair Use.Legal teams for P2P hosts claim that it stifles free speech and jeopardizes Fair Use.