Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.

Slides:



Advertisements
Similar presentations
DCIA Mission Commercial Development of Commercial Development of Peer-to-Peer (P2P) File Sharing Peer-to-Peer (P2P) File Sharing Other Distributed Computing.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Security, Privacy, and Ethics Online Computer Crimes.
Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
March 2006 Taner Erig - EMU5-1 Basic Information on Spyware and Adware n It is difficult to define spyware and adware with precision. The working definition.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
How to Protect Your PC Grayware Adware, Malware, Spyware.
Creating First Class Web Pages Log into your account.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET SAFETY FOR STUDENTS
Viruses & Destructive Programs
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Digital Citizenship Project
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
Cyber Crimes.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Technology Acceptable Use Policy. Each student must sign and follow the BCPSS Acceptable Use Policy (AUP). You and your parents agree that you will conduct.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Ethics Christina McCorkle.
CYBER CRIME.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Cassidy Culligan Digital Citizenship Project ED 505.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Technologies Information and Communication. Browsing  When a computer has a connection to the Internet, the user can view what is on the Internet through.
Computer crimes.
So – You want to learn how to put an article onto the state website. (Note: If you have not done so, you will need to review the web training provided.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Joomla Awdhesh Kumar Singsys Pte Ltd. What is Joomla? Joomla is an award-winning content management system (CMS), which enables you to build Web sites.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Acceptable Use Policy
For help or more information, please contact the P&W SRM team at ;
Digital Security Identity theft Copyright Laws Plagiarism, and More.
MALWARE Autumn Mattis.
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Senior Citizens from Phishing s
Student User Agreement and Policy 2022
Presentation transcript:

Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by the Consumer Disclosures Working Group (CDWG)

PART 1 -- The following copyright warning will be prominently displayed each time a user installs a new version of P2P software developed and distributed by participating companies: The use of this software for illegal activities, including uploading or downloading games, movies, music, or software without authorization, is strictly forbidden, and may be subject to civil and/or criminal penalties.

The use of this software for illegal activities, including uploading or downloading games, movies, music, or software without authorization, is strictly forbidden, and may be subject to civil and/or criminal penalties.

PART 2 -- The following risk alert will be prominently displayed in a framed message box above-the-fold on the home pages of websites of participating P2P software companies : Click here for important information about P2P software risks.

Click here for important information about P2P software risks.

Click here for important information about P2P software risks.

Click here for important information about P2P software risks.

Click here for important information about P2P software risks.

Click here for important information about P2P software risks.

PART 3 -- In addition to here (in the preceding message boxes) linking to the following page on each participating website, this message box and page link will also appear each time the user opens the P2P software, for example in a pop-up window or on the homepage. On the following risks disclosures page, please note that risks are listed alphabetically, and any future risks would be added in alphabetical order.

P2P Software Risks Click here for important information from the US Federal Trade Commission (FTC) about the use of P2P software. Copyright Infringement - Some files contain copyrighted works, like popular games, movies, music, and software. P2P software makes it possible to upload and download copyrighted material from the Internet without proper authorization, but that can violate copyright laws and subject you to criminal and civil penalties. Click here for information about how to use this P2P software application to minimize copyright infringement. Data Security - P2P software allows any user to access the files you place or move into your shared folder. If youre not careful, files containing your personal and confidential information could inadvertently be uploaded for distribution on the Internet. This could cause a number of problems, including identity theft. Click here for information about how to use this P2P software application to minimize data security problems. Pornography - Files downloaded from the Internet using P2P software could contain pornographic material. These files may be mislabeled with seemingly innocent names. This can result in users, including children, being inadvertently exposed to pornography. Redistributing files containing child pornography or obscene content can be a crime. Click here for information about how to use this P2P software application to minimize inadvertent exposure to pornography and illegal redistribution. Spyware - Files downloaded from the Internet using P2P software may contain spyware that can track your online activity, control your computer, or harm its operation. These files typically are disguised and can go undetected. Click here for information about how to use this P2P software application to minimize spyware and about the differences between legitimate adware and spyware. Viruses - Files downloaded from the Internet using P2P software may carry computer viruses, worms, or trojans that can damage your computer or cause other problems. These files typically are mislabeled to disguise their true purpose. Click here for information about how to use this P2P software application to minimize computer viruses.

By clicking here (at the top of the preceding page) users will link to the following document posted online by the US Federal Trade Commission (FTC), where they can obtain additional important information about P2P software applications.

By clicking here (at the end of each disclosure) users will link to a relevant section of the participating companys website, where they can obtain additional important information about how that particular application can help then avoid or mitigate each respective risk.

Screen-shots of separate and distinct pages from eDonkey, Grokster, Kazaa, Morpheus, and TrustyFiles with a highlight-arrow to the relevant portion that addresses one each of the five listed risks.

To provide your comments to the Consumer Disclosures Working Group as to the value and usefulness of the foregoing P2P software risks disclosures and to make recommended changes please Thank You