Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.

Slides:



Advertisements
Similar presentations
Dubai Conference May 2004 Molengraaff Institute Center for Intellectual Property Law (CIER) 2 WIPO NATIONAL SEMINAR ON INTELLECTUAL PROPERTY FOR FACULTY.
Advertisements

Computer Security CIS326 Dr Rachel Shipsey.
Digital Content Solutions Digital content management technology has transformed the way to manage content and knowledge, in this knowledge era. Research.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Intellectual Property… …is not copyright Copyright Balances public access rights with author(s)’ right to control and benefit from their work Protects.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Intellectual Property
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
 Provide a basis for determining who in the organization should control access to a particular item of information.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
1 SPEED COPYRIGHT (The Copyright Quickie) Rosemary Chase Copyright Officer University Libraries George Mason University.
Understanding Copyright How does copyright relate to intellectual property Permissions to reproduce Access Copyright Print to digital permission Criterion.
General Purpose Packages
Definition: The value of property determined by tax officials. Assessed Valuation.
Infrastructure II commercial relationships Chris Reed Professor of Electronic Commerce Law Centre for Commercial Law Studies 1.
Restricted and Permitted Acts Richard McCracken Head of Intellectual Property The Open University.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
EED 502: UNIT A MULTI MEDIA TOUR.
Computer Ethics Christina McCorkle.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Section 2 Software.
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
Contract Law and Copyright Exceptions: What’s at stake? Benjamin White Head of Intellectual Property British Library.
UEC 01 : Computer Skills & Programming Concepts I 1PUA – Computer Engineering Department – UEC01 – Dr. Mona Abou - Of Lecture 6: Applications Software.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Chapter 17 E-Commerce and Digital Law
Theme: Multimedia Sound ProductionUFCFY Multimedia Sound Production and Copyright.
CSCI EXTRA CREDIT ASSIGNMENT ASHLEY R. BROADNAX TUESDAY 3:30 CLASS MARCH 11, 2008.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
1 “Something to put it in perspective…” Slide Show Name “Something to put it in perspective…” Presented by: Andy Lindsay Parallax, Inc.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
C2 Applications Software Getting the Work Done Solve a particular problem or perform a particular task.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
COPYRIGHT TERMS BROADCAST LAW. AUTHOR/ARTIST The creator of a work.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
Electronic Commerce Semester 1 Term 1 Lecture 14.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
Connectivity to bank and sample account structure
© 2005 The McGraw-Hill Companies, Inc. All rights reserved.
Intellectual Property and Cyber Piracy
A Gift of Fire Third edition Sara Baase
Infrastructure II commercial relationships
Chapter 17: E-Contracts and Licensing
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
BROADCAST LAW COPYRIGHT TERMS.
Digital Rights Management (DRM)
Oracle BI Publisher 11g R1: Fundamentals
ethical issues in business
Chapter 9 Internet Law and Intellectual Property
E-Contracts and Internet Law
BROADCAST LAW COPYRIGHT TERMS.
Essentials of the legal environment today, 5e
Intellectual Property Rights
Computer Security CIS326 Dr Rachel Shipsey.
Student Name Student Class
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Cyber Law and E-Commerce
Presentation transcript:

Electronic Commerce Semester 2 Term 2 Lecture 8

Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and licenses) are an important asset possessed by the publishers in their respective markets Protecting intellectual property rights and collecting dues from online users is proving to be quite challenging Advances in technology have raised the stakes considerably Anyone with a computer can make and distribute countless copies of anythingditital be it a book, a computer program or a piece of music

Online Copyright Protection Methods Unauthorised access to published content can be restricted by two methods: –Restricting access to the source of the work. This includes controlling Web server access or controlling individual document access –Restricting manipulation of the electronic file containing the work

Controlling Web Server Access Nearly all information providers, including online service providers, not only control access ot their systems but also vary it depending on the information a user wishes to access That is, access to certain data is conditioned on paying a higher fee, and having greater access rights Some online information providers grant full unrestricted access to any data stored on the servers Others restrict access to users with accounts or limit access to non-registered users

Controlling Document Access A second level of control can be exerted through measures tied to the electronic file containing the work One type of restriction can be implemented through “rendering or “viewing” software Another method of access restriction is encryption Encryption technologies can be used to deny access to a work in a usable form

“Rendering” or “Viewing” Software Such systems require: –A proprietary or unique file forma that can be read only by certain software and that is developed or controlled by the information provider, or –Software that incorporates both a “control” measure to prevent viewing or use of a work without authorisation from the information provider and “manipulation” functions to permit the user to view or use the work

Controlling Use of the Work Hardware and/or software placed in personal computers can provide protection against unauthorised uses of copyrighted work For example, files containing works can include instructions used solely to govern or control distribution of the work In addition, the copyright information can be used to limit what can be done with the original or a copy of the file containing the work – it can limit the use of the file to read only and the number of times the work can be retrieved, opened, duplicated or printed

Implementing Electronic Contracts Software-based systems for tracking and monitoring uses of copyrighted works are being developed by publishers A combination of access controls, encryption technologies, and digital signatures can be used by copyright owners to protect, license, and authenticate information

Online Liability for Copyright Infringement The question exists as to who is liable for copyright infringement on digital networks There are differences of opinion as to the extent to which online service providers should be liable for infringing materials delivered over their systems