Professional Documents
Culture Documents
Michelle Read
Each country has its own laws World Intellectual Property Organization Promotes the protection of intellectual property rights around the world, and may arbitrate disputes as well.
Copyright Law
Expressed and Fixed not an idea in ones head
To register a copyright Get Permission Creative Commons (think: Flickr, among others).
Fair Use for education Purpose and Character of Use Nature of the Work Relevant Amount Effect on the Market
Trademark Law
- A logo, acronym, word, color scheme, combination of sounds, or any other symbolic device used to distinguish a product or service as unique
3 Criteria must be met Active use Can not be ambiguous or ordinary Can not be misleadingly comparable to preexisting trademarks in the marketplace
Patent Law
any new and useful process, machine, manufacture, or
composition of matter, or any new and useful improvement thereof Complications of the Internet No direct effect Concern of ease of communication
Cyberbullying vs Cyberharassment
Definitions:
"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. Cyber-harrassment is the same as above only the victim and/or perpetrator(s) are adults
Tort Liability
What is Tort Law? Broad area of law dealing with civil wrongs caused to a party for which another party is liable and involves monetary damages
Four areas of non-physical tort a. Invasion of Privacy b. Intentional Infliction of mental distress and defamation c. Libel d. Slander
Beware: A Lighter Burden of Proof for Civil Action Different rules from criminal law: only requires a preponderance of the evidence vs. Beyond a reasonable doubt
Privacy Law
The Four Privacy Torts
Public disclosure of embarrassing private facts
Intrusion
False Light
Your Responsibility
It is YOUR responsibility to protect your personal information from:
Theft Loss unauthorized unauthorized unauthorized unauthorized
This applies not only to computer files/documents but also paper files/documents.
Protection
Taking Charge
1. While you may feel secure in the privacy of your own home, each time you connect to the Internet you enter PUBLIC space.
2. You need to minimize your personal risks as you work and play online. 2. You have both right and responsibilities. The Internet has its own code of conduct Actions that you take have consequences
2-16
Some universities also prohibit the use of specific Internet services, such as some music sharing sites K12 often have more strict rules regarding what students may access (e.g., YouTube, Facebook). Privileges may be granted as students age. However, often this means that accountability and consequences are more strictly enforced too.
2-18
Password Security
Your password is the first line of defense While you may think that your account has nothing to offer, someone can use it as a starting point to access other accounts System administrators have resources to maintain accounts and the system No system administrator will need to ask you for your password Do not be tricked by an email, no matter how official looking, asking you for your password
2-19
Phishing
Phishing is a form of online fraud characterized by unsolicited e-mail messages seeking personal information for fraudulent purposes. Phish often appears to originate from reputable sources that maintain accounts for the recipient. Spear phishing is a large scale phishing effort directed at all employees of a company intended to capture an account name and password.
2-21
Phishing
Here are some tips to help you identify phishing expeditions: References to accounts that you do not have. A general salutation (Dear Valued Customer) rather than one by name. Grammar and spelling errors. Mismatch in the URL of embedded links with that of the apparent source (URLs of links display in the status bar at the bottom of the web page when the cursor hovers over them). Contact the apparent source directly using other trusted means first.
2-22
Phishing
Some tips from the Federal Trade Commission: Dont provide personal information unless you initiate the contact or can verify the identity of the agent receiving it Never click on links from an unsolicited e-mail Legitimate organizations never request or seek confirmation of personal information via e-mail or phone Forward to reportphishing@antiphishing.org and the company being impersonated
2-23
Identity Theft
Occurs when stolen personal information is used to open accounts used to make fraudulent purchases. In many cases, information is stolen from third party business records. Not limited to internet activity Warning signs: Late or missing bills. Receipt of credit cards or other lines of credit not requested. Requests for payment from debt collectors.
2-24
Identity Theft
If your identity is stolen: Notify any of three major credit bueaus: Equifax, Experian, or TransUnion Close compromised accounts. File report with local law enforcement office. File a complaint with the FTC. Contact relevant government agencies to cancel/replace stolen licenses or IDs. And flag your account appropriately. Consult your financial institution about bank and other accounts.
2-25
2-27
Firewall
Install a firewall on your home computer (especially if you use a broadband connection) Do not download files offered to you in chat rooms or personal Web pages For maximum safety, encrypt all files that contain sensitive information or store them offline on removable media Do not leave your computer connected to the Internet any longer than necessary
2-28
Firewalls
A firewall is software that monitors all attempts to move bytes over the Internet in either direction and notifies you when such movement is attempted. Firewalls previously were only used by large organizations but now home users can install them on their computers. They can prevent a Trojan horse from stealing your files or spyware from phoning home.
2-29
Internet Scams
Scams are nothing new, but the Internet makes it easier for them to reach you Examples include: Get rich quick offers Miracle health cures Guaranteed loans or credit Your credit report repaired for a fee If it sounds to good to be true, then it probably is
2-30
2-31
2-32
2-33
2-34
2-35
Email Privacy
Corporations/educational institutions can monitor email and WWW usage Email threads are recorded and documented conversations It is illegal for your company to monitor phone calls however, they can monitor email and WWW usage. Free email programs (gmail, hotmail, aol, etc) scan email for viruses Gmail scans the text this is used to determine the types of advertisements in your Gmail
trust 3rd parties not to collect/track our information traces and not use them publicly for advertising, targeting potential criminal behavior, non-normative behavior, etc?
is not interpersonal, including institutional trust trust in government and self-trust most would agree that these forms of trust are coherent only if they share important features of (i.e. can be modeled on) interpersonal trust. This is why I say that the dominant paradigm of trust is interpersonal. (McLeod, 2006)
Interpersonal Trust
Trustworthiness is a characteristic we infer, Trust is an attitude that is constructed over time
Trust exists when one party to the relation believes the other party has incentive to act in his or her interest or to take his or her interest to heart.
More
Trust is optimistic; the opposite is distrust.
The truster accepts some level of risk or vulnerability There must exist a potential for betrayal