YOUNG PEOPLE, MUSIC & THE INTERNET
|
|
|
- David George
- 10 years ago
- Views:
Transcription
1 YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading
2 What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading or P2P (peerto-peer). It s a hot topic for young people. The main reason: music. People of all ages have always loved to share music, and just as with digital photography the Internet has made it extremely easy to share tunes with friends (and strangers) anywhere. But it s important to note that you can be sued for taking music from services like Kazaa, E-Donkey and BitTorrent that offer unauthorized file-sharing. P2P has recently received a lot of media attention because of legal issues dealing with businesses and individuals sharing copyrighted music and movies. The Supreme Court has ruled that, in addition to individuals, P2P companies can be sued for encouraging people to illegally swap songs and movies over the Internet. But illegal downloading is just one of the risks involved. This guide will help you to understand how your family can enjoy digital music and stay safe and legal. How can my kids enjoy digital music over the Internet while staying safe and legal?
3 How does P2P work? Each file-sharing network is a little different, but basically a file-sharer goes to a website and downloads its P2P software onto the computer. Usually the software creates a shared media folder on your computer which opens it up to fellow file-sharers. This enables you to exchange photos and videos, as well as music, software and games, directly between your computer and theirs.
4 What are the risks to my children? There are benefits to file-sharing for example, you could make your own created music available to millions of people. But the risks of using unauthorized P2P services are real too. HARMFUL CONTENT/ CONTACT The greatest risk to children on P2P is unwelcome content, such as pornographic or violent images. Indeed, studies have shown that porn is being widely shared on the P2P networks and that people purposely misname files to trick people into downloading them. A filter that can block website addresses and keywords on Web pages rarely blocks porn or violent images and videos on P2P networks. Even files named Winnie the Pooh or Pokemon have been found to contain pornography. As a parent, you also need to be aware that file-sharing software can allow users to chat with other file-sharers, many of them strangers, so the same concerns and rules about chatting on the Internet should apply here too. See Can my children access pornography on P2P?
5 PRIVACY AND SECURITY File-sharing software opens doors in your computer which can compromise your privacy and security. Spyware The biggest pest is spyware little software programs that are downloaded with media files or bundled with file-sharing software. Some spyware even logs your keystrokes and provides the person who controls it with passwords, credit card numbers and other confidential information on your computer. Privacy You can inadvertently share more of your computer files with other file-sharers than you mean to. As studies have shown, this could include confidential information such as medical records and financial information. Viruses File-sharers computers are vulnerable to the viruses infecting other machines on the P2P networks and to people trying to control computers remotely, or spammers who want to make money by using thousands of zombie PCs to send ads about low-cost mortgages and cheap drugs. One study found that nearly half of the software files on one P2P network contained viruses or other malicious code. 1 If your child downloads one of these malicious files, your PC could be used, among other things, as a porn distributor. If your family PC has been performing slowly, file-sharing might be the culprit. Could our private files be accessed by others? 1 See article in Wired News:
6 LEGAL RISKS Thousands of file-sharers have been sued by the recording and film industries- and virtually all the settlements have involved substantial fines. While there is no problem if you are sharing the content that you have originally created yourself, nearly all music and film files on filesharing services are protected by copyright, and therefore people uploading (sending) them run legal risks. Is it true my son could be sued for downloading music from p2p? Downloading music without permission from p2p is illegal in most countries, including the United States, but people who share or upload music on the Internet, particularly if they upload a lot, run a greater risk of being sued or prosecuted. Parents can be held responsible for what happens on the family computer, even if they are not themselves engaged in illegal activity. In order to settle out of court people typically have to pay thousands of dollars.
7 So what can we do as parents? There are 3 practical steps you can take right now: 1 Talk with the filesharer(s) in your home! File-sharing and other forms of technology in the home are opportunities to increase parent child communication. Get your children to show you how they are using the computer and what they are sharing. Talk about copyright, and who loses out when songs get distributed without permission on the Internet musicians? Songwriters? Are they deprived of the chance to earn a living from their work? But also - who pays the bill if someone in your house gets sued?
8 2 Check your computer You can make sure you are aware of what is on your family computer whether you or another member of the household put it there. There is free information available that will take you through how to identify or disable P2P software step by step; see, for example, It is also important to make sure that your computer is protected against viruses and spyware and has firewall software installed. You can usually get free anti-virus software from your Internet service provider (ISP). Up to date anti-virus software can help capture anything downloaded from P2P. See for details of tools to help protect your computer. How do I know if I have files that are being shared on my computer?
9 3 Explore the Web s legal music There s plenty of it more than a million tracks of all genres and periods both for purchase and for free. For less than the price of a cup of coffee, you can download a track from a legal music retailer and keep it for life. There are numerous legal music sources on the web (including legal P2P services) and these sites are safe and guarantee sound quality. For links to legal music sources, go to There s also plenty of legal music available free of charge on the Web sites where musicians want fans to sample their work and learn about concerts and albums they re promoting. To find them, search a favorite musician, group or label s own site. Sound quality may vary, but there s a great deal to explore.
10 Resources and further advice For everything you want to know about music online and checking your computer, see For an online guide to making the Internet & technology fun, safe, and productive, see For daily kid-tech news for parents, including the latest on P2P, see About this guide If you have information that will help the fight against child sexual exploitation you can report it to To educate students on how to avoid dangerous, inappropriate, or unlawful behavior go to This guide for parents has been written by children s charity Childnet International and Net Family News, Inc., with support from Pro-Music. Cartoons by John Byrne. The views in this document are solely those of Childnet. Childnet is a non-profit organisation working to help make the Internet a great and safe place for children. Registered as a charity in the UK (number ). See and Pro-Music is an international music sector education campaign about digital music. This guide is supported by pro-music member organisations representing musicians, performers, artists, major and independent record companies, publishers and retailers across the music industry. Copyright Childnet International 2005
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
THE HIGH COST OF P2P ON THE ENTERPRISE
THE HIGH COST OF P2P ON THE ENTERPRISE In their private lives, prudent people adjust their behaviors based on their perception of risk. Depending on where they live, for example, they lock their doors
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
Internet: Copying & Downloading
INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose
3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
Spyware and Adware What s in Your Computer?
Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
COPYRIGHT AND SECURITY GUIDE FOR COMPANIES AND GOVERNMENTS
COPYRIGHT AND SECURITY GUIDE FOR COPANIES AND GOVERNENTS DOWNLOAD 25% COPLETE PAGE 02 You are at risk if commercial music, movies or other copyrighted material is on your organisation s computer systems
Saheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
ResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
7 PRACTICES FOR SAFER COMPUTING
7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
STOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University
The Bottom Line on Information Technology Use and, in particular, File-Sharing at Immaculata University Immaculata University ( IU ) takes a strong stand against unlawful distribution of copyrighted music,
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Equipment Needed. Connecting to the Internet
All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
What you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy
THE SCHOOL DISTRICT OF PHILADELPHIA
No. 815 SECTION: OPERATIONS THE SCHOOL DISTRICT OF PHILADELPHIA TITLE: ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES ADOPTED: March 15, 2012 REVISED: August 21, 2014 815. ACCEPTABLE USE OF
RISKS OF SPYWARE. Lesson Procedures
i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6
POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6 GENERAL Computer network service through the Internet provides an electronic highway connecting millions of computers around the world.
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
FAQ s on The Center for Copyright Information And Copyright Alert System
1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
Who's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
PEW INTERNET PROJECT DATA MEMO. BY: Director Lee Rainie and Research Specialist Mary Madden (202-296-0019)
PEW INTERNET PROJECT DATA MEMO BY: Director Lee Rainie and Research Specialist Mary Madden (202-296-0019) RE: Preliminary findings from a Web survey of musicians and songwriters DATE: May 2004 Between
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
A Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
