Size: px
Start display at page:

Download ""

Transcription

1 Information Security Holger Schlingloff Jan 30th, 2002

2 1 Information security and copyright Why is there a connection? Remember definition from the very beginning: Similar to material objects, some informations are owned by a person or group of persons; ownership is established by a social process. Who owns an ackquired information? World Intellectual Property Organization (WIPO) sees a serious threat of owner s rights by digital copies copy protection mechanisms

3 2 Problem: if digital informations are readable, they can be copied. Thus, so far all copy protection mechanisms have been broken. Therefore, legal obstackles are being built: 1996: International resolution for the harmonization of digital copyright USA 1998: Digital Millenium Copyright Act (DMCA) 2001 EU-guideline 2002 German law

4 3 DMCA What is illegal: unlawful to circumvent copy protection mechanisms already provision and research (!) is a criminal act What is guaranteed: Fair use : A purchased information can always be used for the intended purpose; moreover, it is allowed to make copies for private, academic or report purposes. However, there is no obligation for the vendor to make the copying possible.

5 4 First sale : The originally purchased information can be transferred (if no copies are kept). Limited time : After a certain time all informations belong to the public. In Germany, there is a trend to adopt all the restrictions from the DMCA and to discard the rights. For example, there is no guarantee to copy for academic or report purposes.

6 5 DVDs and the MPAA The first big test of the DMCA was De-CSS. Together with the introduction of DVD in 1996, the CSS (content scrambling system) was introduced by the MPAA (Motion Picture Association of America). 5 world regions, dedicated players 40 bit stream cipher, badly designed because of military export restrictions for cryptography in the USA manufacturer- and media key, all manufacturer s keys on each DVD; a single published key breaks the system no DVD players for Linux provided

7 6 Norwegian scholars (MoRE - Masters of Reverse Engineering) developed a DVD player for Linux by decompilation of any player software (Xing), thereby breaking the system Jon Johansen, age 16, from the group was arrested for burglary (!) The MPAA tries to inhibit the distribution of DeCSS; already by linking to a site where DeCSS can be downloaded you can be brought before court The promoters of DeCSS claim their right of fair use; outcome pending

8 7 Adobe e-books In 2001, Dmitry Sklyarov (27 year old PhD student) reverse enginnered Adobe s e-book format; experimental software for the transformation from e-books into PDF. wrote a paper about the insecurity of the cypher algorithm Invited to a scientific conference in Los Angeles ( ); arrested at the conference on behalf of Adobe; released on bail (50K$) in Dec. 2001

9 8 SDMI The secure digital music initiative is a forum of 180 organizations for the protection of digital music. In September 2000, a public challenge was made to break a newly invented watermark system for digital music. At the same time, it was prohibited to publish the results because this could lead to circumvention of copy protection (DMCA) The challenge was mostly boycotted by security specialists; one contributor who wanted to publish his decryption was threatened and professionally discredited.

10 9 RIAA In Oct. 2001, following the attack on the world trade center, the recording industry association of America made a suggestion for an additional anti hacking passage within the anti-terrorism laws: all data espionage and intrusions which are in order to inhibit electronic piracy should be without punishment. This was not included in the final law. Subsequently, the RIAA began a series of flooding attacks on music exchange sites (Napster etc). information security war

11 10 Further topics in information security Firewall technologies Smart Cards Biometrics Digital payment systems Crypto policy Surveillance and espionage systems see the relevant literature!

Digital Rights Management. Introduction

Digital Rights Management. Introduction Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media DRM defends against the illegal

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Next Tuesday. Digital Rights Management. Outline. Basic Problem. Copyright Crawler. Content hashing

Next Tuesday. Digital Rights Management. Outline. Basic Problem. Copyright Crawler. Content hashing CS 155 Spring 2006 Next Tuesday Digital Rights Management John Mitchell Paul Kocher President and Chief Scientist Cryptography Research, Inc. 2 Basic Problem Joey writes and records a song Song distributed

More information

Digital Rights Management in the Internet

Digital Rights Management in the Internet Digital Rights Management in the Internet Jason But jbut@swin.edu.au Internet Applications Email Text/data transfer between individuals (one-to-one distribution of content) WWW Content publication (one-to-many

More information

Digital Rights Management

Digital Rights Management Digital Rights Management Hubris, history, hacks. Yan Shoshitaishvili UCSB Seclab Overview Content Duplication Digital Rights Media - History Media-specific DRM MovieStealer Design Optimizations Countermeasures

More information

The vast majority of the comments submitted suggest just that the anticircumvention cause of action a whole should be suspended.

The vast majority of the comments submitted suggest just that the anticircumvention cause of action a whole should be suspended. Good morning. My name is Paul Hughes, and I am Public Policy Advisor at Adobe Systems Incorporated. On behalf of Adobe I would like express my appreciation for the opportunity to appear before you today

More information

U.S. - CHILE FREE TRADE AGREEMENT ANALYSIS OF IMPLEMENTATION OF EXCEPTIONS AND LIMITATIONS AND TECHNOLOGICAL PROTECTION MEASURE PROVISIONS

U.S. - CHILE FREE TRADE AGREEMENT ANALYSIS OF IMPLEMENTATION OF EXCEPTIONS AND LIMITATIONS AND TECHNOLOGICAL PROTECTION MEASURE PROVISIONS U.S. - CHILE FREE TRADE AGREEMENT ANALYSIS OF IMPLEMENTATION OF EXCEPTIONS AND LIMITATIONS AND TECHNOLOGICAL PROTECTION MEASURE PROVISIONS A. INTRODUCTION Discussions of limitations and exceptions to copyright

More information

Ringling College of Art and Design

Ringling College of Art and Design Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;

More information

Allocation vs. scheduling

Allocation vs. scheduling Allocation vs. scheduling We have seen why register allocation is a useful compilation phase: when done well, it can make the best use of available registers and hence reduce the number of spills to memory.

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

No. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER

No. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER 307 F.Supp.2d 521 United States District Court, S.D. New York. I.M.S. INQUIRY MANAGEMENT SYSTEMS, LTD., Plaintiff, v. BERKSHIRE INFORMATION SYSTEMS, INC., Defendant. BUCHWALD, District Judge. No. 03 Civ.

More information

Analysis of E-book Security

Analysis of E-book Security Analysis of E-book Security Guoyou He Helsinki University of Technology Telecommunications Software and Multimedia Laboratory ghe@cc.hut.fi Abstract E-book is a new publication technology raised in recent

More information

Request for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA)

Request for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA) DEPARTMENT OF COMMERCE National Telecommunications and Information Administration LIBRARY OF CONGRESS Copyright Office [Docket No. 990428110-9110-01] RIN 0660-ZA09 Request for Comments on Section 1201(g)

More information

Professional, legal, ethical and social issues

Professional, legal, ethical and social issues Professional, legal, ethical and social issues 1- Overview The work presented here aims to: Instil a professional attitude toward the application of computer technology. Provide an appreciation of the

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

How to get from laws to technical requirements

How to get from laws to technical requirements How to get from laws to technical requirements And how the OPM hack relates technology, policy, and law June 30, 2015 Isaac Potoczny-Jones ijones@galois.com www.galois.com Galois, Inc. Overview Outline!

More information

Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis. What is Reverse Engineering? Software Reverse Engineering: Reversing

Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis. What is Reverse Engineering? Software Reverse Engineering: Reversing Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis What is Reverse Engineering? Reverse engineering (RE) is the process of etracting the knowledge or design blueprints from anything man

More information

ICOM 5018 Network Security and Cryptography

ICOM 5018 Network Security and Cryptography ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols

More information

Countering the Threat to the Digital Lifestyle

Countering the Threat to the Digital Lifestyle Encryption and USB Drives: Whitepaper Countering the Threat to the Digital Lifestyle Encryption and USB Drives 8GB of Data 2,000 songs - or your company marketing strategies 2,500 vacation pictures - or

More information

Ben F. Anderson. Eric J. Renzulli. 5 May 2009. Professor George T. Heineman, Major Advisor

Ben F. Anderson. Eric J. Renzulli. 5 May 2009. Professor George T. Heineman, Major Advisor MODERN DIGITAL RIGHTS MANAGEMENT METHODS An Interactive Qualifying Project Report Submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of

More information

From Copyright to Information Law Implications of Digital Rights Management

From Copyright to Information Law Implications of Digital Rights Management From Copyright to Information Law Implications of Digital Rights Management Stefan Bechtold Stanford Law School 559 Nathan Abbott Way, Stanford, CA 94305-8610, USA stef@n-bechtold.com http://www.jura.uni-tuebingen.de/~s-bes1

More information

Reply to Proposed Classes of Work For Exemption: SCEA is responding to and opposes the proposals to exempt:

Reply to Proposed Classes of Work For Exemption: SCEA is responding to and opposes the proposals to exempt: February 20, 2003 United States Copyright Office James Madison Memorial Building 101 Independence Avenue, SE Washington, DC 20024 1201@loc.gov Re: Rulemaking on Exemptions from Prohibition on Circumvention

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Updated January 2016. Hosting and Managed Services Acceptable Use Policy

Updated January 2016. Hosting and Managed Services Acceptable Use Policy Updated January 2016 Hosting and Managed Services Acceptable Use Policy Key Comment This policy provides Cologix customers ordering hosting and managed services from Cologix with standards and rules regarding

More information

March 10, 2014. Dear Chairman Coble and Representative Nadler:

March 10, 2014. Dear Chairman Coble and Representative Nadler: March 10, 2014 Rep. Howard Coble, Chairman Rep. Jerry Nadler, Ranking Member United States House of Representatives Judiciary Subcommittee on Courts, Intellectual Property and the Internet 2138 Rayburn

More information

Overview. Core Instruments for Internet Infringement and Pirate

Overview. Core Instruments for Internet Infringement and Pirate 5. Throttle the Intellectual Property Criminal Infringement - Trend of and Countermeasures against the Crimes of Internet Infringement of Rights WANG Zhiguang, Deputy Director, Intellectual Property Division,

More information

Digital Rights Management. Past and Present Ben Wells

Digital Rights Management. Past and Present Ben Wells Digital Rights Management Past and Present Ben Wells Digital Rights Management: Goals To extend "analog" copyright techniques to the digital world. Give content Creators some control over the use of the

More information

SUPERIOR COURT OF THE STATE OF CALIFORNIA COUNTY OF SANTA CLARA

SUPERIOR COURT OF THE STATE OF CALIFORNIA COUNTY OF SANTA CLARA 1 1 1 1 1 1 1 1 0 1 RICHARD R. WIEBE (SBN 1) California Street, Suite 0 San Francisco, CA Telephone: (1) -00 Facsimile: (1) - THOMAS E. MOORE III (SBN ) TOMLINSON ZISKO MOROSOLI & MASER LLP 00 Page Mill

More information

2011 COUNTRY WATCH LIST

2011 COUNTRY WATCH LIST The Congressional International Anti-Piracy Caucus Senator Sheldon Whitehouse, Co-Chair Senator Orrin G. Hatch, Co-Chair Congressman Bob Goodlatte, Co-Chair Congressman Adam B. Schiff, Co-Chair 2011 COUNTRY

More information

Intellectual Property, Copyright and Digital Rights Management for Computer Graphics

Intellectual Property, Copyright and Digital Rights Management for Computer Graphics Intellectual Property, Copyright and Digital Rights Management for Computer Graphics July 2003 Dan L. Burk University of Minnesota Barbara Simons Stanford University Robert A. Ellis Course Description

More information

Computer Security 06 17417. Digital Rights Management

Computer Security 06 17417. Digital Rights Management Computer Security 06 17417 Digital Rights Management Version 0.7 Authors Christopher Andrews, Tim Ellis, Dafyd Jenkins, Ajay Sailopal, Eakbal Singh, Jaspreet Singh. I Table of Contents 1 INTRODUCTION...1

More information

Gold Lock Desktop White Paper

Gold Lock Desktop White Paper Gold Lock Desktop White Paper TM EMAIL AND FILE ENCRYPTION SOFTWARE Effective Data Security in the 21st Century Evaluating the needs of appropriate data security and identifying the risks in the modern

More information

Digital Rights Management: An Integrated Secure Digital Content Distribution Technology

Digital Rights Management: An Integrated Secure Digital Content Distribution Technology Journal of Intellectual Property Rights Vol 9, July 2004, pp 313-331 Digital Rights Management: An Integrated Secure Digital Content Distribution Technology P Ghatak, R C Tripathi, A K Chakravarti Department

More information

PROTECT YOUR INTELLECTUAL PROPERTY

PROTECT YOUR INTELLECTUAL PROPERTY PROTECT YOUR INTELLECTUAL PROPERTY Stop Trade in Fakes! 1-866-999-HALT www.stopfakes.gov STRATEGY TARGETING ORGANIZED PIRACY STOP! Ensuring that America s creativity and innovations are protected from

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA. Table of Contents

LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA. Table of Contents e-copyright Bulletin October - December 2004 LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA Dr. Ida Madieha bt. Abdul Ghani Azmi * Table of Contents I. Introduction...2 II. Copyright

More information

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Digital Rights Management

Digital Rights Management 2009 Levente Buttyán - piracy and DRM - basic model and architecture of DRM systems -MS Windows DRM -why DRM is bad? - content fingerprinting and watermarking - software protection techniques Introduction

More information

9/8/2011 4:50 PM 491-526_IWAHASHI_090811 (DO NOT DELETE)

9/8/2011 4:50 PM 491-526_IWAHASHI_090811 (DO NOT DELETE) HOW TO CIRCUMVENT TECHNOLOGICAL PROTECTION MEASURES WITHOUT VIOLATING THE DMCA: AN EXAMINATION OF TECHNOLOGICAL PROTECTION MEASURES UNDER CURRENT LEGAL STANDARDS Ryan Iwahashi In MGE UPS Systems, Inc.

More information

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS

COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS 1 of 6 8/16/2007 9:16 AM TOPIC: COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS INTRODUCTION: This past summer saw developments relating to peer-to-peer ( P2P ) music file sharing. Of most significance,

More information

CONTENT SECURITY BEST PRACTICES SCREENER DIGITAL TRANSFER SERVICES

CONTENT SECURITY BEST PRACTICES SCREENER DIGITAL TRANSFER SERVICES MPAA Site Security Program CONTENT SECURITY BEST PRACTICES SCREENER DIGITAL TRANSFER SERVICES Version 1.0 December 31, 2011 DOCUMENT HISTORY Version Date Description Author 1.0 December 31, 2011 Initial

More information

Digital archiving of scientific information Czech experience

Digital archiving of scientific information Czech experience Digital archiving of scientific information Czech experience P. Slavik, P. Mach, M. Snorek Czech Technical University in Prague Prague, Czech Republic Slavik mach snorek@fel.cvut.cz Abstract This paper

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

Docket No. RM 2008-8 RESPONSE FROM THE AMERICAN ASSOCIATION OF LAW LIBRARIES, THE MEDICAL LIBRARY ASSOCIATION THE SPECIAL LIBRARIES ASSOCIATION

Docket No. RM 2008-8 RESPONSE FROM THE AMERICAN ASSOCIATION OF LAW LIBRARIES, THE MEDICAL LIBRARY ASSOCIATION THE SPECIAL LIBRARIES ASSOCIATION BEFORE THE U.S. COPYRIGHT OFFICE LIBRARY OF CONGRESS IN THE MATTER OF EXEMPTION TO PROHIBITION ON CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS FOR ACCESS CONTROL TECHNOLOGIES Docket No. RM 2008-8 RESPONSE

More information

WHY DO I NEED DATA PROTECTION SERVICES?

WHY DO I NEED DATA PROTECTION SERVICES? WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

ETRAC Presentation ECCN 4E001.c intrusion software technology. Jim O Gorman, President October 15, 2015

ETRAC Presentation ECCN 4E001.c intrusion software technology. Jim O Gorman, President October 15, 2015 ETRAC Presentation ECCN 4E001.c intrusion software technology Jim O Gorman, President October 15, 2015 Offensive Security - Projects Kali Linux (previously BackTrack Linux) Industry Standard Open source

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators

The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators Introduction. The field of film and media studies in the United States was shaped

More information

Privacy & Data Security: The Future of the US-EU Safe Harbor

Privacy & Data Security: The Future of the US-EU Safe Harbor Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT

More information

Digital rights management (DRM) is commonly defined as the set of

Digital rights management (DRM) is commonly defined as the set of Perspectives on DRM: Between Digital Rights Management and Digital Restrictions Management by Rafal Kasprowski Digital rights management (DRM) is commonly defined as the set of technological protection

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.

Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges. IT 4823 Information Security Administration Legal and Ethical Considerations March 24 Legal and Ethical Aspects Topics include: cybercrime and computer crime intellectual property issues privacy ethical

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

INTELLECTUAL PROPERTY LAW

INTELLECTUAL PROPERTY LAW June/July 2002 INTELLECTUAL PROPERTY LAW Current issues on patents, trademarks and copyrights Cybersquatters Can Run, But They Can t Hide Jurisdiction Issues in Cyberspace Cybersquatting (registration

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Hannes Federrath http://www.inf.tu-dresden.de/~hf2/ Adversary model Strength of existing systems Tendencies DRM technologies

More information

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute

More information

Intellectual Property Law and Interactive Media

Intellectual Property Law and Interactive Media Edward Lee Lamoureux Steven L. Baron Claire Stewart Intellectual Property Law and Interactive Media FREE FOR A FEE PETER LANG New York Washington, D.C./Baltimore Bern Frankfurt am Main Berlin Brussels

More information

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn

More information

Acceptable Use of Electronic Networked Resources & Internet Safety

Acceptable Use of Electronic Networked Resources & Internet Safety PROCEDURES AND GUIDELINES Acceptable Use of Electronic Networked Resources & Internet Safety Arlington Public Schools (APS) expects all users to access the Internet and other electronic networked resources

More information

Digital Rights Management & XML Security Protocols

Digital Rights Management & XML Security Protocols Digital Rights Management & ML Security Protocols Head-to-Head or Hand-in-Hand? Holly Lynne McKinley, SSCP Booz Allen Hamilton McLean, VA Introduction Digital Rights Management brings to mind controversial

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common

More information

Cybersecurity and Travel to China or to the Russian Federation

Cybersecurity and Travel to China or to the Russian Federation Cybersecurity and Travel to China or to the Russian Federation Recent press coverage in the N.Y. Times (see "Traveling Light in a Time of Digital Thievery" in the reference list at the end of this document)

More information

Equipment Needed. Connecting to the Internet

Equipment Needed. Connecting to the Internet All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

Getting Connected. Student Technology Services

Getting Connected. Student Technology Services Getting Connected Student Technology Services 2015-2016 Contents Welcome 3 Your Computer 4 Network Services 5 Network Assistance 6 Emergency Notification 8 Labs and Printing 9 Student Technology Store

More information

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1

Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1 Winny Case A P2P Software Copyright Case in Japan Impact on the Information Society and Legal Analysis Takato NATSUI Professor at Meiji University Law Faculty, Tokyo Japan Lawyer at Asuka-Kyowa Law Firm,

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY As a provider of web site hosting and other Internet-related services, ConstantVPS offers its customer (also known as Subscribers ) and their customers and users the means to acquire

More information

Digital locks and Canadian research library collections

Digital locks and Canadian research library collections Canadian Association of Research Libraries ad hoc Digital Locks Working Group Digital locks and Canadian research library collections Implications for scholarship, accessibility, and preservation Project

More information

Cryptography and DRM

Cryptography and DRM Cryptography and DRM Martin Persson & Alexander Nordfelth Cryptography, spring 2008 Uppsala Universitet Table of contents: Introduction 2 Brief History 2 How it is used 3 CSS (Content Scrambling System)

More information

PDF security - a brief history of development

PDF security - a brief history of development PDF security - a brief history of development Background Adobe was the first organization that set out to try and provide security controls for PDF based documents, and had their own particular views as

More information

True Identity solution

True Identity solution Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright

More information

One Education Internet Services SLA 2014-2015

One Education Internet Services SLA 2014-2015 One Education Internet Services SLA 2014-2015 1. Commencement a. The Contract begins on the date One Education or agents working on its behalf communicate its acceptance of the customer s order for the

More information

Cyber Security and Science

Cyber Security and Science Cyber Security and Science Peter Weinberger pjw@googlecom Feb 9, 2011 These opinions are only mine, no one else s and even then, only today They may change at any time Protecting intellectual property

More information

EECS 588: Computer and Network Security. Introduction January 14, 2014

EECS 588: Computer and Network Security. Introduction January 14, 2014 EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall

More information

How to start a dog photography business, sell used camera equipment atlanta. Enter Here --->>> Profitable Photography. Real User Experience

How to start a dog photography business, sell used camera equipment atlanta. Enter Here --->>> Profitable Photography. Real User Experience How to start a dog photography business, sell used camera equipment atlanta. Enter Here --->>> Profitable Photography. Real User Experience How to start a dog photography business, business plan photography

More information

Software License Management using the Polymorphic Encryption Algorithm White Paper

Software License Management using the Polymorphic Encryption Algorithm White Paper pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Response to Department of Commerce request for comment Docket No. 100910448-0448-01

Response to Department of Commerce request for comment Docket No. 100910448-0448-01 Ben Broderick Phillips benbroderickphillips@gmail.com Response to Department of Commerce request for comment Docket No. 100910448-0448-01 I am writing to express my views on how copyright and rights holder

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

WYANDOTTE ONLINE ACCEPTABLE USE POLICY

WYANDOTTE ONLINE ACCEPTABLE USE POLICY WYANDOTTE ONLINE ACCEPTABLE USE POLICY Wyandotte Online may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Online High Speed Internet users should

More information

White Paper: Multi-Factor Authentication Platform

White Paper: Multi-Factor Authentication Platform White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all

More information

Digital Music. Goals of Intellectual Property Law. Intellectual Property Protection. Copyright. What Copyright Protects

Digital Music. Goals of Intellectual Property Law. Intellectual Property Protection. Copyright. What Copyright Protects Digital Music NBA 600 Digital Music Class 6, Mon 11/5 (Originally Wed 10/31) Last time talked about economics of digital goods and services Today focus on music industry Technological changes and relation

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

PIRATES OF THE DIGITAL MILLENNIUM

PIRATES OF THE DIGITAL MILLENNIUM PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds

More information