e-pirates of the Digital Age Copyright Issues in Software and Music
|
|
|
- Kory Bond
- 10 years ago
- Views:
Transcription
1 VEA Bringing Learning to Life Program Support Notes e-pirates of the Digital Age Copyright Issues in Software and Music Senior Secondary - TAFE 27mins Teacher Notes by Jorge Viega, B.Sci.(Chemical), Dip.Ed.,Associate Dip in Lab Technology Produced by VEA Pty Ltd Commissioning Editor Simon Garner B.Ed. Executive Producer Simon Garner B.Ed You may download and print one copy of these teacher notes from our website for your reference. Further copying or printing must be Suitable for: ICT To order or inquire please contact VEA: Australia 111A, Mitchell Street, Bendigo, Victoria 3550 FREECALL: Phone: (03) Facsimile: (03) New Zealand PO BOX 4390, Shortland St., Auckland FREECALL: Facsimile: [email protected] Website
2 e-pirates of the Digital Age For Teachers: Introduction Piracy is having significant financial impacts on both the business software and music industries. Piracy is also affecting the type of music that is being produced and limiting the amount of software available to the public. This program looks at piracy and copyright in relation to music and the Internet and covering issues such as: using copyrighted information, software copyright law, the facts and figures surrounding piracy and how to respect intellectual property. 'e-pirates of the Digital Age' analyses a variety of contemporary issues which are related to the use of ICT in society focusing specifically on piracy and copyright of computer-related media, including software, games and music. New technology has had an incredible impact on the way people use information. Some of the issues facing our society are not yet covered by government policy, ethical and legal issues are not always in sync and are often difficult to police, and conflict with each other does occur. Industry professionals and musicians alike have their say, and help inform us on how piracy affects their industries through their own experiences. Program Timeline 00:00:00 Introduction 00:01:25 Chapter 1 Copyright and the internet 00:05:40 Summary Copyright and the internet 00:06:15 Chapter 2 Issues in using copyrighted information today 00:10:25 Summary Issues in using copyrighted information today 00:11:05 Chapter 3 Copyright law 00:15:15 Summary Copyright law 00:16:10 Chapter 4 Facts and figures 00:19:44 Summary Facts and figures 00:20:25 Chapter 5 Respecting intellectual property 00:24:35 Summary Respecting intellectual property 00:25:40 Credits Other Relevant Programs available from VEA Social and Ethical Issues in IT Securing the Web Hack the Planet Please visit our website for more relevant programs VEA Bringing learning to life - 2 -
3 Student Worksheet: Before Viewing the Program e-pirates of the Digital Age 1. Discuss, brainstorm, and identify copyright issues. 2. Give examples of ethical and legal considerations of organisations and individuals with respect to copyrights. 3. Identify laws that are in place to protect copyrights. What are the possible consequences of the breaching of such laws? - 3 -
4 While Viewing the Program e-pirates of the Digital Age 1. Most people have participated in piracy, or breached copyright at some point. and some strongly believe that you are not hurting anyone when you download a song or use pirated software. a) In what forms does piracy takes place? b) Where is piracy having a significant impact? 2. The Internet continues to present many new and exciting opportunities for the ICT industry. However, the internet has also dramatically increased the rates of music and software piracy. What is internet piracy? 3. Myspace and YouTube have fast become two of the most popular websites in the history of the internet. These sites provide a platform for users to and. Another great feature is that users can view other people s content. 4. What measures have MySpace and YouTube taken to prevent copyright breach? 5. Under the copyright act, downloading or copying illegal business software for the purpose of obtaining a commercial advantage is a crime. Do copyright laws apply to the internet? - 4 -
5 a) Complete this sentence: e-pirates of the Digital Age Not all copyright owners are the mega rich multinational record labels or software companies. The majority are struggling bands and software developers who work out of a home office. All musicians and software developers have a right 6. What are other issues apart from the ethical issues surrounding piracy? 7. Individuals and organisations need to be aware of their legal rights and responsibilities regarding the use and ownership of copyrighted material. What are they obliged to do? a) Why? 8. How does copyright law work? a) What is the cost of copyright protection? 9. Copyright law varies from country to country but Australia, Europe, the US and other westernised nations have to a large extent aligned their laws. Where is Australian copyright law detailed? - 5 -
6 e-pirates of the Digital Age 10. How does the Copyright Act protect people? a) Why do artists generally feel that copyright law is not protecting them from piracy? 11. What are music and software piracy generally described as? a) What is internet piracy? 12. Even if you re not copying and distributing music for profit you re still in breach of copyright, and as such subject to charges and penalties.what is the basic principle? 13. The Australian Record Industry Association, ARIA, has recently released a research paper that confirms internet file sharing and the burning of CDs is having a significant negative effect on record sales in Australia. The statistics speak for themselves. Aria s research found that within the 6 months prior to their research: a) Over Australians illegally burnt a CD. b) Australians illegally downloaded music files via the internet. c) of all music owned by those aged 17 and under was obtained illegally
7 e-pirates of the Digital Age 14. Intellectual property is a broad phrase containing various areas of law. Copyright is one of these areas. Intellectual property is often more valuable than physical property. Why? 15. In very specific situations, people are sometimes allowed to use copyright material without permission. Give such an example. 16. Fill in the empty spaces: Severe penalties exist for those who choose to breach copyright law. The penalties can be both criminal and civil. Individuals can face fines up to $ individual offence, and corporations can face fines up to $ similar offences. Individuals and CEOs can face up to for each for in prison
8 After Viewing the Program 1. Research project: e-pirates of the Digital Age In Australia, copyright law is detailed in the Copyright Act The legislation applies throughout Australia. Although it came in to effect in 1968, it has been constantly updated to bring it in line with new developments in technological and social norms. a) Identify the main points of the 1968 Act b) When and why have there been changes to the Act? c) What are the Australian National privacy points? 2. Investigate what policies and procedures are in place with respect to copyrights
9 Suggested Responses During the Program e-pirates of the Digital Age 1. Most people have participated in piracy, or breached copyright at some point. And some strongly believe that you are not hurting anyone when you download a song or use pirated software. a) In what forms does piracy takes place? From copying clothing designs through to downloading music and business software. b) Where is piracy having a significant impact? Piracy is having significant financial impacts on both the software and music industries. 2. The Internet continues to present many new and exciting opportunities for the ICT industry. However, the internet has also dramatically increased the rates of music and software piracy. What is internet piracy? Internet piracy is the unauthorised uploading, downloading or distribution of intellectual property such as movies, television, music, video games and business software programs. 3. Myspace and YouTube have fast become two of the most popular websites in the history of the internet. These sites provide a platform for users to post their stories, identities,and creativity online. Another great feature is that users can view other people s content from all around the world. 4. What measures have MySpace and YouTube taken to prevent copyright breach? Both MySpace and YouTube have improved their fingerprinting software to recognise copyrighted material and block it from being uploaded. 5. Under the Copyright Act, downloading or copying illegal business software for the purpose of obtaining a commercial advantage is a crime. Do copyright laws apply to the internet? Copyright law applies to the internet and other forms of piracy such as burning CDs and software programs. a) Complete this sentence: Not all copyright owners are the mega rich multinational record labels or software companies. The majority are struggling bands and software developers who work out of a home office. All musicians and software developers have a right to be paid for the hours of work they have put into developing something. 6. What are other issues apart from the ethical issues surrounding piracy? File sharing websites can open the family computer to worms and trojans that can reduce privacy and security. Violent, pornographic and other unwanted material can also be imbedded within files that appear to be innocent. 7. Individuals and organisations need to be aware of their legal rights and responsibilities regarding the use and ownership of copyrighted material. What are they obliged to do? They are all legally obliged to make sure that the music and software they use is fully licensed and paid for. a) Why? Because harsh penalties exist for those caught breaching copyright
10 e-pirates of the Digital Age 8. How does copyright law work? Copyright gives legal protection to people who express information and ideas. Information and ideas are commonly expressed through writing, photographs, paintings, movies, music, and software. a) What is the cost of copyright protection? Copyright protection doesn t cost anything and in Australia it s automatic, there s no registration procedure. As soon as you have created something, you own the copyright. 9. Copyright Law varies from country to country but Australia, Europe, the US and other westernised nations have to a large extent aligned their laws. Where is Australia copyright Law detailed? In Australia, copyright law is detailed in the Copyright Act The legislation applies throughout Australia. 10. How does the copyright Act protect people? The Copyright Act provides that people who breach copyright can be charged and may face both criminal and civil penalties. a) Why do artists generally feel that copyright law is not protecting them from piracy? Because these laws are hard to reinforce. 11. What are music and software piracy generally described as? Music and software piracy are generally described as the deliberate infringement of copyright for commercial or personal gain. Physical piracy is burning cds, and also includes recording a concert without the artists permission. a) What is internet piracy? Internet piracy is music or software that is transmitted globally via the internet without the permission of the copyright owners. It can be transmitted via websites, or through peer to peer file transfers. 12. Even if you re not copying and distributing music for profit you re still in breach of copyright, and as such subject to charges and penalties.what is the basic principle? The basic legal principle is that if you don t have permission from the copyright owner you are not allowed to copy music or software and distribute it. 13. The Australian Record Industry Association, ARIA, has recently released a research paper that confirms internet file sharing and the burning of CDs is having a significant negative effect on record sales in Australia. The statistics speak for themselves. Aria s research found that within the 6 months prior to their research: a) Over 3.6 million Australians illegally burnt a CD. b) 3.4 million Australians illegally downloaded music files via the internet. c) 31% of all music owned by those aged 17 and under was obtained illegally
11 e-pirates of the Digital Age 14. Intellectual property is a broad phrase containing various areas of law. Copyright is one of these areas. Intellectual property is often more valuable than physical property. Why? Take software as an example, it routinely costs more money to develop and create software than it does to construct the actual computer it s eventually installed on. 15. In very specific situations, people are sometimes allowed to use copyright material without permission. Give such an example? For example, there are special provisions that permit libraries, educational institutions and government bodies to use copyright material without permission. However strict rules exist and fees apply. 16. Fill in the empty spaces: Severe penalties exist for those who choose to breach copyright law. The penalties can be both criminal and civil. Individuals can face fines up to $60,500 for each individual offence, and corporations can face fines up to $303,500 for similar offences. Individuals and CEOs can face up to five years in prison
Animation in Multimedia
VEA Bringing Learning to Life Program Support Notes Middle Senior Secondary Animation in Multimedia 29mins Teacher Notes by Mark Ridgeway, Dip Ed, BSc(Hons), BSc, Grad Dip (Computing), Grad Cert (ebusiness)
HSC: All My Own Work. Copyright. Introduction. Module Outline
HSC: All My Own Work Copyright Introduction This module explains copyright and its relevance to students. The Board of Studies NSW gratefully acknowledges permission to quote from and paraphrase information
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction
Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au
www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are
Wound Management A Nurse s Guide
VEA Bringing Learning to Life Program Support Notes Wound Management A Nurse s Guide Health Care 20 mins Teacher Notes by Tracey MacFadyen, Registered nurse is RN. Clinical Nurse Educator Produced by VEA
Internet: Copying & Downloading
INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose
Copyright in Photography
Intellectual Property Guides Copyright in Photography Frequently asked questions relating to copyright in photographs Contents Copyright : The Basics Pages 1-2 Copyright in Photographs Pages 3-4 Other
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
Change Management in Large Organizations Smoking Laws - A Case Study
VEA Bringing Learning to Life Program Support Notes Change Management in Large Organizations Smoking Laws - A Case Study Senior Secondary TAFE 29 mins Teacher Notes by Debra McNaughton, B.A., Dip.Ed. Produced
COPYRIGHT ACT -- FAIR DEALING (Advisory for SUTD Faculty, Researchers, Staff and Students)
COPYRIGHT ACT -- FAIR DEALING (Advisory for SUTD Faculty, Researchers, Staff and Students) When determining whether copying of the whole or part of the work or adaptation constitutes fair dealing, the
UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?
UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result
THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE!
THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE! TABLE OF CONTENTS TEACH YOUR KIDS GOOD HABITS TEACH THEM THE IMPORTANCE OF COPYRIGHT The potential to earn income from sales and other uses incentivises
Financial Management and the Planning Cycle
Financial Management and the Planning Cycle Program Support Notes by: Belinda Taylor BBus, Grad Dip Ed (Sec) Produced by: VEA Pty Ltd Commissioning Editor: Sandra Frerichs B.Ed, M.Ed. Executive Producer:
Virginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet
St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources
Online Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014
POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406 SECTION: 400 : Facilities and Equipment Page 1 of 8 APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014 CROSS
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Using Public Computer Services in Somerset Libraries
Using Public Computer Services in Somerset Libraries Somerset Library Service will ensure all staff and users are aware of the computer services provided and the terms and conditions of their use to which
Copyright Implications of Content Management Systems: Schools
Copyright Implications of Content Management Systems: Schools 1. What Is A Content Management System? A Content Management System ( CMS ) is a software application that enables teaching material to be
Department of Education & Early Childhood Development: Copyright Guidelines for Victorian Government Schools
Department of Education & Early Childhood Development: Copyright Guidelines for Victorian Government Schools Contents 1 Introduction: about the Guidelines... 1 2 Intellectual property and copyright...
PRESENTS: Copyright School: Copy Rights & Copy Wrongs"
PRESENTS: Copyright School: Copy Rights & Copy Wrongs" Introduction Copyright Basics Copyright On the Internet Discussion Scenarios What is the source of U.S. Copyright law? To promote the progress of
Policies Concerning the use of Computers
Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers
HP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
ICT Project Management
Program Support Notes by: Richard Swancott BA Science. Post Grad Dip Business Computing Produced by: VEA Pty Ltd Commissioning Editor: Darren Gray Cert IV Training & Assessment Executive Producer: Simon
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
MUSIC, VIDEO AND SOFTWARE PIRACY POLICY
Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian
MUSIC COPYRIGHT GUIDE FOR SCHOOLS
MUSIC COPYRIGHT GUIDE FOR SCHOOLS ENQUIRIES apraamcos.com.au [email protected] 1300 852 388 MADE BY MUSIC 1 School is often the starting point of a lifelong love of music for many musicians. APRA AMCOS
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people
COMMUNICATION AND NETWORK POLICY
COMMUNICATION AND NETWORK POLICY Always within REACH MOUNT BAKER SOUTH PRIMARY SCHOOL IPAD LOAN AGREEMENT Purpose To facilitate participation in all aspects of Mount Barker South Primary School curriculum.
APPLICATION FORM LICENCE FOR REPRODUCTION OF SOUND RECORDINGS
APPLICATION FORM LICENCE FOR REPRODUCTION OF SOUND RECORDINGS APPLICANT S DETAILS Business/ Company/ Partnership or Sole Trader Name: ABN: Telephone Business Postal Address: Facsimile State: Postcode:
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY
WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY MAY 2013 DOCUMENT SUMMARY Document Number Responsible Officer P0 DO0008.2 Assistant Directors Effective Date May 2013 Superseded Docs Workplace Internet,
Online Marketing Strategies
Program Support Notes by: Amy Nieuwenhuis B.Ed, Cert IV TAA, Cert. III Bus. Produced by: VEA Pty Ltd Commissioning Editor: Sandra Frerichs B.Ed, M.Ed. You may download and print one copy of these support
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
ipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
tdodo Internet Web Hosting Terms and Conditions
tdodo Internet Web Hosting Terms and Conditions Things you should know: A. The total amount payable by you for web hosting services depends on the plan that you have selected and your usage of the service.
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Copyright Law An Introduction
Copyright Law An Introduction The following pages outline some basic facts about copyright law and answer various questions, such as 'how long does copyright last?' 'When does infringement occur?'... and
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
Intellectual Property in Hong Kong Contents
Intellectual Property in Hong Kong Contents Introduction Intellectual Property Protection in Hong Kong Intellectual Property Law Trade Marks Patents Copyrights Registered Designs Layout-Design (Topography)
Using Digital Content Repositories: Copyright Compliance Manual for Schools
Using Digital Content Repositories: Copyright Compliance Manual for Schools Introduction... 2 When do copyright restrictions not apply?... 3 A. Linking... 3 B. Embedding... 3 C. Material Created by You
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY
FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet
1.3 Your access to and use of the Site, including your order of Products through the Site, is subject to these terms and conditions.
Home Support Network Terms and Conditions General 1.1 This Home Care site at www.homesupportnetwork.com.au ( Site ) is a shopping website where you can browse, select and order products advertised on the
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
T R E S S C O C K S & M A D D O X S O L I C I T O R S & N O T A R I E S, A U S T R A L I A
T R E S S C O C K S & M A D D O X S O L I C I T O R S & N O T A R I E S, A U S T R A L I A SYDNEY MELBOURNE BRISBANE 26 May 1999 Contact: House of Representatives Standing Committee on Legal & Constitutional
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET
INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
Marketin. arketing a Car A Business Marketing Case Study. Program Support Notes. High School. 25mins. Business. Bringing Learning to Life. VEA Inc.
VEA Inc. Bringing Learning to Life Program Support Notes Marketin arketing a Car A Business Marketing Case Study High School 25mins Teacher Notes by Debra McNaughton, B.A., Dip.Ed. Produced by VEA Pty
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Copyright Infringement and Enforcement in the US
Copyright Infringement and Enforcement in the US A Research Note, November 2011 The U.S. House of Representatives is currently debating the Stop Online Piracy Act (SOPA) the counterpart to the Senate s
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Years 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
Issues in Copyright Management & File Sharing
Issues in Copyright Management & File Sharing Madhavan Manivannan Ethics Seminar 1 Copyright definition Copyright is a legal right created by the law of a country that grants the creator of an original
From copyright police to a valuable gap filler. Vanessa Tuckfield. Digital Repository Manager, Canberra Institute of Technology
From copyright police to a valuable gap filler Vanessa Tuckfield Digital Repository Manager, Canberra Institute of Technology Abstract In April 2012, the World Intellectual Property (WIPO) Magazine published
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Put Rubbish Away for Good!
Put Rubbish Away for Good! Lesson aims Students will become rubbish detectives and investigate areas of unsightly rubbish in their school or community. Students will need to take photographs or draw the
T H E D A R K T R A D E. The Economics of Ideas. Activity #1: Identity Theft. 2 hours
ILLICIT LESSON PLAN GRADES 6-8 STANDARDS: GEOGRAPHY, 11, 16; ECONOMICS, 10; CIVICS, 22 The Economics of Ideas Overview: In today s global marketplace, intellectual property (IP) is a hot commodity. Under
TAFE NSW - Hunter Institute Faculty of Arts & Media
PO Box 3267 Hamilton DC NSW 2303 Australia Phone: 13 12 25 Email: [email protected] Web: www.hunter.tafensw.edu.au The Faculty of Arts and Media offers courses at Newcastle Art School in
Mandatory Reporting of Child Sexual Abuse in Western Australia
Government of Western Australia Department for Child Protection Mandatory Reporting of Child Sexual Abuse in Western Australia A guide for mandatory reporters Mandatory reporting of child sexual abuse
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
Simon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS
ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS CEFM are the collection agents within the UK schools sector for the Phonographic Performance Limited (PPL). In turn, the PPL administers the performance
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
Art Institute Intellectual Property Policy (MAY 2013)
I. Purpose or Scope Art Institute Intellectual Property Policy (MAY 2013) The unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject students and
Acceptable Use of ICT Policy. Learner School Policy
Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL
Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.
Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the
