Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

Size: px
Start display at page:

Download "Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment"

Transcription

1 Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction 1 Server 3 2 Client 3 3 Download 3 4 Upload 3 5 Burning 4 6 Ripping 4 7 Streaming/web streaming 4 8 Popular File Sharing Networks and 5 Software 9 bittorrent 5 10 The Pirate Bay 5 11 Protocol 6 12 Spotify 6 13 Web based storage/file delivery 7 services 14 MySpace 7 15 YouTube 8 16 US Style Statutory Damages 8 17 Permitted Acts 9 18 Blog 9 19 Creative Commons Cloud Computing Storing, Caching and other Safe 11 Harbours in the Copyright Act

2 Introduction This further glossary of terms is intended to aide the Commerce Select Committee (the Committee) in their consideration of the Copyright (Infringing File Sharing) Amendment Bill 2010 (the Bill). The Committee requested a further glossary outlining terms that are used to describe digital technologies and concepts related to digital copyright infringement in general. This further glossary is intended to be read in conjunction with the glossary attached to the Initial Report to the Committee on the Bill, and in conjunction with the powerpoint presentation of further diagrams of key concepts provided alongside this document. There are many ways in which copyright can be infringed via the Internet, or digital technologies. The Bill is intended to cover one way of doing this, file sharing. This glossary also describes other methods of digital copyright infringement, for a better understanding of the distinction between the different methods. Each definition therefore notes whether the Bill is intended to cover the particular method of infringement or not, and whether the Copyright Act 1994 already provides remedies for such infringement. The glossary also describes the avenues already available under the Copyright Act 1994 for copyright owners to ask an ISP to remove or disable access to infringing material. The glossary also includes some general terms and definitions that may be commonly used or referred to by submitters. 2

3 1. Server: A server is a computer programme or piece of computer hardware that delivers (serves) content such as web pages over the Internet. Servers can also perform a range of other functions. Servers that deliver web pages to Internet users are commonly called web servers. 2. Client: A client is a computer or piece of software that accesses another computer or piece of software (a server ) by way of a computer network. Software such as Internet Explorer that is used to browse the Internet is a web client. programmes such as Outlook are clients. To access one of the many file sharing networks, a client is also needed. For example, bittorrent software is one of the many clients used to access the bittorrent file sharing network. 3. Download The receipt of data from a remote computer system to a local computer system, or the initiation of such a transfer. On the Internet, a local system is typically a personal computer. A remote system is typically a web sever (this is a computer storing files which can be accessed via the web). Server is defined later in this glossary. As outlined in the diagram showing common methods of accessing digital copyright works, the download of copyright works from the Internet can be done in many different ways, both legal and illegal. The most common type of download is likely to be directly from a web page. The Bill is not intended to cover the general download of files from web pages. The Copyright Act 1994 already provides remedies for breaches of copyright via a general download. Copyright owners also have other avenues for dealing with this type of infringement, such as asking an internet service provider to block access to the particular website that can be downloaded from. 4. Upload The opposite to download. The sending of data to a remote computer system, typically with the intent that the remote system makes a copy of the data. Where a personal computer uploads data to a web server (a computer storing files), other personal computers are able to access or download that data. The most common form of uploading for a typical Internet user would be to upload images (photographs) or possibly music to a personal web page, or video to a streaming service such as You Tube (described later in this 3

4 glossary). The Bill is not intended to cover the general upload of files to the Internet. The Copyright Act 1994 already provides remedies for breaches of copyright via a general upload. 5. Burning The act of copying digital files from a computer to a CD or DVD. Typically movie or music files, less typically games or software. So called, as in order to write data to a CD or DVD, a laser burns a pattern into the surface of the disk which can then be read by a CD or DVD player. Burning does not usually refer to the copying of data onto a USB stick or external computer hard drive. However, those who share digital copyright works can also use these forms of portable storage to transfer and share data. Infringing copyright by burning or transferring from other physical storage is classed as physical piracy. In order to share works this way a physical connection between sharers and computers needs to occur. The Bill is not aimed at preventing this form of piracy. If sufficient evidence could be gathered by a copyright owner of this sort of activity and it was an infringement of copyright, they would be able to seek the range of remedies already available in the Copyright Act Ripping The opposite of burning. The act of copying digital files from a CD or DVD to a computer. Typically movie or music files, less typically games or software. Ripping music or films from a CD or DVD to a computer is commonly done in order to play the music from the computer, using software such as itunes or Windows Media Player, or to play the film using a software DVD player. For sound recordings, this sort of activity is not usually illegal if the person ripping the CD has obtained it legally. As described under the definition of permitted acts later in this glossary, a specific exception to copyright has been created for this sort of activity, so that one sound recording can be played on several different devices. Ripping can be illegal if the person ripping is copying another person s CD s or DVDs. The term ripping can also be used when copying files from USB sticks or external computer hard drives. The Bill is not intended to cover these activities. 7. Streaming/web streaming: Instead of downloading content from the Internet (such that your computer now has a copy of the content), streaming or web streaming is like an Internet television or radio broadcast. Internet users can watch or listen to the content but do not receive a copy for later use. Files available for streaming are 4

5 generally stored on large servers run by the operator of the website from which the files stream. The popular website YouTube streams content to the user 1. Watching a movie or listening to a song via a web stream is not a breach of copyright. The Copyright Act 1994 does not provide copyright owners with the right to prevent people from watching or listening to an unauthorised copy of a work. The Bill therefore does not cover the act of viewing or listening to a stream. Note that the upload of a file to a website that streams content, and the running of a website that streams content, may infringe copyright, as the Copyright Act 1994 grants copyright owners the right to prevent others from communicating a copyright work to the public. As described above under the upload definition, the Bill does not cover general uploads to the Internet. Neither does the Bill prohibit the operation of websites from which unauthorised copyright works can be streamed. 8. Popular File Sharing networks and software: bittorrent limewire Gnutella Mininova Kazaa edonkey Morpheus 9. bittorrent: A file sharing network. BitTorrent is commonly stated to be the most popular file sharing network, and is the most modern version of the way in which file sharing networks work. In order to use this particular file sharing network, a user must obtain a bittorrent file that is then loaded into a bittorrent client (as above, a client is a computer programme). The bittorrent file shows the client the location of other people on the bittorrent file sharing network that hold the copyright work for download. The client then initiates the download from many users, and reassembles the pieces of the file. This network and other file sharing networks are intended to be covered by the Bill. 1 Note: technically, a stream is still a download of data, however, the computer does not retain the data once the stream has finished and the user has finished their internet session 5

6 10. The Pirate Bay: A Swedish website that listed bittorrent files. Users could search, sort and categorise bittorrent files which could then be loaded into a bittorrent client in order to initiate a download. The Pirate Bay also listed links for direct downloads of files that infringed copyright. Several legal cases have been taken against the Pirate Bay in Sweden. A case for damages against the operators of the website is pending. A temporary injunction was issued against the operators of the website in October The Pirate Bay s ISP was also ordered to stop making available the copyright works featured on the website. In order to comply with this order the ISP disconnected the Pirate Bay. The Copyright Act 1994 does not prevent a person from directing another person to a location where infringing copies are. Similarly, a person would not be prevented from providing driving directions to a market where physically burned pirated DVDs would be sold. Websites such as The Pirate Bay are therefore not covered by the Bill. If such websites provide direct links to infringing material, a copyright owner may currently take action against the operator of the website under the Copyright Act Protocol: A protocol is a formal description of the format for messages that are exchanged between computer hardware or software, and the rules for the exchange of those messages. The Internet Protocol is the format and rules for the exchange of information over the Internet. Other commonly referred to protocols are the Hypertext Transfer Protocol (HTTP) which governs the exchange of websites across the Internet, and the Voice over Internet Protocol (VoIP) which is increasingly being used to provide telephone and voice services across the Internet. 12. Spotify: An example of a new online business model for monetising sound recordings. For no charge a Spotify member can stream songs across the Internet for 20 hours per month in order to listen to them through their computer. The service makes money by playing advertisements between songs every few songs. The revenue earned from advertisements is then distributed to the copyright owner. 6

7 Alternatively, a user could pay monthly fees for a more comprehensive service. Spotify is not available in New Zealand. While many New Zealanders could use the service successfully if it was available, a certain speed of internet connection is required for such a service to work. The Spotify service is legal and is sanctioned by copyright owners. These sorts of services are therefore not intended to be covered by the Bill. 13. Web based Storage/file delivery services: These services allow an Internet user to upload files to a server (as stated above, a computer holding the files). They are commonly used to transfer large files between users that are too big to send via for example where a collaborative piece of design work is swapped between designers. Typically a person wishing to download the stored files will need a specific link to the location of the files on the server, and will likely need an account with the web storage provider. Increasingly, these services are used to distribute copyright works without the authorisation of the copyright owner. An Internet user will upload an album or film to the storage service, then make the link to that album or film easily available on the Internet. An example of such a service is MegaUpload. The Copyright (Infringing File Sharing) Amendment Bill is not intended to cover these services, as they would be classed as a general download or upload. A copyright owner could currently seek the range of remedies provided for in the Copyright Act 1994 in relation to this sort of copyright infringement. 14. Myspace: A popular website/online social networking service that allows members to create their own profile on a web page. Other myspace members can ask to become a friend of the creator of the profile and make comments on the relevant page. Myspace is used by many bands to create an online location for their fans to visit, comment about their music and interact with other fans. Myspace allows members to upload music and video files which an Internet user can then stream from the relevant myspace page. Bands therefore use myspace to reach a very wide audience for no cost. As myspace members can freely upload and make available files they have on their computer, myspace can be used to breach copyright. Myspace has 7

8 detailed copyright polices a user must agree to when becoming a member of the website, and often blocks profiles which feature unauthorised content. Myspace has recently partnered with some record labels to create a specific music streaming/purchasing service. As described earlier web streaming, such as via Myspace is not covered by the Bill. In some cases, a Myspace member who uploads music or film to Myspace can also let others download that music or film. This would be classed as a general download, and is not intended to be covered by the Bill. A copyright owner could currently seek the range of remedies provided for in the Copyright Act 1994 in relation to this sort of copyright infringement. 15. YouTube: YouTube is a massively popular website from which Internet users can stream video content. YouTube also allows users to upload their own video content. Often, video is uploaded by a user that breaches copyright. As such YouTube often takes down content at the request of copyright owners. In these cases when trying to view such content, a video will usually be disabled, and the viewer will see a copyright notice telling them the copyright owner has requested the video is taken down. Increasingly, YouTube partners with content owners to provide authorised access to new music videos and film trailers. Artists typically have their own you tube channel which a user can subscribe to. In these cases the YouTube website often provides links to legal online stores. As described above under the streaming definition, watching or listening to an unauthorised copy of a work is not a breach of copyright. Therefore, streaming websites such as You Tube are not intended to be covered by the Bill. 16. US Style Statutory Damages: Under US copyright law a copyright owner is entitled to obtain actual damages for loss caused by copyright infringement and any profits that are attributable to the infringer. Instead of choosing to recover actual loss, a copyright owner may also elect to recover an award of statutory damages. Statutory damages may be calculated anywhere between $750 and $30,000 per infringed work. In the case where statutory damages are chosen, a copyright owner has to prove that infringement has occurred, but doesn t have to prove that financial loss has occurred. 8

9 In a case where a copyright owner can prove that infringement was willfull, the court has discretion to increase the award to up to $150,000 per infringement. Due to the availability of statutory damages, some US peer to peer file sharing cases against individual sharers have resulted in very high awards in the millions of dollars for a small number of infringements. The Copyright Act 1994 does allow a court to award additional damages in cases of flagrant infringement, provided that the justice of the case requires it. The tests for additional damages are whether the infringement was flagrant, whether there was scandalous conduct and whether the conduct was in total disregard of the copyright owner s legal rights and other circumstances. Flagrancy is interpreted as scandalous or deceitful conduct; including deliberate and calculated copyright infringements. The provision gives the Court the discretion to award additional damages taking into account where the copyright owner has suffered damages as a result of the manner in which the infringement was done (i.e. deliberate/deceitful), and also for the Court to mark its disapproval of the conduct. Additional punitive damages for copyright infringement would be awarded by the High Court. Tribunals are not generally used to make punitive awards. 17. Permitted Acts: Part 3 of the Copyright Act 1994 outlines acts that are permitted in relation to copyright works without the prior authorisation of the owner. Typically, these acts would otherwise constitute an infringement of copyright. Parliament has deemed it in the public interest for these acts to be permitted. Permitted Acts are also commonly referred to as copyright exceptions. There are a wide range of permitted acts in Part 3. Two pertinent examples are: Copying a legally obtained sound recording for the purposes of playing that recording on other devices that a person owns, provided that person retains ownership of the copy and only uses it for personal use. Fair dealing with a work for the purposes of private research or study. In order to determine whether copying is fair dealing, a Court considers the purpose of the copying, the nature of the work copied, whether the work could have been obtained at an ordinary commercial price within a reasonable time, and the effect of the copying on the potential market for, or value of the work. If a person obtains a copyright work via a file sharing network, or any method of downloading from the Internet, in order to exercise a permitted act, it is unlikely to be a breach of copyright, provided all the relevant conditions in the Copyright Act 1994 are satisfied. 9

10 18. Blog A blog is a basic webpage that is updated regularly, (usually daily or weekly), and is generally used for personal comments on particular issues or topics. There are specific services for hosting blogs (such as Google Blogs), which give the blogger room on the Internet to host files (e.g. on a server). Blogs are also becoming a common way to upload copyright works to the Internet without the authorisation of the copyright owner, in order that many people can download them for free. The Copyright (Infringing File Sharing) Amendment Bill is not intended to cover copyright infringement on blogs. A copyright owner could currently seek the range of remedies available in the Copyright Act 1994 for this form of infringement. 19. Creative Commons Creative commons is an alternative licensing regime that uses copyright to provide free access to and use of copyright works. With a standard form creative commons license, a copyright owner can choose to provide free access and use of their works under a range of conditions. Copyright owners that are not too concerned about charging for their works are increasingly using creative commons licenses in order to get their creations out into the world. For example, in 2008, the popular American rock band Nine Inch Nails released the album Ghosts under a creative commons license. The license allowed people to download/copy, make derivative works from, and share the album to any others for no charge, as long as these uses were non commercial, and when the album was shared to others, it was also shared under the same creative commons license. These acts would typically be a breach of copyright unless the authorisation of the copyright owner had first been obtained. Creative commons was envisaged as a way for artists to make their works available for other artists to use and build upon, for the benefit of the wider society. 20. Cloud Computing Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. This frequently takes the form of Internet based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computer. 10

11 Typical cloud computing providers deliver common business applications online that are accessed from another Web service or software like a Web browser, while the software and data are stored on servers. 21. Storing and Caching, and the other Safe Harbours in the Copyright Act 1994 For the purposes of the Internet, an ISP can generally perform three functions. They may provide the conduit for Internet communications to flow through - the general provision of Internet access to their customers. ISPs may also provide space on a server for customers to store information. This may be or otherwise, but in particular, ISPs provide space for storing files that make up websites. This is activity is known as storing. An ISP may also temporarily store data flowing through their Internet service that is commonly accessed by customers, such that it is more easily accessible in times of peak traffic. ISPs store this information for short periods of time. This activity is known as caching. As has been described by the definitions for downloading, streaming, blogging and web storage, there are many ways in which copyright can be infringed via an Internet Provider s services. Sections 92C and 92E of the Act therefore provide safe harbours for caching and storage, and a notice procedure for storing. Under section 92C of the Copyright Act, ISPs receive a storing safe harbour where they have stored a web page that has illegal copyright material on it. If a copyright owner informs them (with a notice) that they are aware this web page is infringing copyright, the ISP must delete or disable access to the relevant material or lose their safe harbour from liability. This is known as a notice and take down system. Under section 92E of the Copyright Act 1994, ISPs receive a caching safe harbour if they cache material and do not modify it. As soon as becoming aware the material has been deleted from its original source or access to that original source has been prevented, an ISP must remove it from their cache or risk losing their safe harbour from liabiltiy. Therefore, in addition to taking action against a person infringing copyright by uploading infringing material to a website, copyright owners also have an avenue to ask ISPs to prevent the activity. Takedown procedures are not appropriate to address file sharing activity, as an ISP is not storing or caching the files that are being shared. 11

12 12

Internet: Copying & Downloading

Internet: Copying & Downloading INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose

More information

Using itunes in Schools

Using itunes in Schools Using itunes in Schools What is itunes? itunes is a free digital media player application which is used to organise and play sound recordings and video on a computer. The itunes player can also be used

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

e-pirates of the Digital Age Copyright Issues in Software and Music

e-pirates of the Digital Age Copyright Issues in Software and Music VEA Bringing Learning to Life Program Support Notes e-pirates of the Digital Age Copyright Issues in Software and Music Senior Secondary - TAFE 27mins Teacher Notes by Jorge Viega, B.Sci.(Chemical), Dip.Ed.,Associate

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

HSC: All My Own Work. Copyright. Introduction. Module Outline

HSC: All My Own Work. Copyright. Introduction. Module Outline HSC: All My Own Work Copyright Introduction This module explains copyright and its relevance to students. The Board of Studies NSW gratefully acknowledges permission to quote from and paraphrase information

More information

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people

More information

Music Radio and Video

Music Radio and Video 1 Music Radio and Video Watching Videos on the Internet There are now millions of videos available to watch on the internet covering just about anything from comedy, sports, news, music, education through

More information

Using Digital Content Repositories: Copyright Compliance Manual for Schools

Using Digital Content Repositories: Copyright Compliance Manual for Schools Using Digital Content Repositories: Copyright Compliance Manual for Schools Introduction... 2 When do copyright restrictions not apply?... 3 A. Linking... 3 B. Embedding... 3 C. Material Created by You

More information

BPI (BRITISH RECORDED MUSIC INDUSTRY) LIMITED

BPI (BRITISH RECORDED MUSIC INDUSTRY) LIMITED BPI (BRITISH RECORDED MUSIC INDUSTRY) LIMITED RESPONSE TO DEPARTMENT FOR BUSINESS INNOVATION & SKILLS CONSULTATION ON THE SUPPLY OF GOODS, SERVICES AND DIGITAL CONTENT OCTOBER 2012 Page 1 BPI (BRITISH

More information

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and

More information

The NBN Will (Not) Be Televised: Internet, Mobile Media, and the Future of the Audiovisual

The NBN Will (Not) Be Televised: Internet, Mobile Media, and the Future of the Audiovisual The NBN Will (Not) Be Televised: Internet, Mobile Media, and the Future of the Audiovisual Converging on an NBN Future: Content, Connectivity, and Control University of Canberra Symposium, Tuesday 9 October

More information

Copyright Implications of Content Management Systems: Schools

Copyright Implications of Content Management Systems: Schools Copyright Implications of Content Management Systems: Schools 1. What Is A Content Management System? A Content Management System ( CMS ) is a software application that enables teaching material to be

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

File sharing: consumers, creators, welfare and business models

File sharing: consumers, creators, welfare and business models File sharing: consumers, creators, welfare and business models Joost Poort Conference Future of copyright in the digital era European Parliament, 1 June 2011 Contents How common is file sharing, and what

More information

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including

More information

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.

More information

Online Copyright Infringement. Discussion Paper

Online Copyright Infringement. Discussion Paper Online Copyright Infringement Discussion Paper July 2014 Introduction There are a number of factors that contribute to online copyright infringement in Australia. These factors include the availability

More information

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening. Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the

More information

BPI response to the Draft Ofcom Annual Plan 2013-14

BPI response to the Draft Ofcom Annual Plan 2013-14 BPI response to the Draft Ofcom Annual Plan 2013-14 Introduction 1. BPI welcomes the opportunity to comment on the planned work of Ofcom in the year 2013-14. BPI will contain its comments to those aspects

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY

MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian

More information

copyright reform Bill C - 11

copyright reform Bill C - 11 intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright

More information

Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au

Middle secondary unit. Ethical use of technology. www.cybersmart.gov.au www.cybersmart.gov.au Creative Commons These teaching resources on the Cybersmart website s Schools Gateway are now available to schools under Creative Commons licences. The new licensing conditions are

More information

Responsible use of ICT Devices Agreement

Responsible use of ICT Devices Agreement Responsible use of ICT Devices Agreement This document is comprised of this cover page and three sections: Section A: Section B: Section C: Introduction Cybersafety Rules for Junior Primary Students Cybersafety

More information

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015 ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT Prepared For: DEPARTMENT OF COMMUNICATIONS 263103193 24 JUNE 2015 TNS Level 1, 181 Miller Street North Sydney NSW 2060 t +61 2 9563 4200

More information

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service

The Role of Internet Service Providers in Stopping Internet Copyright Infringement. Jennie Ness Regional IP Attaché U.S. Commercial Service The Role of Internet Service Providers in Stopping Internet Copyright Infringement Jennie Ness Regional IP Attaché U.S. Commercial Service New Means of Distribution Webcasting or Streaming Uploading and

More information

Student Film Festival 2016

Student Film Festival 2016 Student Film Festival 2016 May 12, 2016 Cypress College CCCPLX 216 6:00pm Eligibility Requirements GUIDELINES Film Festival entrants must be currently enrolled in a college or high school *Films must have

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

FAQ s on The Center for Copyright Information And Copyright Alert System

FAQ s on The Center for Copyright Information And Copyright Alert System 1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs

More information

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience. MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

The British Academy of Management. Website and Social Media Policy

The British Academy of Management. Website and Social Media Policy The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE!

THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE! THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE! TABLE OF CONTENTS TEACH YOUR KIDS GOOD HABITS TEACH THEM THE IMPORTANCE OF COPYRIGHT The potential to earn income from sales and other uses incentivises

More information

ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS

ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS CEFM are the collection agents within the UK schools sector for the Phonographic Performance Limited (PPL). In turn, the PPL administers the performance

More information

Breaking Point. Broadcasters can show content on their websites, but this is only the starting point.

Breaking Point. Broadcasters can show content on their websites, but this is only the starting point. TV: End of the industry? Or just the end of a business model? www.yomego.com E: enquiries@yomego.com T: +44 141 582 0600 70 Mitchell Street Glasgow G1 3LX 33 Cavendish Square London W1G OTT T: +44 20 7079

More information

Cut The TV Cable. Paul Glattstein

Cut The TV Cable. Paul Glattstein Cut The TV Cable by Paul Glattstein Cut The TV Cable by Paul Glattstein Television is a medium because it is neither rare nor well done. Ernie Kovacs Overview Disconnect from Cable or Satellite TV What's

More information

The music industry experience in the online environment. Olivia Regnier Deputy Regional Director Europe IFPI

The music industry experience in the online environment. Olivia Regnier Deputy Regional Director Europe IFPI The music industry experience in the online environment Olivia Regnier Deputy Regional Director Europe IFPI 1 Summary The digital market for music New digital music services The challenge of copyright

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Ministry of Culture Training In cooperation with IP Key

Ministry of Culture Training In cooperation with IP Key Ministry of Culture Training In cooperation with IP Key Monday 31 August 2015, Zhengzhou, Henan COPYRIGHT ENFORCEMENT TRENDS IN THE EU & INTERNATIONALLY Overview Part 1 Threats to the creative industries

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014

Internet Acceptable Use Policy A council-wide information management policy. Version 1.5 June 2014 Internet Acceptable Use Policy A council-wide information management policy Version 1.5 June 2014 Copyright Notification Copyright London Borough of Islington 20134This document is distributed under the

More information

Media Today, 5 th Edition. Chapter Recaps & Study Guide. Chapter 10: The Recording Industry

Media Today, 5 th Edition. Chapter Recaps & Study Guide. Chapter 10: The Recording Industry 1 Media Today, 5 th Edition Chapter Recaps & Study Guide Chapter 10: The Recording Industry Like many other industries, the recording industry has been impacted strongly by digital technologies, but the

More information

Teenagers and Young Adults, aged 15-29, throughout the United States

Teenagers and Young Adults, aged 15-29, throughout the United States Dawn Markling Marist College 30 June 2013 Survey Title: Music Purchase vs. Free Download Population Size: Teenagers and Young Adults, aged 15-29, throughout the United States Sample Size: 2500 Respondents

More information

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources

More information

Copyright Law An Introduction

Copyright Law An Introduction Copyright Law An Introduction The following pages outline some basic facts about copyright law and answer various questions, such as 'how long does copyright last?' 'When does infringement occur?'... and

More information

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: carl@crowell-law.com Drew P. Taylor, OSB 135974 email: drew@crowell-law.com CROWELL LAW P.O. Box 923 Salem,

More information

COPYRIGHT ACT -- FAIR DEALING (Advisory for SUTD Faculty, Researchers, Staff and Students)

COPYRIGHT ACT -- FAIR DEALING (Advisory for SUTD Faculty, Researchers, Staff and Students) COPYRIGHT ACT -- FAIR DEALING (Advisory for SUTD Faculty, Researchers, Staff and Students) When determining whether copying of the whole or part of the work or adaptation constitutes fair dealing, the

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

Freemium 101. A brief introduction to the freemium business model

Freemium 101. A brief introduction to the freemium business model A brief introduction to the freemium business model What is freemium? e word freemium is made up from the words free and premium. It describes a business model where you give a core product away for free

More information

I can add this.pdf can t I? A Guide to Resources and Copyright for Academic Staff using ELE

I can add this.pdf can t I? A Guide to Resources and Copyright for Academic Staff using ELE I can add this.pdf can t I? A Guide to Resources and Copyright for Academic Staff using ELE If you need help with any aspect of copyright then please do get in touch with the University Copyright Officer.

More information

GCSE Media Studies. IT Resources and Submission Guidance for Controlled Assessment. version 1.1

GCSE Media Studies. IT Resources and Submission Guidance for Controlled Assessment. version 1.1 GCSE Media Studies IT Resources and Submission Guidance for Controlled Assessment version 1.1 Teacher Resource Bank / GCSE Media Studies / IT Resources for Controlled Assessment / Version 1.1 Resources

More information

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic

More information

Using Windows Movie Maker to Create Movies

Using Windows Movie Maker to Create Movies Using Windows Movie Maker to Create Movies Windows Movie Maker 2.1 is free! It comes with Windows XP or can be downloaded from the Microsoft Website. http://www.microsoft.com/windowsxp/downloads/updates/moviemaker2.mspx

More information

Equipment Needed. Connecting to the Internet

Equipment Needed. Connecting to the Internet All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded

More information

Copyright Infringement and Enforcement in the US

Copyright Infringement and Enforcement in the US Copyright Infringement and Enforcement in the US A Research Note, November 2011 The U.S. House of Representatives is currently debating the Stop Online Piracy Act (SOPA) the counterpart to the Senate s

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

CONTENTS A BASIC INTRODUCTION INTO SOCIAL MEDIA AND ONLINE MARKETING FOR ARTISTS

CONTENTS A BASIC INTRODUCTION INTO SOCIAL MEDIA AND ONLINE MARKETING FOR ARTISTS CONTENTS Introduction... 2 Followership... 3 Where to generate followers... 3 Build your audience!... 4 How to generate followers... 5 1. Where to send your fans from search engines?... 5 2. Flyer, poster,

More information

INFORMATION SYSTEM GENERAL USAGE POLICY

INFORMATION SYSTEM GENERAL USAGE POLICY PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information

More information

WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY

WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY WORKPLACE INTERNET, EMAIL AND NETWORK USAGE POLICY MAY 2013 DOCUMENT SUMMARY Document Number Responsible Officer P0 DO0008.2 Assistant Directors Effective Date May 2013 Superseded Docs Workplace Internet,

More information

GENERAL TERMS AND CONDITIONS FOR THE USE OF THE ENTSO-E TRANSPARENCY PLATFORM

GENERAL TERMS AND CONDITIONS FOR THE USE OF THE ENTSO-E TRANSPARENCY PLATFORM GENERAL TERMS AND CONDITIONS FOR THE USE OF THE ENTSO-E TRANSPARENCY PLATFORM (January 2015) In accordance with Article 3 of the Regulation (EU) N 543/2013 on submission and publication of data in electricity

More information

ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU

ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU ilinc Legal & Technology Briefs The Liability of Internet Intermediaries In the EU Many start-ups fulfil an intermediary role within the online environment. These intermediary start-ups offer their users

More information

If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy

More information

Websites: Social Networks, Blogs & Usergenerated

Websites: Social Networks, Blogs & Usergenerated INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Using Cloud Computing

Using Cloud Computing Using Cloud Computing What is Cloud Computing? Cloud computing is a term used to describe the delivery of computing services such as software, data access and data storage facilities over the internet

More information

Ringling College of Art and Design

Ringling College of Art and Design Ringling College of Art and Design Plan for Combating the Unauthorized Distribution of Copyrighted Material by Users of the Ringling College of Art and Design Network Version 5 December 2010 12/16/10;

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Copyright Notice: digital images, photographs and the internet

Copyright Notice: digital images, photographs and the internet Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...

More information

Geo-blocking, VPNs & Copyright

Geo-blocking, VPNs & Copyright INFORMATION SHEET G127v02 July 2015 Geo-blocking, VPNs & Copyright In this information sheet we give a brief overview of the law as it relates to geo-blocking, virtual private networks (VPNs) and copyright.

More information

www.southglos.gov.uk/broadband www.southglos.gov.uk/goonline 1 Fibrebroadbandcommunitypack

www.southglos.gov.uk/broadband www.southglos.gov.uk/goonline 1 Fibrebroadbandcommunitypack Fibre broadband community pack www.southglos.gov.uk/broadband 1 Fibrebroadbandcommunitypack 1 Contents Section Page Dear Parish Clerk 3 Broadband speed explained 5 Your questions answered about the improved

More information

Ofcom Illegal Filesharing Pilot - Peer Review

Ofcom Illegal Filesharing Pilot - Peer Review Ofcom Illegal Filesharing Pilot - Peer Review Prepared for: Ofcom Agency Contacts: Dave Chilvers Month of Report: Prepared by: August 2010 BDRC-Continental Kingsbourne House, 229-231 High Holborn, London

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

TERMS OF USE AGREEMENT

TERMS OF USE AGREEMENT TERMS OF USE AGREEMENT Last Updated: October 20, 2010 PLEASE READ THIS TERMS CAREFULLY BEFORE ACCESSING THE WEBSITE I GENERAL 1) The Web Portal MEGA BRAZIL TV is a part of the MEGA LOPES, LLC family of

More information

INTERNET MUSIC STREAMING GROWING PAINS. Alexis Koster Department of Management Information Systems San Diego State University

INTERNET MUSIC STREAMING GROWING PAINS. Alexis Koster Department of Management Information Systems San Diego State University INTERNET MUSIC STREAMING GROWING PAINS Alexis Koster Department of Management Information Systems San Diego State University 1. The Phases of the Recording Music Industry Between 1982 and 2014: FROM CDs

More information

itunes Basics Website: http://etc.usf.edu/te/

itunes Basics Website: http://etc.usf.edu/te/ Website: http://etc.usf.edu/te/ itunes is the digital media management program included in ilife. With itunes you can easily import songs from your favorite CDs or purchase them from the itunes Store.

More information

YOUNG PEOPLE, MUSIC & THE INTERNET

YOUNG PEOPLE, MUSIC & THE INTERNET YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

More information

ACTRA SUBMISSION CONCERNING GST/HST ON E-COMMERCE

ACTRA SUBMISSION CONCERNING GST/HST ON E-COMMERCE ACTRA SUBMISSION CONCERNING GST/HST ON E-COMMERCE June 10 2014 Submitted to: International Tax Consultation, Tax Policy Branch, Department of Finance, 140 O Connor Street Ottawa, ON K1A 0G5 Via email to:

More information

restricted access to parts of the Website, as more particularly described on the Supplier s website at www.ovh.ie

restricted access to parts of the Website, as more particularly described on the Supplier s website at www.ovh.ie SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A SHARED SERVER Version Date 29 December 2010 The Supplier provides different categories of server. The hardware and software configurations, and the

More information

Chapter 12 - Software. Unit 1 Role and function of application software

Chapter 12 - Software. Unit 1 Role and function of application software Chapter 12 - Software Unit 1 Role and function of application software Contents Revise software concepts Role of application software Multimedia software Communication software Application software Definition:

More information

Live Streaming on YouTube

Live Streaming on YouTube Do-It-Yourself Live Streaming What is it? Live Streaming on YouTube Google offers a free services that allows live streaming to your YouTube channel via Google +. The process is easy and uses consumer

More information

CS 360 Internet Programming

CS 360 Internet Programming Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange

More information

Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994

Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994 In Confidence Regulatory Impact Statement - Review of the Mobile Exclusion from the Three Notice Regime under the Copyright Act 1994 Agency Disclosure Statement This regulatory impact statement has been

More information

Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information

Mega Transparency Report. March 2015. Requests for Removal of Content and for User Information Mega Transparency Report March 205 Requests for Removal of Content and for User Information Introduction This is the first transparency report published by Mega since it commenced operations in January

More information

Dynamic Digital Signage Pack.

Dynamic Digital Signage Pack. Dynamic Digital Signage Pack. Revolutionising digital interaction. Dynamic Digital Signage Pack. Apps Included: It is well known that digital posters and displays are much more engaging compared with static

More information

SUBMISSION IN RESPONSE TO THE AUSTRALIAN GOVERNMENT S ONLINE COPYRIGHT INFRINGEMENT DISCUSSION PAPER

SUBMISSION IN RESPONSE TO THE AUSTRALIAN GOVERNMENT S ONLINE COPYRIGHT INFRINGEMENT DISCUSSION PAPER SUBMISSION IN RESPONSE TO THE AUSTRALIAN GOVERNMENT S ONLINE COPYRIGHT INFRINGEMENT DISCUSSION PAPER SEPTEMBER 2014 LEVEL 5 6 EDEN PARK DRIVE MACQUARIE PARK NSW 2113 AUSTRALIA +61 2 9744 4500 bbcworldwide.com

More information

Using Television and Radio programme for teaching

Using Television and Radio programme for teaching [Type here] Using Television and Radio programme for teaching BOB Box of Broadcasts This workshop is for anyone who would like to use television and radio recordings in teaching and research, and takes

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

SURE E-Mail Services Terms and Conditions SURE MAIL

SURE E-Mail Services Terms and Conditions SURE MAIL SURE E-Mail Services Terms and Conditions SURE MAIL Sure offers an E-mail service that allows access to a mailbox provided by a 3 rd party partner ( Service ). The Service is accessed via the internet.

More information

GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER

GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER GALLAGHER GROUP LIMITED, 181 KAHIKATEA DRIVE, HAMILTON, NEW ZEALAND GALLAGHER GALLAGHER SECURITY SOFTWARE MAINTENANCE TERMS AND CONDITIONS PLEASE READ THESE SOFTWARE MAINTENANCE TERMS AND CONDITIONS CAREFULLY

More information

Europe s Video Game Industry and the Telecom Single Market

Europe s Video Game Industry and the Telecom Single Market Executive Summary The internet is a key driver of growth in the video game industry and facilitates distribution of content, engagement with customers, multiplayer gameplay and provision of crucial software

More information

Exceptions to copyright: Education and Teaching

Exceptions to copyright: Education and Teaching Exceptions to copyright: Education and Teaching Intellectual Property Office is an operating name of the Patent Office October 2014 Education and Teaching 1 Copyright protects literary, dramatic, musical

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

Art-list License Agreement

Art-list License Agreement Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions

More information

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 2 Table of Contents 1. INTRODUCTION... 3 2. EDUCATION ISSUES IN BILL C- 32... 3 3. EDUCATIONAL

More information

File sharing - good, bad or worse? Professor Roger Wallis KTH Stockholm Sweden Rogerw@kth.se Kumu, Tallinn 090612

File sharing - good, bad or worse? Professor Roger Wallis KTH Stockholm Sweden Rogerw@kth.se Kumu, Tallinn 090612 File sharing - good, bad or worse? Professor Roger Wallis KTH Stockholm Sweden Rogerw@kth.se Kumu, Tallinn 090612 Historical flashback a) Pianolas and phonograms b) Radio and music Publishers (blanket

More information

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources

More information

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils

CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils CCSS IT ACCEPTABLE USE POLICY Guidance for Staff and Pupils Contents 1. Scope 2 2. Use of IT Facilities 2 3. Monitoring of IT Facilities 5 4. Maintenance & Repairs 6 5. Copyright and Licence Agreements

More information