WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which



Similar documents
Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

HSC: All My Own Work. Copyright. Introduction. Module Outline

Table of Contents. 1. Basic Netiquette Pg Copyright Pg Plagiarism Pg Privacy Pg. 6


FAQ s on The Center for Copyright Information And Copyright Alert System

INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW

COB 302 Management Information System (Lesson 8)

YOUNG PEOPLE, MUSIC & THE INTERNET

THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE!

2011 COUNTRY WATCH LIST

Introduction to the Technology & Laptop Program

Internet Acceptable Use Policy

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Technology Department 1350 Main Street Cambria, CA 93428

Middle secondary unit. Ethical use of technology.

AGREEMENT AND TERMS OF USE

Alliance for Fertility Preservation Website and Fertility Preservation Services Locator and Referral System Terms and Conditions of Use

STOP. THINK. CONNECT. Online Safety Quiz

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Global Social Media Policy

The Film Piracy Problem

section 15 Computers, , Internet, and Communications

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Peer to Peer File Sharing and Copyright Infringement Policy

Appendix to the LIM College Peer-to-Peer File Sharing Policy

Responsible Use Agreement

Wakefield Public Schools Technology Acceptable Use Policy

T H E D A R K T R A D E. The Economics of Ideas. Activity #1: Identity Theft. 2 hours

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

PIRATES OF THE DIGITAL MILLENNIUM

Copyright (Infringing File Sharing) Amendment Bill further glossary of terms relating to File Sharing and the Digital Environment

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

How to protect yourself. against piracy

TERMS OF USE AGREEMENT

Acceptable Use Policy. Version 2. August 15 th,

region16.net Acceptable Use Policy ( AUP )

PEER-TO-PEER NETWORK

What you need to know to keep your computer safe on the Internet

Activities for Protecting Your Identity and Computer for Middle and High School Students

Ringling College of Art and Design

2005 COPYRIGHT AND SECURITY GUIDE FOR COMPANIES

The speed of life. Discovering behaviors and attitudes related to pirating content. Consumer intelligence series. Summary.

Software Licensing and Compliance Guide

ICT Student Usage Policy

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Eanes Independent School District Responsible Use Guidelines for Technology

Geyserville New Tech Academy Student Technology Acceptable Use Policy

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

Case 3:15-cv AC Document 1 Filed 10/27/15 Page 1 of 8

FMGateway by FMWebschool

ACCEPTABLE USE AND TAKEDOWN POLICY

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

Microsoft OEM System Builder. Licensing Guide

Dr Web Mobile Security Licensing

i-safe America Internet Safety Tips for Parents

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

DRAFT - NMHU POLICIES CONCERNING COMPUTER, NETWORK, AND

Viruses, Worms, and Trojan Horses

PAID ADVERTISING SERVICES

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

Your Digital Dollars Online & Mobile Banking

Digital Music Distribution Agreement between You (Licensor) and VIDYPS 79 (Licensee Owner of Blue2Digital)

Service Description: Dell Backup and Recovery Cloud Storage

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Pacific Northwest University of Health Sciences

SOCIAL NETWORKING SITES

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

REGION 19 HEAD START. Acceptable Use Policy

MAGUSA LOGISTICS WEBSITE TERMS AND CONDITIONS

COPYRIGHT AND SECURITY GUIDE FOR COMPANIES AND GOVERNMENTS

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Software Piracy: What You Should Know

TERMS OF USE & SERVICE

Odessa College Use of Computer Resources Policy Policy Date: November 2010

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe

Copyright Infringement and Enforcement in the US

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

ACCEPTABLE USE POLICY

A Time to Tell Troop Meeting Guide

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District

ANOTHER FREE EDUCATIONAL PROGRAM FROM

ipad Acceptable Use Regulation

Well, it isn t if you have the right pre-built, totally unique website, which has all the income resources already built in.


Turn pirates into customers and increase your sales. Solutions by Sony DADC

How To Monitor The Internet In Idaho

Practical tips for a. Safe Christmas

Jozii LLC WEBSITE TERMS OF SERVICE

JPMA - Terms and Conditions

Software Asset Management Guide

Ministry of Culture Training In cooperation with IP Key

Transcription:

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic materials

In 2005, the U.S. Supreme Court ruled that Grokster and StreamCast were liable for illegal file sharing over their P2P networks. Prior to the ruling, it was estimated that over 90 percent of traffic worldwide on their networks illegally infringed the copyrights of movie, music and software businesses.

WHAT S SO RISKY ABOUT FILE-SHARING? P2P networks allow fi le-sharing among personal computers over the Internet, without using a central server. As long as the user downloads the P2P application, a browser, such as Microsoft s Internet Explorer, Apple s Safari, Mozilla s Firefox or Netscape s Navigator, isn t necessary. Using P2P applications, such as BitTorrent or Bear Share, the user is able to fi nd movies or songs on the network by simply typing in the title. When the user downloads that movie or song, his or her computer is likely to have been incorporated into the P2P network, possibly without the user s knowledge. It also means that the user s computer has very possibly been exposed to harmful viruses, worms and Trojan horses, as well as annoying pop-up advertisements. There is a real danger as well that private information on the computer has been accessible to others on the network. Many P2P networks enable widespread distribution of pornographic material. The use of a P2P network by a young person leaves him or her vulnerable to exposure to pornographic images or video. In fact, even the simplest network searches often result in listings of pornographic materials.

P2P networks also play host to large-scale trafficking in pornography, including child pornography, and provide opportunities for identity thieves to obtain personal and financial information from network users who in most cases have no idea that their data is vulnerable.

SCHOOLS AND PARENTS ARE IN THE BEST POSITION TO INFORM STUDENTS OF THE IMPORTANCE OF RESPECTING COPYRIGHT AND VALUING THE CREATIVE EFFORT INVESTED IN COPYRIGHTED WORKS. FURTHER, AS DISTRIBUTORS, GUARDIANS AND OWNERS OF INTELLECTUAL PROPERTY THEMSELVES, SCHOOLS HAVE A HUGE INCENTIVE (AND RESPONSIBILITY) TO INSTILL IN THEIR STUDENTS SUCH RESPECT AND VALUES. The following are some steps schools can take toward educating students about illegal fi le-sharing and copyright infringement generally: Institute acceptable use policies that clearly outline the appropriate use of school resources. Such policies should illustrate unacceptable behavior, including illegal fi le-sharing, and provide details on penalties imposed for failure to abide by such regulations. A comprehensive policy, however, is only as useful as it is accessible; administrations should ensure that students (and others) are able to fi nd these policies on the school website and elsewhere. Include information on copyright, piracy, and illegal fi le-sharing in orientation materials. Inform parents, through letters and at orientation, of the seriousness of copyright infringement and the penalties imposed, both legally and academically, for violations. Encourage them to discuss the risks with their children. Require students to pass a quiz about P2P fi le-sharing and piracy before allowing access to the school s computing network. This educates the student and provides documentation negating any claim of lack of awareness. Engage students by incorporating discussion of illegal fi le-sharing on school websites, and in papers and classrooms. Launch pervasive and visible anti-piracy campaigns using posters, brochures, banners, videos, fl iers, etc. Send periodic e-mails directly from the Headmaster/Principal to remind students that the school takes copyright infringement very seriously and to indicate the seriousness of any offense.

Questions and Answers about Piracy and Copyright WHAT IS PIRACY? Anyone who sells, acquires, copies or distributes copyrighted materials without permission is called a pirate. Downloading a movie without paying for it is morally and ethically no different to walking into a store and stealing a DVD off the shelf. Sharing it through peer-to-peer applications or posting it on a forum for downloading is akin to giving stolen copies to thousands and millions of people for free. Piracy is committed in many ways, including via the Internet by downloading and swapping movies, and on the streets, where illegally duplicated VCDs and DVDs are sold by shopowners and street vendors. WHAT IS COPYRIGHT? When some people hear the word copyright, they think of a complicated legal term that doesn t apply to them. In fact, copyrights touch us all. Simply put, copyrights protect creativity. They do this by giving whoever creates an original work exclusive control over how that work is used and distributed. There are many resources to explore regarding copyright and its effect on the law, the industry and you. WHAT S BEING DONE? Governments and copyright owners, including the Motion Picture Association, employ a multi-pronged approach to fi ghting piracy, which includes educating people about the consequences of piracy, working to ensure movies are available legally using advanced technology, and taking enforcement action against Internet thieves and optical disc pirates, rooting out pirate operations around the world.

WHAT S IT TO ME? If you use peer-to-peer fi le-sharing services, you are almost certainly exposing your computer to harmful viruses, worms, Trojan horses and annoying pop-ups, and you are inviting strangers to access your private information. Since many P2P applications require users to upload often invisibly content at the same time they are downloading, you may be exposing yourself to criminal liability as well. And in a larger sense, you are threatening the livelihoods of thousands of ordinary working people, as well as potentially reducing the number of fi lms that are actually made. Last but not least, you re cheating yourself out of the movie experience. Is it really worth all that to save the price of a movie ticket? WHAT CAN I DO? People who download pirated fi lms or buy them on DVD or VCD are in effect signing on as conspirators in a theft. Few people would ever dream of shoplifting a DVD from a video store. But for some reason, some of the same people who would not dream of walking out of a shop not having paid for a DVD seem to think it is okay to download an online copy of a movie that they didn t pay for. Or a movie they were willing to pay a criminal for, but not the copyright owner. Why? Perhaps it s because the movie industry produces creative products intellectual property as opposed to products that people can touch and feel. For some reason, these products make some people feel more comfortable with the act of taking something without paying for it.

HOW CAN I PROTECT MYSELF? The Motion Picture Association encourages people to keep in mind these simple safety tips while online: 1. WATCH FOR TITLES THAT ARE TOO NEW TO BE TRUE Movies that have yet to be released in theatres, or which are still out in theatres, typically will not be available in DVD, VCD, or videocassette formats. If very recent titles are being sold in these hard goods formats on an auction site or through other online retail sites, they are most likely pirated. In addition, pirates frequently make spoofs of titles available on peer-to-peer networks, so what you think you are downloading might in fact be a fake. 2. REMEMBER THAT YOU GET WHAT YOU PAY FOR Even if you are hoping to get your favorite movie titles at a discount, new or used, the extremely low prices offered on some websites might indicate pirated product. 3. READ THE LABEL Once your purchase arrives, look over the packaging carefully and beware of products that do not look genuine. The inferior quality of printwork on the disc surface and slip sleeve cover, as well as the lack of original artwork and/or missing studio, publisher, and distributor logos on discs and packaging, are usually clear indicators that the product is pirated. 4. RELY ON LEGITIMATE SERVICES New online services provide consumers with safe, high-quality alternatives to illegally downloading or streaming movies. BUY ORIGINAL. SEE ORIGINAL. Affiliated with NEW ZEALAND FEDERATION AGAINST COPYRIGHT THEFT www.nzfact.co.nz www.stopmoviepiracy.co.nz Anti-piracy hotline: 0800 COPYRIGHT Supporting safe and ethical use of technology