an introduction to computer law judy jacobs miller © 2006
Post on 19-Dec-2015
214 views
TRANSCRIPT
![Page 1: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/1.jpg)
An Introduction to Computer Law
Judy Jacobs Miller
© 2006
![Page 2: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/2.jpg)
What is “computer law?”
It’s many things: Copyright law Trademark law Defamation law Privacy law Contract law Criminal law
![Page 3: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/3.jpg)
Copyright
Legal protection Provided to authors/owners Of “original works of authorship”
![Page 4: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/4.jpg)
What works are protected?
Literary Musical Dramatic Choreographic and pantomime Pictorial, graphical, sculptural Motion pictures or video Sound recordings Architectural
![Page 5: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/5.jpg)
When does protection begin?
When the work is “fixed in any tangible medium of expression” © sign not needed Registration with U.S. Copyright Office not
needed Examples
A novel is typed Software code is stored on a computer disk A photograph is taken Song lyrics are scribbled on a napkin
![Page 6: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/6.jpg)
How long is work protected?
Currently, Life of author plus 70 years For works “for hire,” 95 years from publication
![Page 7: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/7.jpg)
What rights does a copyright owner have? Reproduce the work Make derivative works Distribute the work Publicly perform or display the work For sound recordings, perform the work by
digital audio transmissions
![Page 8: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/8.jpg)
What is not protected by copyright? Idea (v. expression of idea) Fact Procedure Process Title, name, short phrase, slogan
But some of these may be trademarks
![Page 9: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/9.jpg)
When may you use another’s work? If the work is in the public domain If the use is “fair use” If you have permission
How do you get permission? Ask! Written permission is safest
![Page 10: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/10.jpg)
What work is in the public domain? Work for which the copyright has expired
Shakespeare Dickens
Works published by the federal government Many web sites and publications Examples
Tax forms and instructions Health advice Social security information
![Page 11: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/11.jpg)
What is “fair use?”
Use for purposes such as Criticism Comment News reporting Teaching Scholarship research
![Page 12: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/12.jpg)
Four factors considered in determining whether “fair use” Purpose and character of use
Commercial v. nonprofit Parody
Nature of work Fact v. fiction; published v. non-published
Amount used in relation to whole Less is better than more
Effect of use upon potential market for or value of work
![Page 13: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/13.jpg)
Examples of fair use
Art teacher shows class slides of impressionist paintings
Student uses quotation from magazine for school paper
Newspaper review of book includes short quotation
Student paper for horticulture class shows photographs of various plants
![Page 14: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/14.jpg)
Examples of copyright infringement: Downloading an Eminem recording Building a web site for your brother’s
business using images you found
on the Internet Copying an article from the National
Geographic magazine for a school paper Borrowing your friend’s Microsoft Office software to
put on your computer Finding a picture of Bob Marley on the Internet and
posting it on Facebook
![Page 15: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/15.jpg)
Consequences of copyright infringement Monetary Damages Imprisonment
![Page 16: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/16.jpg)
Purchased software
Covered by “shrink-wrap” or “click-wrap” agreement
This is almost always a valid, enforceable contract Whether you choose to read it or not
They almost all say You cannot load the software on more than one
computer If the software causes you any damage, the
software company is not liable
![Page 17: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/17.jpg)
Trademarks
Word, name, or symbol used to identify and distinguish goods from those of another
Registered with U.S. Patent and Trademark office (PTO)
![Page 18: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/18.jpg)
Trademarks
Some of the issues Domain name dispute
www.ggoogle.com www.AdultsRUs.com
Website metatag Website framing
![Page 19: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/19.jpg)
Defamation
Oral or written false statement that harms a person’s reputation Libel: written Slander: oral
Consequences Monetary damages
Bottom line Creating a web site makes you a “publisher” Statements made on Facebook or Twitter are public Be careful what you say
![Page 20: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/20.jpg)
Computer Fraud and Abuse Act (CFAA) Enacted in 1984, amended several times Prohibits accessing a computer and obtaining
National security information Financial records or credit reports Anything of value
Prohibits trespassing on a gov’t computer This includes just looking
![Page 21: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/21.jpg)
Computer Fraud and Abuse Act (CFAA) continued …
Prohibits Releasing a worm or virus Trafficking in computer passwords Threatening to damage a computer
Consequences Monetary damages Jail
![Page 22: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/22.jpg)
Obscenity
First amendment issue (freedom of speech) In determining what is obscene, courts apply
“contemporary community standards” On the Internet, which community . . .
Regulation difficult
![Page 23: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/23.jpg)
Obscenity continued
Government attempts to protect minors from pornography include: Communications Decency Act (CDA) Child Pornography Prevention Act (CPPA) Child Online Protection Act (COPA)
Parts of each held unconstitutional Child pornography absolutely illegal, even in
the privacy of your home
![Page 24: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/24.jpg)
Privacy
What privacy rights do you have? No explicit right to privacy in U.S. Constitution
4th amendment: right to be secure in their persons, houses, … against unreasonable searches and seizures
Supreme Court recognizes “zones of privacy” Are websites such as MySpace and Facebook private?
No Are emails private?
From employer or school? Probably not Banners
From Government? Electronic Communication Privacy Act (ECPA) controls Amount of privacy depends upon age of email, whether it has been
opened, and other factors
![Page 25: An Introduction to Computer Law Judy Jacobs Miller © 2006](https://reader035.vdocuments.us/reader035/viewer/2022062516/56649d2e5503460f94a060ab/html5/thumbnails/25.jpg)
The End