Rights & Responsibilities: Digital Law
What is digital law?
"The legal rights and restrictions governing technology use."
(Ribble, 2011)
"The legal rights and restrictions governing technology use."
(Ribble, 2011)
Laws govern our society.
They tell us what we are allowed to do and what we aren't.
When we break laws, there are consequences.
Even the digital world has laws and they tell us how to behave and how we shouldn't behave while
we are online and using technology.
If those laws are broken, there are still consequences.
As a user of technology, it is your right and your responsibility to know and understand these digital laws so that you can follow them.
Some important digital laws include:
Copyright & Fair Use
A Copyright is a type of Intellectual Property (creation or invention) in which protection is "given to the authors or creators of 'original works of authorship,' including literary, dramatic, musical, artistic and other intellectual works." (Copyright Kids).
When you create something, only you have the right to make copies of that work, distribute copies of it, perform or display your work or make modifications to your work.
If anyone does any of those things without your permission, it is ILLEGAL.
When you create something, only you have the right to make copies of that work, distribute copies of it, perform or display your work or make modifications to your work.
If anyone does any of those things without your permission, it is ILLEGAL.
Think you know your stuff?
Take this QUIZ to see what you know about copyrighting.
Take this QUIZ to see what you know about copyrighting.
Fair Use is defined as the "right of the public to make reasonable use of copyrighted material in special circumstances without the Copyright Owner's Permission." (Copyright Kids).
The United States Copyright Act states that fair use of a copyrighted work may be used for certain purposes including “criticism, comment, news reporting, teaching, scholarship, or research.” (Copyright Kids).
There are several factors to consider when determining if there could be fair use of a work:
When in doubt, request a license from the owner of the copyright. |
For some myths and truths about Fair Use and to learn more about it, check out this document.
|
What is Plagerism?
"Plagiarism is when you use someone else's words or ideas and pass them off as your own." (Dowshen, 2011)
Instead of pretending that they were your ideas, you must give credit to the original author and cite your sources.
What can students do to prevent plagiarism?
What can teachers do to prevent plagiarism?
Instead of pretending that they were your ideas, you must give credit to the original author and cite your sources.
What can students do to prevent plagiarism?
- Use the checklist to the left
- Use quotes when directly quoting from a source
- Include citations in the paragraphs that are written
- Include a list of sources at the end of the work
What can teachers do to prevent plagiarism?
- Teach students the definition of plagiarism
- Be clear on your expectations
- Provide examples and guided instruction on how to quote documents and cite sources
When in doubt, give credit!
File Sharing & Media Piracy
U.S. copyright law states that, "you may not make a backup copy of any copyrighted material on a computer's hard drive. This includes music and films that you've downloaded." (Thompson, 2010).
In 2003, the Recording Industry Association of America (RIAA) started fining people for illegally downloading music (Ribble, 2011).
Click on the picture to find out what this university did to deal with their piracy problem.
In 2003, the Recording Industry Association of America (RIAA) started fining people for illegally downloading music (Ribble, 2011).
Click on the picture to find out what this university did to deal with their piracy problem.
Watch this short documentary to find out more information on media piracy.
Hacking & Identity Theft
What is computer “hacking?”
Computer hacking is when a person modifies a computer hardware or software program to do something other than what the program was intended to be used for. Most hackers (typically young adults and teenagers) "break into computer systems to steal, change or destroy information." (Computer Hackers & Predators).
How do hackers know where my computer is?
Anyone who is connected to the internet with a computer is susceptible to threats like hackers. They use methods such as spam emails, phishing scams, fake instant messages and usernames to deliver harmful viruses and malware to your computer. Hackers also try to access your personal information by monitoring your unprotected private information and chat room conversations.
How can hackers harm me?
Two words. Identity Theft.
Once the harmful malware is installed on your computer (without your permission), it starts transferring personal and private information (also without your permission). This could do a number of harmful things, including:
How can I protect my computer from hackers?
Check out the following videos to learn more about identity theft and how to protect yourself from it.
Computer hacking is when a person modifies a computer hardware or software program to do something other than what the program was intended to be used for. Most hackers (typically young adults and teenagers) "break into computer systems to steal, change or destroy information." (Computer Hackers & Predators).
How do hackers know where my computer is?
Anyone who is connected to the internet with a computer is susceptible to threats like hackers. They use methods such as spam emails, phishing scams, fake instant messages and usernames to deliver harmful viruses and malware to your computer. Hackers also try to access your personal information by monitoring your unprotected private information and chat room conversations.
How can hackers harm me?
Two words. Identity Theft.
Once the harmful malware is installed on your computer (without your permission), it starts transferring personal and private information (also without your permission). This could do a number of harmful things, including:
- Steal your website usernames and passwords
- Steal your money
- Open credit cards and bank accounts using your name
- Ruin your credit score
- Make fake purchases and abuse your
- Abuse your social security number
How can I protect my computer from hackers?
- Have a strong firewall and antivirus protection installed on your computer
- Check software programs for updates regularly
- Utilize free security patches if available
- Regularly check personal accounts for discrepancies
- Use caution when posting on social media and web pages
- Filter "friends" on Facebook and social media carefully
- Avoid questionable websites
- Only download software from trustworthy sites
- Keep personal information out of online conversations
- Be cautious when agreeing to meet an online "friend" in person
- Email safely: immediately delete suspected spam, do not open mail from unknown senders
Check out the following videos to learn more about identity theft and how to protect yourself from it.
|
|
Additional Resources:
For more information about digital law, visit the following websites:
|
|
Digital Citizenship by Lauren Lucca is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.