Digital Law

Aim: To create a 'c-book' on what it means to be a digital citizen in the 21st century
  • Use of file-sharing sites
  • Pirate software
  • Hack into systems and networks
  • Stealing someone's identity
  • Viruses & amp; Trojan Horses

1. Overview and Description

"Digital Law is defined as the electronic responsibility for actions, deeds which is either ethical or unethical. Digital responsibility deals with the ethics of technology. Unethical use manifests itself in form of theft and/or crime. Ethical manifests itself in the form of abiding by the laws of society." It is basically about what you are and are not allowed to do while surfing and using the Internet

Everybody should respect the law and abide by it. Not following the law can result in serious punishment. Examples of this behavior are like hacking into people’s personal details, pirate software, downloading music illegally and creating viruses or Trojan horses.

Identity theft is becoming a rising problem. Studies show that one in five families have been victims to this in the U.S. The thieves can steal your credit card number allowing them to buy or rent various products using your information. The worst thing is that you don't realize what is happening until you are sent bills or receive calls about different transactions. It takes months to restore all of your information and secure it all. Therefore everyone should take precautions.

Spoofing generally means to convince people to provide personal or financial information that lets the hacker commit credit card/bank fraud or other forms of identity theft. Spam criminals often use spoofing as an attempt to get into someone else's computer.

IP Spoofing" is a technique used to get access to computers, where the intruder sends a message to a computer with an IP address telling them that the message is coming from a trusted machine and person. To stop IP Spoofing packet filtering is a programm that blocks other packets getting into your network. This prevents an outside attacker from gaining access to an internal machine.

Software Piracy is copying and selling of unauthorized computer software, movies etc. This happens a lot in the Mexico, China, Indonesia, Russia, Brazil and Zimbabwe but many other countries are also involved. Most of these countries have Copyright Infringement Laws but many citizens do not abide by them however some countries are more strict about them than others.
There are 4 types of software piracy;
  • Industrial Piracy: An individual or group attempts duplication and distribution on a large scale for profit.
  • Coporate Piracy: Unprotected contents are shared through net works such as peer-to-peer, LAN and Internet.
  • Reseller Piracy: Involves computer hardware companies selling ma chines with illegal copies of software preloaded on their hard drive.
  • Home Piracy: Includes everything from trading disks with friends to running a not-for-profit bulletin board for the purpose of illegal software distribution.

Computer hacking is the practice of changing computer hardware and software. People who are involved with such activities are often called hackers. Since the word “hack” has long been used to describe someone who is not able to do their job very well. Some hackers claim this term is offensive, since they are very skilled in their topics.Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program.

2. Background

Digital Law is everywhere online to insure the safety of certain rights. Some examples on digital Law are:

3. Social / ethical aspects

Digital law has both a positive and negative impact on people as individuals and communities as a whole. Digital Law sets laws to ensure safety and security online, and to protect peoples rights. It comes either ethically or unethically. It is unethical as in a crime or theft. It is ethical when people abide by the laws of society.
"If people are illegally sharing music, students or otherwise, the consequences can be severe," Sue Lewis Deputy Chief Information Officer for the University said. "The Recording Industry Association of America (RIAA) has sued hundreds of individuals, including students. Some of those students have had to pay around $10,000, and that penalty can even be much greater."

Biography of Kevin Mitnick : The Biography of a man that is known as the greatest hacker of our time.
Kevin Mitnick was convicted during the 1990's for hacking into various computers and stealing properties. In 2002 he wrote a book called "The Art of Deception". In this he states that he didn't use hacking tools or programms to gain access into the computers, he only used passwords and codes that he got from different social tactics (social engineering). Today he runs his own company called "Mitnick Security Consulting".

4. Possible solutions to the problems

Students should be responsible, ethical and legal while using the internet

Solutions for this problem are:
  • Using better Spyware.
  • Stronger Punishment* Everyone should know the clear consequences of downloading music illegally, pirating movies or creating a virus.
  • Report a suspicious e-mail and don't open or reply to it.
  • Report straight away if you suspect any identity theft.
  • Don't steal music or movies just go ahead and pay for them.
  • Don't put up inappropriate pictures.
  • Don't post personal information.
  • Download anti-virus softwares

5. Guideline(s) for teenagers

  • Buy your music, whether by CD or iTunes. Don't use Limewire or Kazaa.
  • Never post inappropriate pictures on the Internet.
  • Don't pirate or download movies illegally.
  • Only open emails where you dont know from who it is coming from.
  • Don't let out any personal information to strangers on the internet.
  • Have back-up plans to protect your laptop or computer from viruses/worms

This is a video about what happens to artists when people download their music for free (piracy).

Input/Ideas for Digiteen Contract

Links to:
Action Qatar Academy
Action Vienna International School
Action Westwood School