Digital+Law

toc

=Digital Law=

Aim: To create a 'c-book' on what it means to be a digital citizen in the 21st century = = =1. Overview and Description=
 * Use of file-sharing sites
 * Pirate software
 * Hack into systems and networks
 * Stealing someone's identity
 * Viruses &amp; amp; Trojan Horses

"Digital Law is defined as the electronic responsibility for actions, deeds which is either ethical or unethical. Digital responsibility deals with the ethics of technology. Unethical use manifests itself in form of theft and/or crime. Ethical manifests itself in the form of abiding by the laws of society." It is basically about what you are and are not allowed to do while surfing and using the Internet

Everybody should respect the law and abide by it. Not following the law can result in serious punishment. Examples of this behavior are like [|hacking] into people’s personal details, [|pirate software], downloading music illegally and creating viruses or [|Trojan horses]. http://coe.k-state.edu/digitalcitizenship/

[|Identity theft] is becoming a rising problem. Studies show that one in five families have been victims to this in the U.S. The thieves can steal your credit card number allowing them to buy or rent various products using your information. The worst thing is that you don't realize what is happening until you are sent bills or receive calls about different transactions. It takes months to restore all of your information and secure it all. Therefore everyone should take precautions.

[|Spoofing] generally means to convince people to provide personal or financial information that lets the hacker commit credit card/bank fraud or other forms of identity theft. Spam criminals often use spoofing as an attempt to get into someone else's computer.

[|IP Spoofing]" is a technique used to get access to computers, where the intruder sends a message to a computer with an [|IP address] telling them that the message is coming from a trusted machine and person. To stop IP Spoofing packet filtering is a programm that blocks other packets getting into your network. This prevents an outside attacker from gaining access to an internal machine.

[|Software Piracy] is copying and selling of unauthorized computer software, movies etc. This happens a lot in the Mexico, China, Indonesia, Russia, Brazil and Zimbabwe but many other countries are also involved. Most of these countries have Copyright Infringement Laws but many citizens do not abide by them however some countries are more strict about them than others. There are 4 types of software piracy;
 * Industrial Piracy: An individual or group attempts duplication and distribution on a large scale for profit.
 * Coporate Piracy: Unprotected contents are shared through net works such as peer-to-peer, LAN and Internet.
 * Reseller Piracy: Involves computer hardware companies selling ma chines with illegal copies of software preloaded on their hard drive.
 * Home Piracy: Includes everything from trading disks with friends to running a not-for-profit bulletin board for the purpose of illegal software distribution.

[|Computer hacking] is the practice of changing computer hardware and software. People who are involved with such activities are often called hackers. Since the word “hack” has long been used to describe someone who is not able to do their job very well. Some hackers claim this term is offensive, since they are very skilled in their topics.Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program.

=2. Background=

media type="youtube" key="OZMmvOg1e4E&hl=en" height="344" width="425" Digital Law is everywhere online to insure the safety of certain rights. Some examples on digital Law are:
 * [|Is it Wrong to Share Your Music? (Discussion)] : This is about whether downloading music should be legal, and different opinions about that.
 * [|Browser Hijackers Ruining Lives] : This article is about Hijackers doing different illegal things on the internet for example changing browser settings.
 * [|Yaha Virus Uses Netizens as Pawns] : This website basically talks about a certain type of internet worm and how hackers and virus writers are becoming a greater threat.
 * [|Decoding Computer Intruders] : This website is actually an extract from the New York Times. It talks about the war on hackers and the kind of people that hackers are. It compares the fight against hackers as harder than an actual war fighting for a country or a belief.
 * [|Digital Law and Safety Protection] : This website talks about how messenger could be used in corporation to steal information or to send viruses through networks.
 * [|'Spoofing' and 'Phishing' and Stealing Identities] : Basically about how hackers get onto other computers and how you can protect yourself against them.
 * [|Illegal File-Sharing] : A woman stood up to the music company but lost the law suit and now has to pay $9,250 **per** song.
 * [|Law in a Digital World] A book by Ethan Katsh describing how the law will change as technology changes.

media type="youtube" key="l5SmrHNWhak&hl=en" height="355" width="425"

=3. Social / ethical aspects=

Digital law has both a positive and negative impact on people as individuals and communities as a whole. Digital Law sets laws to ensure safety and security online, and to protect peoples rights. It comes either ethically or unethically. It is unethical as in a crime or theft. It is ethical when people abide by the laws of society. "//If people are illegally sharing music, students or otherwise, the consequences can be severe," Sue Lewis Deputy Chief Information Officer for the University said. "The Recording Industry Association of America (RIAA) has sued hundreds of individuals, including students. Some of those students have had to pay around $10,000, and that penalty can even be much greater."//

[|Biography of Kevin Mitnick] : The Biography of a man that is known as the greatest hacker of our time. Kevin Mitnick was convicted during the 1990's for hacking into various computers and stealing properties. In 2002 he wrote a book called "The Art of Deception". In this he states that he didn't use hacking tools or programms to gain access into the computers, he only used passwords and codes that he got from different social tactics ([|social engineering]). Today he runs his own company called "Mitnick Security Consulting". media type="youtube" key="8_VYWefmy34&hl=en" height="355" width="425"

=4. Possible solutions to the problems=

Students should be responsible, ethical and legal while using the internet

Solutions for this problem are:
 * Using better Spyware.
 * Stronger Punishment* Everyone should know the clear consequences of downloading music illegally, pirating movies or creating a virus.
 * Report a suspicious e-mail and don't open or reply to it.
 * Report straight away if you suspect any identity theft.
 * Don't steal music or movies just go ahead and pay for them.
 * Don't put up inappropriate pictures.
 * Don't post personal information.
 * Download anti-virus softwares

=5. Guideline(s) for teenagers=


 * Buy your music, whether by CD or iTunes. Don't use Limewire or Kazaa.
 * Never post inappropriate pictures on the Internet.
 * Don't [|pirate] or download movies illegally.
 * Only open emails where you dont know from who it is coming from.
 * Don't let out any personal information to strangers on the internet.
 * Have back-up plans to protect your laptop or computer from viruses/worms

This is a video about what happens to artists when people download their music for free (piracy). media type="youtube" key="eMhGzoLx0qo&hl=en" height="355" width="425" Input/Ideas for Digiteen Contract

Links to: Action Qatar Academy Action Vienna International School Action Westwood School