How does copyright infringement apply to the internet?
Copyright
infringement occurs when you use or distribute information without
permission from the person or organization that owns the legal rights to
the information. Including an image or cartoon on your website or in a
document, illegally downloading music, and pirating software are all
common copyright violations. While these activities may seem harmless,
they could have serious legal and security implications.
How do you know if you have permission to use something?
If
you find something on a website that you would like to use (e.g., a
document, a chart, an application), search for information about
permissions to use, download, redistribute, or reproduce. Most websites
have a "terms of use" page that explains how you are allowed to use
information from the site. You can often find a link to this page in the
site's contact information or privacy policy, or at the bottom of the
page that contains the information you are interested in using.
There
may be restrictions based on the purpose, method, and audience. You may
also have to adhere to specific conditions about how much information
you are allowed to use or how the information is presented and
attributed. If you can't locate the terms of use, or if it seems
unclear, contact the individual or organization that holds the copyright
to ask permission.
What consequences could you face?
- Prosecution - When you illegally download, reproduce, or distribute information, you risk legal action. Penalties may range from warnings and mandatory removal of all references to costly fines. Depending on the severity of the crime, jail time may also be a possibility. To offset their own court costs and the money they feel they lose because of pirated software, vendors may increase the prices of their products.
- Infection - Attackers could take advantage of sites or networks that offer unauthorized downloads (music, movies, software, etc.) by including code into the files that would infect your computer once it was installed. Because you wouldn't know the source or identity of the infection (or maybe that it was even there), you might not be able to easily identify or remove it. Pirated software with hidden Trojan horses is often advertised as discounted software in spam email messages.
No comments:
Post a Comment