Legal Aspects - Copyright, (Data-) Protection and Cybercrime
Copyright
The basis of copyright law today is the "Copyright Act of 1976".
Section 102 of the U.S. Copyright Law (Dec. 2011) says that:
"(a) Copyright protection subsists...in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
Works of authorship include the following categories:
(1) literary works;
(2) musical works, including any accompanying words;
(3) dramatic works, including any accompanying music;
(4) pantomimes and choreographic works;
(5) pictorial, graphic, and sculptural works;
(6) motion pictures and other audiovisual works;
(7) sound recordings; and
(8) architectural works"
The copyright symbol © (a circled "C") is used in copyright notices.
Section 102 of the U.S. Copyright Law (Dec. 2011) says that:
"(a) Copyright protection subsists...in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
Works of authorship include the following categories:
(1) literary works;
(2) musical works, including any accompanying words;
(3) dramatic works, including any accompanying music;
(4) pantomimes and choreographic works;
(5) pictorial, graphic, and sculptural works;
(6) motion pictures and other audiovisual works;
(7) sound recordings; and
(8) architectural works"
The copyright symbol © (a circled "C") is used in copyright notices.
What should pupils and teachers keep in mind with regard to copyright?
- always indicate the sources of text, pictures etc. + use quotation marks for text
- be careful with sources (for example Wikipedia) -> Is the source or information reliable?
- be sure that the content you use is your intellectual property and that you use it with permission of the author or open source content
- ask for permission if you are not sure whether you can use the source (e.g. a picture)
- media which is shown in the classroom is shown in public (possibly you have to pay (GEMA fees) for it!)
- copyright rules differ from country to country -> check them when needed!
(Data-) Protection
As the Internet plays a major role these days, (data)- protection (protection of privacy) is becoming increasingly important.
What should pupils and their parents keep in mind with regard to (data-) protection?
- talk to the kids and make them aware of the possible dangers lurking on the web
- use a secure web browser (put "s" before)
- never store password on a public computer / keep in secure place
- create a strong password that no one is likely to guess
- use longer passwords
- include numbers, symbols, upper- and lowercase letters
- do not use personal information (e.g. no name, date of birth etc.)
- use longer passwords
- encript data, use database encription tools
- always stay anonymous + do not share private information (especially with people you do not know)
- use a parental control plugin for your webbrowser
- give the kids their own account on Windows that is preconfigured for their safety -> so that they can not access certain data
- tell the kids to check and adapt their privacy settings on any social community page (e.g. Facebook) they use
- make up a mnemonic device for internet safety (e.g. www.kidsmart.org.uk)
Cybercrime (Cyberstalking and Cyberbullying)
Two forms of cybercrime with increasing importance are cyberstalking and cyberbullying.
Cyberstalking is defined as "threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications."(The National Center for Victims of Crime)
Here, the majority of the stalkers tend to be male and the victims female. Often the stalking occurs after the termination of a relationship and the possibilities of the Internet are used to encourage others to engage in threatening behavior against the victim. The stalkers can use a false identity and thus do not have to confront the victim directly.
Cyberbullying means "any type of harassment or bullying (teasing, telling lies, making fun of someone, making rude or mean comments, spreading rumors, or making threatening or aggressive comments) that occurs through email, a chat room, instant messaging, a website (including blogs), or text messaging." (The Centers for Disease Control)
In this case, the perpetrators and also the victims tend to be female.
Cyberstalking is seen as a criminal matter whereas it is the conventional wisdom that cyberbullying falls within the competence of teachers and parents.
Watch the following YouTube Video called "Online Safety - Little Red Riding Mood - Chapter 3":
Cyberstalking is defined as "threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications."(The National Center for Victims of Crime)
Here, the majority of the stalkers tend to be male and the victims female. Often the stalking occurs after the termination of a relationship and the possibilities of the Internet are used to encourage others to engage in threatening behavior against the victim. The stalkers can use a false identity and thus do not have to confront the victim directly.
Cyberbullying means "any type of harassment or bullying (teasing, telling lies, making fun of someone, making rude or mean comments, spreading rumors, or making threatening or aggressive comments) that occurs through email, a chat room, instant messaging, a website (including blogs), or text messaging." (The Centers for Disease Control)
In this case, the perpetrators and also the victims tend to be female.
Cyberstalking is seen as a criminal matter whereas it is the conventional wisdom that cyberbullying falls within the competence of teachers and parents.
Watch the following YouTube Video called "Online Safety - Little Red Riding Mood - Chapter 3":