Your SlideShare is downloading. ×
Legal and ethical issues associated with modern technologies
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Legal and ethical issues associated with modern technologies


Published on

Published in: Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • Any user of an original work, needs to obtain rights of permission from the creator/author unless the work was created in a public domain. "It is illegal for
    anyone to violate any of the rights provided by the copyright law to the owner of copyright." (U.S. Copyright Office
  • Transcript

    • 1. Chantial N. Sims AET/531 June 9, 20014 Professor Regina Baker
    • 2. What are some of the ethical and legal issues that come with integrating modern technologies for organizations?  Copyright laws  Intellectual property  Fair use  Privacy policy
    • 3.  The United States Copyright Act was designed to help safeguard the intellectual property rights of original creative work of all authors(s). Authors are given exclusive rights or the legal rights to their body of work. Under copyright law, authorship can prohibit others from utilizing their work by means of:  Copying and distributing  Creating new versions  Performing the work publicly  Displaying the work  Give others permission to use the work  Transferring the copyright to others
    • 4.  What is it? Intellectual property represents the results or the product (intangible rights) that is inspired by a creative individual. Intellectual property safeguards are applied through the use of: copyrights, patents, trademarks, or trade secrets.  When you’re referring to intellectual property with technology, particularly software it becomes the basis of the software industry.  Each safeguard excluding trademarks apply to technology. Only the name or a symbol are protected so they can be personalized in a marketplace.
    • 5. Ethical and Legal Implications  Instructors and facilitators that use multimedia with training materials have an ethical responsibility to support and explain to their students the importance of understanding the legal ramifications that can be enforced with copyright infringement.  Copyright infringement takes place when a copyrighted work is copied, circulated, performed, displayed publicly, or altered without the permission of the copyright owner.
    • 6. Section 107 of the U.S. Copyright Law identifies four determining factors that defines whether or not fair use applies to copyright materials. The difference between what is “fair use” and what is copyright infringement is based on an individual basis and is not always clearly determined. 1. The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes 2. The nature of the copyrighted work 3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole 4. The effect of the use upon the potential market for, or value of, the copyrighted work
    • 7. Fair use may apply for means of news reporting, research purposes for clarification of an author’s remarks, questions or comments based on a review of the author’s created work, and for nonprofit educational uses, such as, copying a partial section of the written work for instructional use. Infringements will occur when the use of the created work is prompted by a desire for profitable gain.
    • 8.  The Privacy Act of 1974 provides protections against an invasion of privacy through the mistreatment of records by Federal agencies. Overall, the act permits citizen to acquire about how records are collected, distributed, handled, and maintained by the Federal Government. The act also allows individuals to obtain access to personal information maintained by Federal agencies for any edited, incorrect, or irrelevant information.
    • 9. Guidelines for Organizations Organizations must provide statements that declares how their party's policy collects, maintains, and releases personal information it obtains. This information is provided to employees and customers to inform them of what identifiable information is collected, kept confidential, shared with affiliates , or sold to other organizations. For online usage, Individuals must be given the chance to give consent to the use of their collected personal information and how it will be used with Acceptable Use Policies. Acceptable Use Policies should be:  Easy to locate  Clearly understood  Available at all times
    • 10.  Unreliable data security when collected, maintaining, and distributing personal identifiable information  Online links to third party websites.  Inferior internal processing systems  Outdated encryption techniques with electronic devices  Inadequate monitoring of privacy policy and practice
    • 11.  The fundamentals of copyright law are genuinely straightforward. In plain terms, copyright law regulates the ownership and the use of copyrighted material. Organizations are not only faced with adhering to copyright laws but privacy protections laws too. Lines can sometimes get blurred when dealing with the ethical and legal issues regarding implementing modern technologies into the workplace when personal information or intellectual property are involved. In order to avoid violations and hefty penalties it is necessary for organizations to implement privacy policy statements for all individuals that they employ or service. In order to avoid ethical and legal issues when working with copyright laws and privacy policies violations, organizations need to make sure they follow with their Acceptable Use Policies, as well as, stay current with Privacy and Copyright Laws.
    • 12.  Hayes, S. (2008, March). Acceptable use 2.0. Voices from the Middle, 15(3), 44. Retrieved from 13930774/12DD80D4E1E42B4B926/1?accountid=35812  United States Copyright Office. (n.d.) Copyright basics. Circular 1. Retrieved from United States Copyright Office