Published on

A PowerPoint designed to examine Copyright in the digital age.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. COPYRIGHT IP Protector or Corporate Money Spinner?
  2. 3. HISTORY OF COPYRIGHT <ul><li>“ Inventions then cannot, in nature, be a subject of property. Society may give an exclusive right to the profits arising from them, as an encouragement to men to pursue ideas which may produce utility, but this may or may not be done, according to the will and convenience of the society, without claim or complaint from anybody.” </li></ul><ul><li>Thomas Jefferson </li></ul><ul><li>It is interesting that although Jefferson understands that the ability to gain financial benefit was an incentive to intellectual production. However he also states that: </li></ul><ul><li>“ It has been pretended by some, (and in England especially,) that inventors have a natural and exclusive right to their inventions” </li></ul><ul><li>He saw IP as a social law rather than a natural law. </li></ul>
  3. 4. THE PIRATE BAY <ul><li>They promote themselves as the worlds largest BitTorrent tracker. </li></ul><ul><li>Have faced numerous legal challenges in recent years as well as raids on their premises in Sweden in 2006. </li></ul><ul><li>Italian judges order the site to be blocked by Italian ISPs in 2008. However The Pirate Bay appealed against this and won. </li></ul><ul><li>Denmark’s largest ISP TDC preemptively blocked the site in 2008. </li></ul><ul><li>In 2008 The Pirate Bay announced it has had over 25 million unique peers, how can this many people be criminals? </li></ul>
  4. 5. MEDIA DEFENDER <ul><li>“ Decoying and Spoofing are the most commonly known techniques that we employ. We send blank files and data noise that look exactly like a real response to an initiated search requests for a particular title. Pirated files will no doubt be on the networks, but with our protection applied it would be easier to find a needle in a hay stack than a real file amongst our countermeasures.” </li></ul><ul><li>Media Defender </li></ul><ul><li>Extensive client list including Universal Pictures, HBO, 20 th Century Fox, Virgin Records and Paramount Pictures. </li></ul><ul><li>Purchased for $42 million in 2005 which clearly shows how concerned the major Hollywood studies are of online ‘piracy’. </li></ul><ul><li>Currently under FBI investigation after Denial of Service attack on the legal video p2p network Revision3. </li></ul>
  5. 6. STEAL THIS FILM PART ONE <ul><li>Shot in Sweden and released in August 2006 combines accounts from prominent players in the Swedish piracy culture ( The Pirate Bay , Piratbyrån , and the Pirate Party ) with found material, propaganda-like slogans and Vox Pops. </li></ul><ul><li>Material used in Steal This Film includes: </li></ul><ul><li>clips from other documentary interviews with industry and government officials, </li></ul><ul><li>Anti-piracy promotionals, </li></ul><ul><li>Logos from several major Hollywood studios, </li></ul><ul><li>Sequences from The Day After Tomorrow and The Matrix. </li></ul><ul><li>All of which are believed to constitute to fair use. </li></ul>
  6. 7. Creative Commons <ul><li> Creative Commons has been described as being at the forefront of the copyleft movement, which seeks to support the building of a richer public domain by providing an alternative to the automatic &quot;all rights reserved&quot; copyright, dubbed &quot;some rights reserved.&quot; </li></ul><ul><li>David Berry and Giles Moss have credited Creative Commons with generating interest in the issue of intellectual property and contributing to the re-thinking of the role of the &quot;commons&quot; in the &quot;information age&quot;. </li></ul><ul><li>Includes areas like: </li></ul><ul><li>Open Source </li></ul><ul><li>Science Commons </li></ul><ul><li>Open Access Publishing </li></ul>
  7. 8. SOFTWARE PIRACY <ul><li>In 2001, a Russian computer programmer was arrested for breaching the DMCA (Digital Millennium Copyright Act) for cracking its e-book software. </li></ul><ul><li>The DMCA protects the ability of Adobe to make restrictions even though they violate the fair use rights of the user. For example, you were not allowed to make backup copies or read the e-book on more than one computer. </li></ul><ul><li>After public protest the company announced that it did not want to prosecute and supported the programmers release from prison. </li></ul>
  8. 9. FURTHER READING <ul><li>CEMP </li></ul><ul><li>Free Culture </li></ul>