SlideShare a Scribd company logo
1 of 39
Download to read offline
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy
The Good, the Bad and the Ugly of Copyright and Privacy

More Related Content

Viewers also liked

Viewers also liked (13)

Opportunities and Policies for Innovation in Data-Centric Economy
Opportunities and Policies for Innovation in Data-Centric EconomyOpportunities and Policies for Innovation in Data-Centric Economy
Opportunities and Policies for Innovation in Data-Centric Economy
 
Smart City and Innovation in Hong Kong - Priorities and Challenges
Smart City and Innovation in Hong Kong - Priorities and ChallengesSmart City and Innovation in Hong Kong - Priorities and Challenges
Smart City and Innovation in Hong Kong - Priorities and Challenges
 
金融科技 衝破障礙
金融科技 衝破障礙金融科技 衝破障礙
金融科技 衝破障礙
 
iCity@HK: A Vision on Next Generation Smart City
iCity@HK: A Vision on Next Generation Smart CityiCity@HK: A Vision on Next Generation Smart City
iCity@HK: A Vision on Next Generation Smart City
 
Meeting IT Security Challenges in a Fast-changing Threat Landscape"
Meeting IT Security Challenges in a Fast-changing Threat Landscape"Meeting IT Security Challenges in a Fast-changing Threat Landscape"
Meeting IT Security Challenges in a Fast-changing Threat Landscape"
 
Technology Policy for Hong Kong
Technology Policy for Hong KongTechnology Policy for Hong Kong
Technology Policy for Hong Kong
 
Smart City Technologies in Beijing
Smart City Technologies in BeijingSmart City Technologies in Beijing
Smart City Technologies in Beijing
 
科技卷計劃簡介
科技卷計劃簡介科技卷計劃簡介
科技卷計劃簡介
 
Intelligent Transport Systems in Hong Kong
Intelligent Transport Systems in Hong KongIntelligent Transport Systems in Hong Kong
Intelligent Transport Systems in Hong Kong
 
香港社交媒體發展趨勢
香港社交媒體發展趨勢香港社交媒體發展趨勢
香港社交媒體發展趨勢
 
161027 hkconnect 2016_fintech_development
161027 hkconnect 2016_fintech_development161027 hkconnect 2016_fintech_development
161027 hkconnect 2016_fintech_development
 
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
Enhancing Hong Kong's Competitiveness Through Data Center and Cloud Computing...
 
Hong Kong ICT Policies and Opportunities
Hong Kong ICT Policies and OpportunitiesHong Kong ICT Policies and Opportunities
Hong Kong ICT Policies and Opportunities
 

More from Charles Mok

Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity