SlideShare a Scribd company logo
Creative Commons  & DMCA Brian Rowe February  11th 2010
 
CC
Jump off a cliff
Human Readable  Deeds
Legal Code
Machine Readable Code  <a rel=&quot;license&quot; href=&quot;http://creativecommons.org/licenses/by-sa/3.0/us/&quot;><img alt=&quot;Creative Commons License&quot; style=&quot;border-width:0&quot; src=&quot;http://i.creativecommons.org/l/by-sa/3.0/us/88x31.png&quot; /></a><br /><span xmlns:dc=&quot;http://purl.org/dc/elements/1.1/&quot; property=&quot;dc:title&quot;>FFIP @ LoC</span> by <a xmlns:cc=&quot;http://creativecommons.org/ns#&quot; href=&quot;www.BrianRowe.org&quot; property=&quot;cc:attributionName&quot; rel=&quot;cc:attributionURL&quot;>Brian Rowe</a> is licensed under a <a rel=&quot;license&quot; href=&quot;http://creativecommons.org/licenses/by-sa/3.0/us/&quot;>Creative Commons Attribution-Share Alike 3.0 United States License</a>.
 
BY
 
 
 
 
 
 
License  Your Work  creativecommons.org/choose/
CC0
Jacobsen v. Katzer
 
 
over $1.6 million in sales in the first week & #1 Selling on Amazon
Part II DMCA
 
 
 
 
Section 512
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
IO Group v. Veoh IO Group v. Veoh
1.  Establish Terms of Use and Acceptable Use policies /w mention copyright policies and DMCA takedown procedures 2.  Remind users of your policies during the upload process 3.  Designate a Copyright Agent  4.  Warn users who violate the policy 5.  Ban user accounts for repeated violations 6.  Do Not  let user register for accounts from email accounts you ahve already banned  7.  Require users to create accounts to upload content ??? 8.  Finger print (hash) content  9.  Respond to takedown notices quickly 10.  Keep records
 
DMCA Sec. 1201. Circumvention of copyright protection systems
NO FAIR USE     
   fined up to $500,000  Five years in Jail    
Credits Slides 2 - Sarah Davies - PD Slides 15 - 19 From: Sharing Creative Works  An Illustrated Primer by Alex Roberts, Rebecca Rojer, & Jon Phillips Several images were used under first amendment fair use Several images were used through my 1st Amendment fair use rights 

More Related Content

What's hot

Tips for Securing Your Facebook Account
Tips for Securing Your Facebook AccountTips for Securing Your Facebook Account
Tips for Securing Your Facebook Account
Professor Bauer
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
Dinesh Gunathilaka
 
25 barriers to web 2 implementation
25 barriers to web 2 implementation25 barriers to web 2 implementation
25 barriers to web 2 implementation
Phil Bradley
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
John Curry
 
Jonathan Bailey WordCamp Dallas 2008 Presentation
Jonathan Bailey WordCamp Dallas 2008 PresentationJonathan Bailey WordCamp Dallas 2008 Presentation
Jonathan Bailey WordCamp Dallas 2008 Presentation
Plagiarism Today
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
MitchFeigenbaum
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
dlmarion
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices  iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices
Gordon Owen
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
 
Digital life
Digital lifeDigital life
Digital lifeHarm7
 
Internet Contract
Internet ContractInternet Contract
Internet Contractyasha15
 
User Guide of TimeAlly
User Guide of TimeAllyUser Guide of TimeAlly
User Guide of TimeAlly
rebellodaniela
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 

What's hot (18)

Tips for Securing Your Facebook Account
Tips for Securing Your Facebook AccountTips for Securing Your Facebook Account
Tips for Securing Your Facebook Account
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
 
25 barriers to web 2 implementation
25 barriers to web 2 implementation25 barriers to web 2 implementation
25 barriers to web 2 implementation
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Jonathan Bailey WordCamp Dallas 2008 Presentation
Jonathan Bailey WordCamp Dallas 2008 PresentationJonathan Bailey WordCamp Dallas 2008 Presentation
Jonathan Bailey WordCamp Dallas 2008 Presentation
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
 
E safety
E safetyE safety
E safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices  iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Digital life
Digital lifeDigital life
Digital life
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 
User Guide of TimeAlly
User Guide of TimeAllyUser Guide of TimeAlly
User Guide of TimeAlly
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 

Viewers also liked

Cc Free Culture Sccc 2009
Cc Free Culture Sccc 2009Cc Free Culture Sccc 2009
Cc Free Culture Sccc 2009
Brian Rowe
 
Google Book Settlement talk @ NWILL
Google Book Settlement talk @ NWILLGoogle Book Settlement talk @ NWILL
Google Book Settlement talk @ NWILLBrian Rowe
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Brian Rowe
 
Summer Of Copyright
Summer Of CopyrightSummer Of Copyright
Summer Of Copyright
Brian Rowe
 
Privacy for Libraries
Privacy for LibrariesPrivacy for Libraries
Privacy for Libraries
Brian Rowe
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair use
Brian Rowe
 
Copyright 101 For Coders
Copyright 101 For CodersCopyright 101 For Coders
Copyright 101 For Coders
Brian Rowe
 
Copyright Cc WLA
Copyright Cc WLACopyright Cc WLA
Copyright Cc WLA
Brian Rowe
 

Viewers also liked (9)

Cc Free Culture Sccc 2009
Cc Free Culture Sccc 2009Cc Free Culture Sccc 2009
Cc Free Culture Sccc 2009
 
Google Book Settlement talk @ NWILL
Google Book Settlement talk @ NWILLGoogle Book Settlement talk @ NWILL
Google Book Settlement talk @ NWILL
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
 
Summer Of Copyright
Summer Of CopyrightSummer Of Copyright
Summer Of Copyright
 
Privacy for Libraries
Privacy for LibrariesPrivacy for Libraries
Privacy for Libraries
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair use
 
Copyright 101 For Coders
Copyright 101 For CodersCopyright 101 For Coders
Copyright 101 For Coders
 
Copyright Cc WLA
Copyright Cc WLACopyright Cc WLA
Copyright Cc WLA
 

Similar to CC DMCA for IMT550

CC & the DMCA
CC & the DMCACC & the DMCA
CC & the DMCA
Brian Rowe
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
scottsicle
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
Ian Forrester
 
MS PowerPoint format
MS PowerPoint formatMS PowerPoint format
MS PowerPoint formatwebhostingguy
 
Writing for the web/Privacy/Copyright
Writing for the web/Privacy/CopyrightWriting for the web/Privacy/Copyright
Writing for the web/Privacy/Copyright
time4online
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Act
termsfeed
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair UseBrian Rowe
 
Fiddling with flickr
Fiddling with flickrFiddling with flickr
Creating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, MetadataCreating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, Metadata
Robert Pearce
 
NTC Best Practices for Sharing
NTC Best Practices for SharingNTC Best Practices for Sharing
NTC Best Practices for SharingBrian Rowe
 
Rails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaRails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaBryce Kerley
 
Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent ConventoProgressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
DEVCON
 
Copyright CC Infocamp V2
Copyright CC Infocamp V2Copyright CC Infocamp V2
Copyright CC Infocamp V2
Brian Rowe
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
Aduci
 
Creative commons 101 for npo's
Creative commons 101 for npo'sCreative commons 101 for npo's
Creative commons 101 for npo'sBrian Rowe
 
Creative Commons and Open Education
Creative Commons and Open EducationCreative Commons and Open Education
Creative Commons and Open Education
University of California, Berkeley
 
Building Windows 8 Metro Style Applications Using JavaScript and HTML5
Building Windows 8 Metro Style Applications Using JavaScript and HTML5Building Windows 8 Metro Style Applications Using JavaScript and HTML5
Building Windows 8 Metro Style Applications Using JavaScript and HTML5
LearnNowOnline
 

Similar to CC DMCA for IMT550 (20)

CC & the DMCA
CC & the DMCACC & the DMCA
CC & the DMCA
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
 
MS PowerPoint format
MS PowerPoint formatMS PowerPoint format
MS PowerPoint format
 
Writing for the web/Privacy/Copyright
Writing for the web/Privacy/CopyrightWriting for the web/Privacy/Copyright
Writing for the web/Privacy/Copyright
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Act
 
Copyright 101 Fair Use
Copyright 101 Fair UseCopyright 101 Fair Use
Copyright 101 Fair Use
 
Fiddling with flickr
Fiddling with flickrFiddling with flickr
Fiddling with flickr
 
Creating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, MetadataCreating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, Metadata
 
NTC Best Practices for Sharing
NTC Best Practices for SharingNTC Best Practices for Sharing
NTC Best Practices for Sharing
 
Rails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp TampaRails 3 and OAuth for Barcamp Tampa
Rails 3 and OAuth for Barcamp Tampa
 
Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent ConventoProgressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
 
Dynamic watermarking
Dynamic watermarkingDynamic watermarking
Dynamic watermarking
 
Copyright CC Infocamp V2
Copyright CC Infocamp V2Copyright CC Infocamp V2
Copyright CC Infocamp V2
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
 
Creative commons 101 for npo's
Creative commons 101 for npo'sCreative commons 101 for npo's
Creative commons 101 for npo's
 
Creative Commons and Open Education
Creative Commons and Open EducationCreative Commons and Open Education
Creative Commons and Open Education
 
Building Windows 8 Metro Style Applications Using JavaScript and HTML5
Building Windows 8 Metro Style Applications Using JavaScript and HTML5Building Windows 8 Metro Style Applications Using JavaScript and HTML5
Building Windows 8 Metro Style Applications Using JavaScript and HTML5
 

More from Brian Rowe

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBA
Brian Rowe
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lecture
Brian Rowe
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Brian Rowe
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix Culture
Brian Rowe
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
Brian Rowe
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismBrian Rowe
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101Brian Rowe
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureBrian Rowe
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipenBrian Rowe
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy IgniteBrian Rowe
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentBrian Rowe
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thBrian Rowe
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Brian Rowe
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Brian Rowe
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 

More from Brian Rowe (20)

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBA
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lecture
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - Draft
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix Culture
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Ecc 2013
Ecc 2013 Ecc 2013
Ecc 2013
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
 
WLA Lecture
WLA LectureWLA Lecture
WLA Lecture
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
LSNTAP on RSS
LSNTAP on RSSLSNTAP on RSS
LSNTAP on RSS
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

CC DMCA for IMT550

  • 1. Creative Commons  & DMCA Brian Rowe February 11th 2010
  • 2.  
  • 3. CC
  • 4. Jump off a cliff
  • 7. Machine Readable Code <a rel=&quot;license&quot; href=&quot;http://creativecommons.org/licenses/by-sa/3.0/us/&quot;><img alt=&quot;Creative Commons License&quot; style=&quot;border-width:0&quot; src=&quot;http://i.creativecommons.org/l/by-sa/3.0/us/88x31.png&quot; /></a><br /><span xmlns:dc=&quot;http://purl.org/dc/elements/1.1/&quot; property=&quot;dc:title&quot;>FFIP @ LoC</span> by <a xmlns:cc=&quot;http://creativecommons.org/ns#&quot; href=&quot;www.BrianRowe.org&quot; property=&quot;cc:attributionName&quot; rel=&quot;cc:attributionURL&quot;>Brian Rowe</a> is licensed under a <a rel=&quot;license&quot; href=&quot;http://creativecommons.org/licenses/by-sa/3.0/us/&quot;>Creative Commons Attribution-Share Alike 3.0 United States License</a>.
  • 8.  
  • 9. BY
  • 10.  
  • 11.  
  • 12.  
  • 13.  
  • 14.  
  • 15.  
  • 16. License  Your Work creativecommons.org/choose/
  • 17. CC0
  • 19.  
  • 20.  
  • 21. over $1.6 million in sales in the first week & #1 Selling on Amazon
  • 23.  
  • 24.  
  • 25.  
  • 26.  
  • 28.
  • 29.  
  • 30. IO Group v. Veoh IO Group v. Veoh
  • 31. 1.  Establish Terms of Use and Acceptable Use policies /w mention copyright policies and DMCA takedown procedures 2.  Remind users of your policies during the upload process 3.  Designate a Copyright Agent 4.  Warn users who violate the policy 5.  Ban user accounts for repeated violations 6.  Do Not let user register for accounts from email accounts you ahve already banned 7.  Require users to create accounts to upload content ??? 8.  Finger print (hash) content 9.  Respond to takedown notices quickly 10.  Keep records
  • 32.  
  • 33. DMCA Sec. 1201. Circumvention of copyright protection systems
  • 34. NO FAIR USE     
  • 35.   fined up to $500,000  Five years in Jail    
  • 36. Credits Slides 2 - Sarah Davies - PD Slides 15 - 19 From: Sharing Creative Works An Illustrated Primer by Alex Roberts, Rebecca Rojer, & Jon Phillips Several images were used under first amendment fair use Several images were used through my 1st Amendment fair use rights