SlideShare a Scribd company logo
DIGITAL
CITIZENSHIP
NUMBER 6:
DIGITAL LAW
By Gabe Mantooth
What is
Digital
Law?
• Digital Law is one of the Nine
Elements of DigitalCitizenship
• In a broad term it is understood
as the legal rights and restrictions
governing technology use
• This basically means downloading
illegal music, movies, government
secrets, books, locations of
nuclear secrets
Examples of
breaking
the Digital
law
• Illegal File Sharing
• Pirating Software
• CreatingViruses
• Hacking
• Stealing Someone’s Identity
• Copyright Infringement
Illegal File
Sharing
• What it means “The sharing of files between people
using computers connected to the internet”
Examples
• A great example of this is the case of Mega
uploads.This was a file sharing site were
people could watch movies andT.V. shows for
almost nothing.
• However they did this with out the consent of
the company's and were shut down.
Pirating
Software
• What it means “When software which has been
duplicated and distributed without authorization”
Examples
• The Pirate Bay
• The Pirate Bay is a online site run by the Swedish and is
basically a shop for any software like movies or games
for free
• As nice as it would be to do this it is illegal even though
it is the only way to get the item sometimes
Creating
Viruses
• What it means “Making a software program capable of
reproducing itself and usually capable of causing great
harm to files or other programs on the same computer”
Examples
• A recent example you all should remember is when
North Korea hacked Sony pictures using a virus to
slowly leak out all of Sony’s info
Hacking • What is hacking “Unauthorized use of computer and
network resources.”
Examples
• One that most gamers are sure to remember is when a
group called Lizard squad took down Sony’s
PlayStation network making it unviable to play for a
couple of months
Stealing
Someone’s
Identity
• What it means “ When someone pretends to be someone
else in order to access their personal information such as
social security number, credit card, etc. in order to obtain
resources or benefits. ”
Examples
• There aren't that many examples to go over so instead
here are some ways it is stolen
• Fake websites
• Given away your passwords and email can lead to this
• This can lead to losing who you are, credit cards,
ANYTHING
Copyright
Infringement
• What does copy right infringement mean? “The act of
violating any of a copyright's exclusive rights given to
them by the federalCopyright Act.”
Examples
• This can be seen I almost anything today but mostly
with mickey mouse.
• The Disney mascot has caused the date for free use of
logos to be extended multiple times
• So no one can use the likeness of mickey mouse
Conclusion • Even though the internet has unlimited possibilities it
doesn't mean we have to do everything
• Sometimes the internet is not fair but it is also very
free
• And lastly if you put something on the internet be
carful its not always safe

More Related Content

What's hot

The Dark Web
The Dark WebThe Dark Web
The Dark Web
Jan Siy
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
Niloy Sikder
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Melissa Pereira
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
Parvez Hossain
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
Michelle Devanny
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman
 
Digital law
Digital lawDigital law
Digital law
Jennifer Carmack
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
Andrew Delamarter
 
digital law
digital lawdigital law
digital law11tsk
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
PeterNBiddle
 
171025 unu-ami
171025 unu-ami171025 unu-ami
171025 unu-ami
Lokman Tsui
 
Deep web
Deep webDeep web
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Andrew Schwabe
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
Nihal Ahmed
 

What's hot (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web & Darknet
Deep web & DarknetDeep web & Darknet
Deep web & Darknet
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Darknet
DarknetDarknet
Darknet
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Digital law
Digital lawDigital law
Digital law
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
digital law
digital lawdigital law
digital law
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Digital law
Digital lawDigital law
Digital law
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
171025 unu-ami
171025 unu-ami171025 unu-ami
171025 unu-ami
 
Digital law
Digital lawDigital law
Digital law
 
Deep web
Deep webDeep web
Deep web
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 

Viewers also liked

Digital Communication
Digital CommunicationDigital Communication
Digital CommunicationSujina Ummar
 
Stb 1122 2010
Stb 1122 2010Stb 1122 2010
Stb 1122 2010
brianthomes841
 
Importantes aspectos de la Arquitectura Colonial Venezolana.
Importantes aspectos de la Arquitectura Colonial Venezolana.Importantes aspectos de la Arquitectura Colonial Venezolana.
Importantes aspectos de la Arquitectura Colonial Venezolana.
valeriaperozo
 
Foreign Relations: Perceived Impact on Kenya’s Development
Foreign Relations: Perceived Impact on Kenya’s DevelopmentForeign Relations: Perceived Impact on Kenya’s Development
Foreign Relations: Perceived Impact on Kenya’s Development
Ipsos
 
Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds  Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds
Commune de Bazoges en Pareds
 
LINDA HARRISON RESUME 12B
LINDA HARRISON  RESUME  12BLINDA HARRISON  RESUME  12B
LINDA HARRISON RESUME 12BLinda Harrison
 
Ipsos Kenya SPEC poll 17 april 2015
Ipsos Kenya SPEC poll 17 april 2015Ipsos Kenya SPEC poll 17 april 2015
Ipsos Kenya SPEC poll 17 april 2015
Ipsos
 
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
editor1knowledgecuddle
 
Twt merc spring_sale
Twt merc spring_saleTwt merc spring_sale
Twt merc spring_sale
ronnagr
 
Digital Imaging | Photoshop | Assessment Task | Photographic Composition
Digital Imaging | Photoshop | Assessment Task | Photographic CompositionDigital Imaging | Photoshop | Assessment Task | Photographic Composition
Digital Imaging | Photoshop | Assessment Task | Photographic CompositionplC3media
 
Van Haneghan & Harlan design tasks
Van Haneghan & Harlan design tasksVan Haneghan & Harlan design tasks
Van Haneghan & Harlan design tasks
Jessica Harlan
 
Presentation For Taylor Woodrow March 07
Presentation For Taylor Woodrow March 07Presentation For Taylor Woodrow March 07
Presentation For Taylor Woodrow March 07Terry Woods
 
Media evaluation #2
Media evaluation #2Media evaluation #2
Media evaluation #2
Ashleyb125
 
Company manager perfomance appraisal 2
Company manager perfomance appraisal 2Company manager perfomance appraisal 2
Company manager perfomance appraisal 2tonychoper3104
 

Viewers also liked (18)

Digital Communication
Digital CommunicationDigital Communication
Digital Communication
 
Stb 1122 2010
Stb 1122 2010Stb 1122 2010
Stb 1122 2010
 
Importantes aspectos de la Arquitectura Colonial Venezolana.
Importantes aspectos de la Arquitectura Colonial Venezolana.Importantes aspectos de la Arquitectura Colonial Venezolana.
Importantes aspectos de la Arquitectura Colonial Venezolana.
 
Foreign Relations: Perceived Impact on Kenya’s Development
Foreign Relations: Perceived Impact on Kenya’s DevelopmentForeign Relations: Perceived Impact on Kenya’s Development
Foreign Relations: Perceived Impact on Kenya’s Development
 
Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds  Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds
 
Lovasi CV 2015
Lovasi CV 2015Lovasi CV 2015
Lovasi CV 2015
 
LINDA HARRISON RESUME 12B
LINDA HARRISON  RESUME  12BLINDA HARRISON  RESUME  12B
LINDA HARRISON RESUME 12B
 
Ipsos Kenya SPEC poll 17 april 2015
Ipsos Kenya SPEC poll 17 april 2015Ipsos Kenya SPEC poll 17 april 2015
Ipsos Kenya SPEC poll 17 april 2015
 
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
Ultrasonic Treatment to Molten FEM©™ Aluminum Alloy and Effects of Ultrasound...
 
Twt merc spring_sale
Twt merc spring_saleTwt merc spring_sale
Twt merc spring_sale
 
Digital Imaging | Photoshop | Assessment Task | Photographic Composition
Digital Imaging | Photoshop | Assessment Task | Photographic CompositionDigital Imaging | Photoshop | Assessment Task | Photographic Composition
Digital Imaging | Photoshop | Assessment Task | Photographic Composition
 
Van Haneghan & Harlan design tasks
Van Haneghan & Harlan design tasksVan Haneghan & Harlan design tasks
Van Haneghan & Harlan design tasks
 
chp1-1
chp1-1chp1-1
chp1-1
 
Presentation For Taylor Woodrow March 07
Presentation For Taylor Woodrow March 07Presentation For Taylor Woodrow March 07
Presentation For Taylor Woodrow March 07
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Media evaluation #2
Media evaluation #2Media evaluation #2
Media evaluation #2
 
Company manager perfomance appraisal 2
Company manager perfomance appraisal 2Company manager perfomance appraisal 2
Company manager perfomance appraisal 2
 
ESTHER-DAVIS
ESTHER-DAVISESTHER-DAVIS
ESTHER-DAVIS
 

Similar to Digital citizenship number 6

Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
nealbd
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
wcudsce
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard
 
Cyber Laws
Cyber LawsCyber Laws
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
Kapil Mehrotra
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 
Doxing
 Doxing Doxing
Doxing
Natesh kumar
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
jung921
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
Bob182003
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 

Similar to Digital citizenship number 6 (20)

Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Muso Publishing
Muso PublishingMuso Publishing
Muso Publishing
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Doxing
 Doxing Doxing
Doxing
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 

Digital citizenship number 6

  • 2. What is Digital Law? • Digital Law is one of the Nine Elements of DigitalCitizenship • In a broad term it is understood as the legal rights and restrictions governing technology use • This basically means downloading illegal music, movies, government secrets, books, locations of nuclear secrets
  • 3. Examples of breaking the Digital law • Illegal File Sharing • Pirating Software • CreatingViruses • Hacking • Stealing Someone’s Identity • Copyright Infringement
  • 4. Illegal File Sharing • What it means “The sharing of files between people using computers connected to the internet” Examples • A great example of this is the case of Mega uploads.This was a file sharing site were people could watch movies andT.V. shows for almost nothing. • However they did this with out the consent of the company's and were shut down.
  • 5. Pirating Software • What it means “When software which has been duplicated and distributed without authorization” Examples • The Pirate Bay • The Pirate Bay is a online site run by the Swedish and is basically a shop for any software like movies or games for free • As nice as it would be to do this it is illegal even though it is the only way to get the item sometimes
  • 6. Creating Viruses • What it means “Making a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer” Examples • A recent example you all should remember is when North Korea hacked Sony pictures using a virus to slowly leak out all of Sony’s info
  • 7. Hacking • What is hacking “Unauthorized use of computer and network resources.” Examples • One that most gamers are sure to remember is when a group called Lizard squad took down Sony’s PlayStation network making it unviable to play for a couple of months
  • 8. Stealing Someone’s Identity • What it means “ When someone pretends to be someone else in order to access their personal information such as social security number, credit card, etc. in order to obtain resources or benefits. ” Examples • There aren't that many examples to go over so instead here are some ways it is stolen • Fake websites • Given away your passwords and email can lead to this • This can lead to losing who you are, credit cards, ANYTHING
  • 9. Copyright Infringement • What does copy right infringement mean? “The act of violating any of a copyright's exclusive rights given to them by the federalCopyright Act.” Examples • This can be seen I almost anything today but mostly with mickey mouse. • The Disney mascot has caused the date for free use of logos to be extended multiple times • So no one can use the likeness of mickey mouse
  • 10. Conclusion • Even though the internet has unlimited possibilities it doesn't mean we have to do everything • Sometimes the internet is not fair but it is also very free • And lastly if you put something on the internet be carful its not always safe