SlideShare a Scribd company logo
Digital Law By: Faisal and Talal
What is digital law ,[object Object]
What are the types of digital law ,[object Object],[object Object],[object Object]
How it is done ,[object Object]
Some Programs used to download music and videos ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some programs that are legal to use ,[object Object],[object Object],[object Object]
Why it is wrong ,[object Object]
How it can be obeyed ,[object Object],[object Object]
consequences ,[object Object],[object Object],[object Object]
The End ,[object Object]

More Related Content

What's hot

Digital law
Digital lawDigital law
Digital law
CAQUES01
 
Digital law
Digital lawDigital law
Digital law
makylahh
 
Digital law
Digital lawDigital law
Digital law
myls69
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Mark Jhon Oxillo
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
Rakshit Sharma
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
Ejiro Ndifereke
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Digital law pwpt with zach
Digital law pwpt with zachDigital law pwpt with zach
Digital law pwpt with zach
BPIER02
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
AlyssaSingleterry
 

What's hot (20)

Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Digital law pwpt with zach
Digital law pwpt with zachDigital law pwpt with zach
Digital law pwpt with zach
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 

Similar to digital law

Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
rockinmole
 
the thing called it
the thing called itthe thing called it
the thing called it
guestf20c29
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
pacificengineer
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
read below.docx
read below.docxread below.docx
read below.docx
write4
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
guest7e8645
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
Bob182003
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
gueste9b89f
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentAltacit Global
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 

Similar to digital law (20)

Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
the thing called it
the thing called itthe thing called it
the thing called it
 
00
0000
00
 
d
dd
d
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Polinter10
Polinter10Polinter10
Polinter10
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
read below.docx
read below.docxread below.docx
read below.docx
 
Privacy
PrivacyPrivacy
Privacy
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Presentation5 powerpint
Presentation5 powerpintPresentation5 powerpint
Presentation5 powerpint
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Chap13
Chap13Chap13
Chap13
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright Matters
 
Copyright
CopyrightCopyright
Copyright
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

digital law