SlideShare a Scribd company logo
Legal Issues in Technology
Kobie Jones
Background
 The constant development of technology has made it easier to use and easier
for more and more people to access. With technology there are many legal
and ethical issues, one crucial issue being personal privacy.
Objectives
 Describe privacy
 Explain copyright
 Explain netiquette
 Describe bullying
 Explain fair use
 Assistive technology
Privacy
 With personal information of an individual being more accessible due to
advancement in technology, an individuals name, phone number and other
information can be retrieved from other individuals without the users
permission because the user provided the information that was gathered.
Copyright
 Copyright is a type of intellectual property that gives its owner the exclusive
right to make copies of a creative work for a limited time.
 Copyright was created to protect creators from getting their creative work
copied or used by another individual claiming it to be their own.
Netiquette
 Net=internet
 Etiquette=good behavior
 Netiquette is what is appropriate for the internet
 Bad netiquette can lead to different consequences, whether it be from a
media platform itself or another individual viewing your poor choices.
Cyberbullying
 Cyberbullying is increasingly becoming more and more among internet users.
The technology allows people to be able connect with others in an instances
and cyberbullying occurs amongst those who use the internet.
 Cyberbullying is against the law and can be punished harshly by the police.
Fair Use
 Fair use is a law that says, under the principles of fair use, it is possible to use
copyrighted material without authorization.
 The law allows limited use of the copyrighted material.
Assistive technology
 Technology is something that should be allowed to everyone. It is important
that special technology uses be developed so that they can help close the gap
between learning for disability students.
 There are also many laws for special education
Thank you!
 Kobie jones

More Related Content

What's hot

Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
Froilan Cantillo
 
Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptx
Froilan Cantillo
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
kerjait
 
E business and e-commerce
E business and e-commerceE business and e-commerce
E business and e-commerce
devangsavalia
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sabiha M
 
Lecture-2(2): Number System & Conversion
Lecture-2(2): Number System & ConversionLecture-2(2): Number System & Conversion
Lecture-2(2): Number System & Conversion
Mubashir Ali
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
Rammel1
 
Booth's algorithm part 1
Booth's algorithm part 1Booth's algorithm part 1
Booth's algorithm part 1
babuece
 
Binary codes
Binary codesBinary codes
Binary codes
ZareenRauf1
 
MULTIPLEXER
MULTIPLEXERMULTIPLEXER
MULTIPLEXER
Siddhi Shrivas
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Shawn Tuma
 
Information Technology
Information TechnologyInformation Technology
Information Technology
arhyel gerald
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
mailyn0729
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
MD. Badiuzzaman Bodi
 
Computer Engineer Powerpoint
Computer Engineer PowerpointComputer Engineer Powerpoint
Computer Engineer Powerpointguest845829
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 

What's hot (20)

Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptx
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
E business and e-commerce
E business and e-commerceE business and e-commerce
E business and e-commerce
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Lecture-2(2): Number System & Conversion
Lecture-2(2): Number System & ConversionLecture-2(2): Number System & Conversion
Lecture-2(2): Number System & Conversion
 
Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
 
Booth's algorithm part 1
Booth's algorithm part 1Booth's algorithm part 1
Booth's algorithm part 1
 
Binary codes
Binary codesBinary codes
Binary codes
 
MULTIPLEXER
MULTIPLEXERMULTIPLEXER
MULTIPLEXER
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in LearningAdvantages, disadvantages and limitations of Computer and Multimedia in Learning
Advantages, disadvantages and limitations of Computer and Multimedia in Learning
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Computer Engineer Powerpoint
Computer Engineer PowerpointComputer Engineer Powerpoint
Computer Engineer Powerpoint
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 

Similar to Legal issues in technology

PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
amrit47
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power pointstephanieprovitt
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power pointstephanieprovitt
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
Digvijay Naruka
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 
MIL 7.ppt
MIL 7.pptMIL 7.ppt
MIL 7.ppt
Nelson Vergara
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
AlyssaSingleterry
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
isaacmendoza76
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiplarkinsa
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
guest5cb43a
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest762e907
 
Digi teen
Digi teenDigi teen
Digi teen13aaa
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
ICCNS
 
Legal issues
Legal issuesLegal issues
Legal issues
DecardoDay
 

Similar to Legal issues in technology (20)

PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docxPROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
PROPERTY PROTECTION ISSUESThe ability to link computers through th.docx
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
MIL 7.ppt
MIL 7.pptMIL 7.ppt
MIL 7.ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Digi teen
Digi teenDigi teen
Digi teen
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

More from KobieJones1

Assignment 6 ppt
Assignment 6 pptAssignment 6 ppt
Assignment 6 ppt
KobieJones1
 
Assignment 5 ppt
Assignment 5 pptAssignment 5 ppt
Assignment 5 ppt
KobieJones1
 
Designing and conducting formative evaluations
Designing and conducting formative  evaluationsDesigning and conducting formative  evaluations
Designing and conducting formative evaluations
KobieJones1
 
Designing and conducting summative evaluations
Designing and conducting summative evaluationsDesigning and conducting summative evaluations
Designing and conducting summative evaluations
KobieJones1
 
Revising instructional material
Revising instructional materialRevising instructional material
Revising instructional material
KobieJones1
 
Technologies for distance education
Technologies for distance educationTechnologies for distance education
Technologies for distance education
KobieJones1
 
Foundations of distance education
Foundations of distance educationFoundations of distance education
Foundations of distance education
KobieJones1
 
Distance Technologies
Distance Technologies Distance Technologies
Distance Technologies
KobieJones1
 

More from KobieJones1 (8)

Assignment 6 ppt
Assignment 6 pptAssignment 6 ppt
Assignment 6 ppt
 
Assignment 5 ppt
Assignment 5 pptAssignment 5 ppt
Assignment 5 ppt
 
Designing and conducting formative evaluations
Designing and conducting formative  evaluationsDesigning and conducting formative  evaluations
Designing and conducting formative evaluations
 
Designing and conducting summative evaluations
Designing and conducting summative evaluationsDesigning and conducting summative evaluations
Designing and conducting summative evaluations
 
Revising instructional material
Revising instructional materialRevising instructional material
Revising instructional material
 
Technologies for distance education
Technologies for distance educationTechnologies for distance education
Technologies for distance education
 
Foundations of distance education
Foundations of distance educationFoundations of distance education
Foundations of distance education
 
Distance Technologies
Distance Technologies Distance Technologies
Distance Technologies
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Legal issues in technology

  • 1. Legal Issues in Technology Kobie Jones
  • 2. Background  The constant development of technology has made it easier to use and easier for more and more people to access. With technology there are many legal and ethical issues, one crucial issue being personal privacy.
  • 3. Objectives  Describe privacy  Explain copyright  Explain netiquette  Describe bullying  Explain fair use  Assistive technology
  • 4. Privacy  With personal information of an individual being more accessible due to advancement in technology, an individuals name, phone number and other information can be retrieved from other individuals without the users permission because the user provided the information that was gathered.
  • 5. Copyright  Copyright is a type of intellectual property that gives its owner the exclusive right to make copies of a creative work for a limited time.  Copyright was created to protect creators from getting their creative work copied or used by another individual claiming it to be their own.
  • 6. Netiquette  Net=internet  Etiquette=good behavior  Netiquette is what is appropriate for the internet  Bad netiquette can lead to different consequences, whether it be from a media platform itself or another individual viewing your poor choices.
  • 7. Cyberbullying  Cyberbullying is increasingly becoming more and more among internet users. The technology allows people to be able connect with others in an instances and cyberbullying occurs amongst those who use the internet.  Cyberbullying is against the law and can be punished harshly by the police.
  • 8. Fair Use  Fair use is a law that says, under the principles of fair use, it is possible to use copyrighted material without authorization.  The law allows limited use of the copyrighted material.
  • 9. Assistive technology  Technology is something that should be allowed to everyone. It is important that special technology uses be developed so that they can help close the gap between learning for disability students.  There are also many laws for special education