Seminar 7

You might also like

You are on page 1of 4
Intellectual property sht infringement = Reggiano is a record company cutive internet users exchange music over the aceenet by uploading and downloading files from cach other's waters. They call this file swapping, or file sharing, but if the sites have not miade agreements with copyright holders to da this, it’s just thet. These people are infringing our copyright. We need to be able to continue ta sel] our content — our music ~ if we are going to pay royalties to the performers ~ its reators — and make a profit and stay in business, We need to find ways of fightin people swap music illegally. Technical advances mean that content providers like record and film companies face 2 big challenge through copyright theft such as this. Their assets ~ music, films, ete, — are their intelleerual property. The companies can only be profitable if these assets are protected.” pirate sites wher hnical protection “The problem is that everything on che Internet is in digitized form — the lat computers and the Internet. In the past, copying, for example from records onto tape, meant a logs of quality. But now, people can make pericet copies of music or films and there is no loss of quality. We want ro find technical means of encryption so that records and ims cannor be copied. We are working wich equipment manutacturers art z system of electronic or digital watermarks ~ technical means to identity the source of all macerial Bur of course, there will always be people who find ways of breaking this encryption = our defences will have to become more and more technically advanced.” (See Unit 29) Note; Another form of ‘digitized is ‘digitalized Ll protection ‘We want a system of digital rights management t@ make sure that people pay for the music they listen to and the films that they warch. We want total copyright protection for all our products, whereby we receive payment tor all use of aur property. We might consider licensing — giving the right to people co distribute our music over the Internet in exchange for payment. We want to fight any id at a record or film can be “free™.” 1 Compleve the extracts irom two letters with expressions from A opposite, 1 Peaple don't want the hassle of going to a record shop and buying rocords, The music industry, in Europe al least, has been very slow to set up its own downloud sites. Ir it did this, the (1) ..... — the only w! ‘other ways of making money from its (3)... ipa etic i music legitimarely on the Internet rather than illegally would be less attractive. available to others without the consent of its (4) is _--- theft and illegal; second, there isa growing number of ways t access are y of making money for musicians, The music industry should start thinking of and third, (6) Sharing, services threaten the future of a music sector that employs hundreds of thousands of people. | Which lester was written by an opponent and which by a supporter of free downloading of music? March the two parts of these sentences containing expressions from B and C opposite. 1 By reducing the copyright protection for music software, hnology is catching up with the problem of identifying recordings, and we are 3 In the future, movies are likely to be shot on film 4 We know a lor abour digital rights management 5 When e-shopping, look for traders with an encryption facility to make credit card details secur 6 Picsel’s revenue will come trom licensing, POs k One mas a this technology to other compani and we will be looking to share whar we've learned with other file-swapping sites However, remember that not all encryption offers the same security. developing ‘digital watermarks’ giving unique identification to a piece of software or picrare. the court's ruling weakens the incentives for creative innov and later digitized for distribution, Internet security mar Melissa Vorster is a consultant on Internet security: k and defence ‘Lwork with companies w uy to prevent hackers from penetrating their computer systems in order to steal or destroy the information on them, Hackers are people who may write programs designed to overload an organization's system with requests for information so that users cannot access it. We calf this a denial of service attack, and it causes huge inconvenience for customers and lost business for companies, Another problem is viruses. A virus is a small program designed to make computers misfunetion, despite the Firewalls and anti-virus programs that ‘we install as the technical defences against chom.” “Some companies that 1 work with sell goods and services over the Internet and need 10 reassure their customers that theit credit card details are safe and will nor be stolen by hackers. Credit card derails and other confidential information to be transmitted is encrypted, or coded, so that it cannot be read by others. Companics that sell en the Inrerner will display the level of encryption thar users of their site benefit from. This is defence against one form of eybercrime — criminal activity on the Interne BRS Privacy and confidentiality “When someone uses the Internet, they leave an electronic trail, a record of the sites they visit, and if they buy something, their personal devails. This ra confidentiality. Who should have che right to access and analyze this information? This is all part of the dehate abour the powers of surveillance (the powers to watch and examine the activities Of private individuals) that law enforcement agencies, such as the police, should have, Cricies eall this snooping, and there are big issnes of human rights Jaw and civil liberties at stake because these are freedoms that ordinary people should he able to enjoy

You might also like