Intellectual property
sht infringement
= Reggiano is a record company
cutive
internet users exchange music over the
aceenet by uploading and
downloading files from cach other's
waters. They call this file swapping,
or file sharing, but if the sites have not
miade agreements with copyright
holders to da this, it’s just thet. These
people are infringing our copyright. We
need to be able to continue ta sel] our
content — our music ~ if we are going
to pay royalties to the performers ~ its
reators — and make a profit and stay
in business,
We need to find ways of fightin people swap music illegally. Technical
advances mean that content providers like record and film companies face 2 big challenge
through copyright theft such as this. Their assets ~ music, films, ete, — are their intelleerual
property. The companies can only be profitable if these assets are protected.”
pirate sites wher
hnical protection
“The problem is that everything on che Internet is in digitized form — the lat
computers and the Internet. In the past, copying, for example from records onto tape,
meant a logs of quality. But now, people can make pericet copies of music or films and
there is no loss of quality. We want ro find technical means of encryption so that records
and ims cannor be copied. We are working wich equipment manutacturers art z system
of electronic or digital watermarks ~ technical means to identity the source of all macerial
Bur of course, there will always be people who find ways of breaking this encryption =
our defences will have to become more and more technically advanced.” (See Unit 29)
Note; Another form of ‘digitized is ‘digitalized
Ll protection
‘We want a system of digital rights management t@ make sure that
people pay for the music they listen to and the films that they
warch. We want total copyright protection for all our products,
whereby we receive payment tor all use of aur property. We might
consider licensing — giving the right to people co distribute our
music over the Internet in exchange for payment. We want to fight
any id at a record or film can be “free™.”1
Compleve the extracts irom two letters with expressions from A opposite,
1
Peaple don't want the hassle of going to a record shop and buying rocords, The music
industry, in Europe al least, has been very slow to set up its own downloud sites. Ir it did
this, the (1) ..... —
the only w!
‘other ways of making money from its (3)...
ipa etic i
music legitimarely on the Internet rather than illegally
would be less attractive.
available to others without the consent of its (4) is
_--- theft and illegal; second, there isa growing number of ways t access
are
y of making money for musicians, The music industry should start thinking of
and third, (6) Sharing,
services threaten the future of a music sector that employs hundreds of thousands of people. |
Which lester was written by an opponent and which by a supporter of free downloading
of music?
March the two parts of these sentences containing expressions from B and C opposite.
1 By reducing the copyright protection for
music software,
hnology is catching up with the
problem of identifying recordings, and
we are
3 In the future, movies are likely to be shot
on film
4 We know a lor abour digital rights
management
5 When e-shopping, look for traders with
an encryption facility to make credit card
details secur
6 Picsel’s revenue will come trom licensing,
POs k One mas
a
this technology to other compani
and we will be looking to share whar we've
learned with other file-swapping sites
However, remember that not all encryption
offers the same security.
developing ‘digital watermarks’ giving unique
identification to a piece of software or picrare.
the court's ruling weakens the incentives for
creative innov
and later digitized for distribution,Internet security
mar
Melissa Vorster is a consultant on Internet security:
k and defence
‘Lwork with companies w uy to prevent hackers
from penetrating their computer systems in order
to steal or destroy the information on them,
Hackers are people who may write programs
designed to overload an organization's system with
requests for information so that users cannot
access it. We calf this a denial of service attack, and
it causes huge inconvenience for customers and lost
business for companies,
Another problem is viruses. A virus is a small
program designed to make computers misfunetion,
despite the Firewalls and anti-virus programs that
‘we install as the technical defences against chom.”
“Some companies that 1 work with sell goods and services over the Internet and need 10
reassure their customers that theit credit card details are safe and will nor be stolen by
hackers. Credit card derails and other confidential information to be transmitted is
encrypted, or coded, so that it cannot be read by others. Companics that sell en the
Inrerner will display the level of encryption thar users of their site benefit from.
This is defence against one form of eybercrime — criminal activity on the Interne
BRS Privacy and confidentiality
“When someone uses the Internet, they leave an electronic trail, a record of the sites they
visit, and if they buy something, their personal devails. This ra
confidentiality. Who should have che right to access and analyze this information?
This is all part of the dehate abour the powers of surveillance (the powers to watch and
examine the activities Of private individuals) that law enforcement agencies, such as the
police, should have, Cricies eall this snooping, and there are big issnes of human rights
Jaw and civil liberties at stake because these are freedoms that ordinary people should he
able to enjoy