Booklet 1
Issue
Peer
to Peer file sharing of copyrighted materials
Description
Improved capabilities of the internet now
enable people to share files with one another. This raises the issue as to
whether it is right to engage in such activities given the fact that much of
the sharing involve the reproduction of materials that would normally attract
copyright infringement if the authorization of the copyright holder is not
sought.
Laws
pertaining to the issue
Under
copyright law, the reproduction of copyrighted material gives rise to a
liability. The claimant only needs to show that the infringing material is
fixed in some medium. This test is relatively easy to establish given that the
files people share online are fixed in the hard disks as well as the random
access memory (RAM) of the computer.
How
the issue could affect me
I am a
regular user of various file sharing software platforms. For instance, I
subscribe to 4shared.com which allows me to view and share files with many
other people. It is possible that the activities we engage in could be
infringing on the copyright of others.
Example
of a situation
I have
once received a book in pdf format indicating that any distribution should be
done only with the permission of the author.
Possible
legal or ethical solution
It
would be appropriate to just respect the notice not to distribute the document
to third parties or seek the permission of the authors if I have to make a
distribution.
Booklet 2
Issue
Hackers
who steal credit card information
Brief
description
This
involves people who use a variety of methods to get confidential information on
credit cards of other people. Such information may include the passwords of
cardholders which enables them to transact with those cards.
Laws
pertaining to the issue
Under Title 18 of the United States Code, the
interception and disclosure of wire, oral or electronic communication is
prohibited. It also criminalizes unlawful access to stored communication.
How
the issue could affect me
As a regular user of credit cards for making
payments, I am open to the risk that someone can get access to confidential
information on my card details. That person could be my trusted friends, a con
artist or even an employee of the credit card company.
Example
of a situation
I once lost my credit card and was so
apprehensive that someone could use it to make payments. This was, however, not
the case.
Possible
legal or ethical solution
Report
the loss as soon as possible to the credit card company given that any
investigations by the authorities will have to involve the company.
Booklet 3
Issue
Employee email monitoring
Brief
Description
With
the use of computers in the workplace, employers are torn between the need to
monitor the email communication of their employees while in the workplace and
the equally important need to respect the privacy of those employees.
Laws
pertaining to the issue
The
position of the law is that employees do not have any expectation of privacy
when using the computer networks of their employers. It authorizes employers to
monitor email and other communications of employees.
How
the issue affects me
I find
it intimidating knowing that someone has the right to access my email
communications so long as those communications are made through the computer
network of the employer.
Example
of a situation
I often
use the computer network at the workplace for personal email communications. It
is now that I realize how this innocent practice can make my privacy vulnerable
to any review by the employer.
Possible
solution
Given
that the law is mostly on the side of the employer when it comes to this issue,
I would be content to just avoid making personal email communications through
the employer’s network.
Booklet 4
Issue
Use and distribution of customer information
Description
Online
commerce businesses often hold a lot of data on their customers. For instance,
a company like Facebook has so much information on all its users. An issue
arises when these companies decide to sell or distribute such sensitive
information to third parties. Google has occasionally been accused of selling
information to advertising companies.
Laws
pertaining to the issue
The
legal protection for consumer privacy in the internet is rather weak in the
United States. For instance, the Electronic Communication Privacy Act of 1986
allows the government to demand data held by companies such as Google and
Facebook. The Federal Computer Fraud and Abuse Act even makes it more difficult
for consumers as it requires those claiming infringement of their privacy to
show that they have suffered some injury as a result of the violation.
How
the issue affects me
Being a regular user of e-commerce platforms
makes me vulnerable to these schemes.
Example
of a situation
I have
been receiving numerous unsolicited messages on in my email and a suspect that those
sending the messages got my address from the email hosting companies.
Possible
solution
It would just be appropriate to use these
services as minimal as possible since the law is unlikely to offer any help.
0 comments:
Post a Comment