CS 202 MODULE 5 NOTES
CS 202 MODULE 5 NOTES CS 202
Popular in Intro to the Internet
Popular in ComputerScienence
This 2 page Study Guide was uploaded by Kayla Peel on Thursday March 31, 2016. The Study Guide belongs to CS 202 at University of Alabama - Tuscaloosa taught by Ralph E. Hooper in Winter 2016. Since its upload, it has received 20 views. For similar materials see Intro to the Internet in ComputerScienence at University of Alabama - Tuscaloosa.
Reviews for CS 202 MODULE 5 NOTES
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 03/31/16
MODULE 5 NOTES Privacy: being free from intrusion; it is the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. o U.S. privacyprotective laws: legislation designed to protect the private information of U.S. citizens Level of privacy varies greatly, depending on social circumstances and the political and legal positions of the government on privacy issues Identity theft protection act of 2005 o U.S. privacyinvasive laws: legislation that is invasive to individual privacy for a perceived greater good of the country. (Patriot Act) o Surveillance: the close monitoring of behavior through electronic technology such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID o Transparency: when a person, business, organization, or government keeps little to nothing secret from the world – supported by technology such as live streaming, geolocation, and microblogging The U.S. constitution provides no explicit right to privacy o Bill of rights refers to privacy issues (10 amendments) o 1 amendment protects the privacy of belief Intellectual property rights concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information o Intellectual property: a product of the mind or intellect over which the owner holds legal entitlement. Includes ideas and intangible objects such as poetry, stories, music, and new ways of doing things or making things, has a value and is owned by an individual or organization o Copyright: protects the words, music, and other expressions for the life of the copyright holder (+70 years). The fair use doctrine describes when and how copyrighted material can be legally used. The digital millennium copyright act provides global copyright protection o Trademark: protects a unique symbol or word used by a business to identify a product or service. o Trade secret: protects a invention by giving the patent holder a monopoly on the use of the invention for 20 years after the patent application is submitted. Piracy: involves the illegal copying, use, and distribution of digital intellectual property, such as software, music, and movies Plagiarism: involves taking credit for someone else’s intellectual property, typically a written idea, by claiming it as your own Digital rights management (DRM): technology that protects digital forms of intellectual property by restricting the number of devices and applications on which a file can be opened and the number of times that the file can be copied and burned to disks Digital millennium copyright act (DMCA): a U.S. copyright law designed to reduce illegal digital media copying by criminalizing the production, distribution, and use of technology designed to circumvent DRM technology
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'