SlideShare a Scribd company logo
DIGITAL LAW
LYDIA NEAT & DAIZIA RUDOLPH
WHAT IS DIGITAL LAW??
• The legal rights and restrictions governing technology use.
• Some of the online problems that Digital Law takes care of are
theft, plagiarism, and cyber bullying.
• The four main problems that Digital Law prevents are
copyright, privacy, ethical issues, and piracy.
• Digital Law also makes sure that all web sites abide by certain
laws that have been established.
TYPES OF VIOLATIONS
• Illegal Fire Sharing
• Pirating Software
• Creating Viruses
• Hacking
• Identity theft
• Copyright Infringement
ILLEGAL FIRE SHOOTING
• The sharing of files between people using computers
connected to the internet.
• covers both the making available of the file (uploading), for
instance on a file sharing service.
• Exa. YouTube to MP3 Website, RIAA, File Sharing, &
Downloading copyrighted music
PIRATING SOFTWARE
• When software which has been duplicated and distributed
without authorization.
• Since the 1700s, people have been referring to instances of
copyright infringement as piracy.
• An example being someone who makes multiple copies of a
program and sells the copies.
CREATING VIRUSES
• A software program capable of reproducing itself and of
causing great harm to files or other programs on the same
computer.
• A computer virus might corrupt or delete data on your
computer, use your email program to spread itself to other
computers, or even erase everything on your hard disk.
• Exa. Macro Viruses, Memory Resident Viruses, Overwrite
Viruses, etc.
HACKING
• Unauthorized use of computer and network resources.
• Hacking is the act of modifying computer hardware or software,
in order to cause damage to sensitive data or to simply steal
confidential information.
• Hackers often target home and office computers that are
connected to the Internet.
IDENTITY THEFT
• When someone pretends to be someone else in order to access
their personal information in order to obtain resources or
benefits.
• Exa. Social security number, credit card number,
COPYRIGHT INFRINGEMENT
• The act of violating any of a copyright's exclusive rights given
to them by the federal Copyright Act.
• The copyright holder is typically the work's creator, or a
publisher or other business to whom copyright has been
assigned.
• Motives for copyrighting: Pricing, Unavailability, Usefulness,
Anonymity.
IF YOU VIOLATE
DIGITAL LAWS
• Many people get kicked off of web sites because they are
caught by the "Cyber Police.“
• In some cases people get caught doing other forms of digital
crime such as pirating movies and plagiarism.
• If you are caught committing these crimes, depending on how
bad the crime is, you may face some jail time.

More Related Content

PPTX
Digital law
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
PPTX
Digital law powerpoint
PPTX
Digital law
PPT
digital law
PPT
Digital law
PPTX
Digital law
PPTX
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Digital law
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Digital law powerpoint
Digital law
digital law
Digital law
Digital law
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...

What's hot (19)

PPTX
A Case Study on Issues and Violations on Information Technology
PPTX
Ethics and privacy ppt 3rd period
PPTX
cyber crime & cyber law
PPTX
Digital law pwpt with zach
PPTX
Digital law
PPTX
what is cyber crime and how it started
PPTX
Ethical Issues and Relevant Laws on Computing
PPTX
Introduction to cybercrime
PPTX
Cyber crime ppt for class 9th and 12th
PPTX
Chapter 3
PPTX
Stop in the name of norton
PPTX
Privacy and Freedom of Expression
PPT
Cyber crime faizan project
KEY
Computer crime hacking
PPT
Cyber Crime
PPTX
CST 20363 Session 6 Cyberspace
PPTX
Hacking
PPTX
Cyber Crime
A Case Study on Issues and Violations on Information Technology
Ethics and privacy ppt 3rd period
cyber crime & cyber law
Digital law pwpt with zach
Digital law
what is cyber crime and how it started
Ethical Issues and Relevant Laws on Computing
Introduction to cybercrime
Cyber crime ppt for class 9th and 12th
Chapter 3
Stop in the name of norton
Privacy and Freedom of Expression
Cyber crime faizan project
Computer crime hacking
Cyber Crime
CST 20363 Session 6 Cyberspace
Hacking
Cyber Crime
Ad

Viewers also liked (9)

PPT
Illegal downloading
PPT
Ethics in IT Security
PPTX
Unauthorized access and use
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
PPTX
Chapter 4 Computer Ethics and Security
PPTX
3.2.1 The Internet
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
PPTX
Cyber crime and security ppt
Illegal downloading
Ethics in IT Security
Unauthorized access and use
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Ethics and Security
3.2.1 The Internet
Ethical hacking presentation
Hacking ppt
Cyber crime and security ppt
Ad

Similar to Digital Law Powerpoint (20)

PPTX
Digital law
PPTX
Digital law
PPTX
Digital law
PPTX
Digital citizenship number 6
PPTX
PPT
Computer Ethics and Legal Issues
PPTX
Presentation about the CYBER laws .pptx
PPTX
Awareness Against Cyber Crime
DOCX
Ethical Dilemma/Issues is Cyberworld
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PPTX
MIS 21 Security and Ethical Challenges
PPTX
Chapter 1
PPTX
Chapter 1
DOCX
Ethical dilemma
PPTX
Digital law
PPTX
Digital law
PPT
Etical and professional issues of computer
PPTX
Legal, Ethical and Societal Issues in Media and Information
PPTX
MIL WEEK 8.pptx
PPTX
Module 8 security and ethical challenges
 
Digital law
Digital law
Digital law
Digital citizenship number 6
Computer Ethics and Legal Issues
Presentation about the CYBER laws .pptx
Awareness Against Cyber Crime
Ethical Dilemma/Issues is Cyberworld
Chapter 5 - Digital Security, Ethics, Privacy.pptx
MIS 21 Security and Ethical Challenges
Chapter 1
Chapter 1
Ethical dilemma
Digital law
Digital law
Etical and professional issues of computer
Legal, Ethical and Societal Issues in Media and Information
MIL WEEK 8.pptx
Module 8 security and ethical challenges
 

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Business Ethics Teaching Materials for college
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharma ospi slides which help in ospi learning
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Pre independence Education in Inndia.pdf
Week 4 Term 3 Study Techniques revisited.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Business Ethics Teaching Materials for college
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Anesthesia in Laparoscopic Surgery in India
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial disease of the cardiovascular and lymphatic systems
Pharma ospi slides which help in ospi learning
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pre independence Education in Inndia.pdf

Digital Law Powerpoint

  • 1. DIGITAL LAW LYDIA NEAT & DAIZIA RUDOLPH
  • 2. WHAT IS DIGITAL LAW?? • The legal rights and restrictions governing technology use. • Some of the online problems that Digital Law takes care of are theft, plagiarism, and cyber bullying. • The four main problems that Digital Law prevents are copyright, privacy, ethical issues, and piracy. • Digital Law also makes sure that all web sites abide by certain laws that have been established.
  • 3. TYPES OF VIOLATIONS • Illegal Fire Sharing • Pirating Software • Creating Viruses • Hacking • Identity theft • Copyright Infringement
  • 4. ILLEGAL FIRE SHOOTING • The sharing of files between people using computers connected to the internet. • covers both the making available of the file (uploading), for instance on a file sharing service. • Exa. YouTube to MP3 Website, RIAA, File Sharing, & Downloading copyrighted music
  • 5. PIRATING SOFTWARE • When software which has been duplicated and distributed without authorization. • Since the 1700s, people have been referring to instances of copyright infringement as piracy. • An example being someone who makes multiple copies of a program and sells the copies.
  • 6. CREATING VIRUSES • A software program capable of reproducing itself and of causing great harm to files or other programs on the same computer. • A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. • Exa. Macro Viruses, Memory Resident Viruses, Overwrite Viruses, etc.
  • 7. HACKING • Unauthorized use of computer and network resources. • Hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data or to simply steal confidential information. • Hackers often target home and office computers that are connected to the Internet.
  • 8. IDENTITY THEFT • When someone pretends to be someone else in order to access their personal information in order to obtain resources or benefits. • Exa. Social security number, credit card number,
  • 9. COPYRIGHT INFRINGEMENT • The act of violating any of a copyright's exclusive rights given to them by the federal Copyright Act. • The copyright holder is typically the work's creator, or a publisher or other business to whom copyright has been assigned. • Motives for copyrighting: Pricing, Unavailability, Usefulness, Anonymity.
  • 10. IF YOU VIOLATE DIGITAL LAWS • Many people get kicked off of web sites because they are caught by the "Cyber Police.“ • In some cases people get caught doing other forms of digital crime such as pirating movies and plagiarism. • If you are caught committing these crimes, depending on how bad the crime is, you may face some jail time.