-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cyber Security Tip ST05-004 Avoiding Copyright Infringement Although copyright may seem to be a purely legal issue, using unauthorized files could have security implications. To avoid prosecution and minimize the risks to your computer, make sure you have permission to use any copyrighted information, and only download authorized files. How does copyright infringement apply to the internet? Copyright infringement occurs when you use or distribute information without permission from the person or organization that owns the legal rights to the information. Including an image or cartoon on your web site or in a document, illegally downloading music, and pirating software are all common copyright violations. While these activities may seem harmless, they could have serious legal and security implications. How do you know if you have permission to use something? If you find something on a web site that you'd like to use (e.g., a document, a chart, an application), search for information about permissions to use, download, redistribute, or reproduce. Most web sites have a "terms of use" page that explains how you are allowed to use information from the site (see US-CERT's terms of use for an example). You can often find a link to this page in the site's contact information or privacy policy, or at the bottom of the page that contains the information you are interested in using. There may be restrictions based on the purpose, method, and audience. You may also have to adhere to specific conditions about how much information you are allowed to use or how the information is presented and attributed. Consider whether the individual or organization that operates the web site has the legal authority to give you permission to use the item--if they did not produce the item, they can't give you permission to use it because they don't hold the copyright. If you can't locate the terms of use, or if it seems unclear, contact the individual or organization that holds the copyright to ask permission. What consequences could you face? * Prosecution - When you illegally download, reproduce, or distribute information, you risk legal action. Penalties may range from warnings and mandatory removal of all references to costly fines. Depending on the severity of the crime, jail time may also be a possibility. To offset their own court costs and the money they feel they lose because of pirated software, vendors may increase the prices of their products. * Malicious copies - Some users knowingly violate copyright by using sites or networks that allow them to illegally download music and movies or by making or installing unauthorized copies of software applications. Attackers could take advantage of these outlets by including code into a music or movie file or a pirated copy of software that would infect your computer once it was installed. Because you wouldn't know the source or identity of the infection (or maybe that it was even there), you might not be able to easily identify or remove it. Pirated software with hidden Trojan horses (see Why is Cyber Security a Problem? for more information) is often advertised as discounted software in spam email messages (see Reducing Spam for more information). References * U.S. Copyright Office - <http://www.copyright.gov/> * Copyright on the Internet - <http://www.fplc.edu/tfield/copynet.htm> _________________________________________________________________ Author: Mindi McDowell _________________________________________________________________ This document can also be found at <http://www.us-cert.gov/cas/tips/ST05-004.html> Copyright 2005 Carnegie Mellon University Terms of use <http://www.us-cert.gov/legal.html> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQhOItBhoSezw4YfQAQJSJwf/QM7iSSl2ZXgjPo8KjNXSY2OyceXbhgrI IVYfQGGwdBDAANQNtaGk/IrHwB5xTXN13SKPIT02pSXaVJpsEVM9CIoW3PHqhsFV 26HEllDwuFv/DZ8amgbAAUcDAC7gab6+APTWg//Q9F0Se17wkGZYHVlMigmgi61U +r/4HoF9gQ9hQ5XXrR5Y31NOKuRw5lB1YU1YzpTe5uU2/C1/pFjn4xZR6FcmTgSY itA1Pi6NbJe7qElQoS5teXN68UsZeIIdxQu+DsidF4uJUM53zeLuva8qZWNVJRsY vwPdvYWMY8AGLOs3hSwAvDrQzMsDfLaxkd9RirK9wAtr9kYsJA549A== =AkjD -----END PGP SIGNATURE-----