US-CERT Cyber Security Tip ST05-004 -- Avoiding Copyright Infringement

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                        Cyber Security Tip ST05-004 
                      Avoiding Copyright Infringement

   Although copyright may seem to be a purely legal issue, using
   unauthorized files could have security implications. To avoid
   prosecution and minimize the risks to your computer, make sure you
   have permission to use any copyrighted information, and only download
   authorized files.

How does copyright infringement apply to the internet?

   Copyright infringement occurs when you use or distribute information
   without permission from the person or organization that owns the legal
   rights to the information. Including an image or cartoon on your web
   site or in a document, illegally downloading music, and pirating
   software are all common copyright violations. While these activities
   may seem harmless, they could have serious legal and security
   implications.

How do you know if you have permission to use something?

   If you find something on a web site that you'd like to use (e.g., a
   document, a chart, an application), search for information about
   permissions to use, download, redistribute, or reproduce. Most web
   sites have a "terms of use" page that explains how you are allowed to
   use information from the site (see US-CERT's terms of use for an
   example). You can often find a link to this page in the site's contact
   information or privacy policy, or at the bottom of the page that
   contains the information you are interested in using.

   There may be restrictions based on the purpose, method, and audience.
   You may also have to adhere to specific conditions about how much
   information you are allowed to use or how the information is presented
   and attributed. Consider whether the individual or organization that
   operates the web site has the legal authority to give you permission
   to use the item--if they did not produce the item, they can't give you
   permission to use it because they don't hold the copyright. If you
   can't locate the terms of use, or if it seems unclear, contact the
   individual or organization that holds the copyright to ask permission.

What consequences could you face?

     * Prosecution - When you illegally download, reproduce, or
       distribute information, you risk legal action. Penalties may range
       from warnings and mandatory removal of all references to costly
       fines. Depending on the severity of the crime, jail time may also
       be a possibility. To offset their own court costs and the money
       they feel they lose because of pirated software, vendors may
       increase the prices of their products.
     * Malicious copies - Some users knowingly violate copyright by using
       sites or networks that allow them to illegally download music and
       movies or by making or installing unauthorized copies of software
       applications. Attackers could take advantage of these outlets by
       including code into a music or movie file or a pirated copy of
       software that would infect your computer once it was installed.
       Because you wouldn't know the source or identity of the infection
       (or maybe that it was even there), you might not be able to easily
       identify or remove it. Pirated software with hidden Trojan horses
       (see Why is Cyber Security a Problem? for more information) is
       often advertised as discounted software in spam email messages
       (see Reducing Spam for more information).

References

     * U.S. Copyright Office - <http://www.copyright.gov/>
     * Copyright on the Internet -
       <http://www.fplc.edu/tfield/copynet.htm>
     _________________________________________________________________

     Author: Mindi McDowell
     _________________________________________________________________


     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST05-004.html>

     Copyright 2005 Carnegie Mellon University

     Terms of use

     <http://www.us-cert.gov/legal.html>
 
 
 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQhOItBhoSezw4YfQAQJSJwf/QM7iSSl2ZXgjPo8KjNXSY2OyceXbhgrI
IVYfQGGwdBDAANQNtaGk/IrHwB5xTXN13SKPIT02pSXaVJpsEVM9CIoW3PHqhsFV
26HEllDwuFv/DZ8amgbAAUcDAC7gab6+APTWg//Q9F0Se17wkGZYHVlMigmgi61U
+r/4HoF9gQ9hQ5XXrR5Y31NOKuRw5lB1YU1YzpTe5uU2/C1/pFjn4xZR6FcmTgSY
itA1Pi6NbJe7qElQoS5teXN68UsZeIIdxQu+DsidF4uJUM53zeLuva8qZWNVJRsY
vwPdvYWMY8AGLOs3hSwAvDrQzMsDfLaxkd9RirK9wAtr9kYsJA549A==
=AkjD
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux