[JA] US-CERT Cyber Security Tip ST05-004 -- Avoiding Copyright Infringement

  • From: "David F. Wooledge" <wooledge001@xxxxxxxx>
  • To: "@freelistts PCTechTalk" <pctechtalk@xxxxxxxxxxxxx>, accmail Juno <juno_accmail@xxxxxxxxxxxxx>
  • Date: Thu, 17 Feb 2005 20:26:02 -0800 (PST)

US-CERT Security Tips <security-tips@xxxxxxxxxxx> wrote:Date: Wed, 16 Feb 2005 
12:56:12 -0500
From: US-CERT Security Tips 
To: security-tips@xxxxxxxxxxx
Subject: US-CERT Cyber Security Tip ST05-004 -- Avoiding Copyright Infringement 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Cyber Security Tip ST05-004 
Avoiding Copyright Infringement

Although copyright may seem to be a purely legal issue, using
unauthorized files could have security implications. To avoid
prosecution and minimize the risks to your computer, make sure you
have permission to use any copyrighted information, and only download
authorized files.

How does copyright infringement apply to the internet?

Copyright infringement occurs when you use or distribute information
without permission from the person or organization that owns the legal
rights to the information. Including an image or cartoon on your web
site or in a document, illegally downloading music, and pirating
software are all common copyright violations. While these activities
may seem harmless, they could have serious legal and security
implications.

How do you know if you have permission to use something?

If you find something on a web site that you'd like to use (e.g., a
document, a chart, an application), search for information about
permissions to use, download, redistribute, or reproduce. Most web
sites have a "terms of use" page that explains how you are allowed to
use information from the site (see US-CERT's terms of use for an
example). You can often find a link to this page in the site's contact
information or privacy policy, or at the bottom of the page that
contains the information you are interested in using.

There may be restrictions based on the purpose, method, and audience.
You may also have to adhere to specific conditions about how much
information you are allowed to use or how the information is presented
and attributed. Consider whether the individual or organization that
operates the web site has the legal authority to give you permission
to use the item--if they did not produce the item, they can't give you
permission to use it because they don't hold the copyright. If you
can't locate the terms of use, or if it seems unclear, contact the
individual or organization that holds the copyright to ask permission.

What consequences could you face?

* Prosecution - When you illegally download, reproduce, or
distribute information, you risk legal action. Penalties may range
from warnings and mandatory removal of all references to costly
fines. Depending on the severity of the crime, jail time may also
be a possibility. To offset their own court costs and the money
they feel they lose because of pirated software, vendors may
increase the prices of their products.
* Malicious copies - Some users knowingly violate copyright by using
sites or networks that allow them to illegally download music and
movies or by making or installing unauthorized copies of software
applications. Attackers could take advantage of these outlets by
including code into a music or movie file or a pirated copy of
software that would infect your computer once it was installed.
Because you wouldn't know the source or identity of the infection
(or maybe that it was even there), you might not be able to easily
identify or remove it. Pirated software with hidden Trojan horses
(see Why is Cyber Security a Problem? for more information) is
often advertised as discounted software in spam email messages
(see Reducing Spam for more information).

References

* U.S. Copyright Office - 
* Copyright on the Internet -

_________________________________________________________________

Author: Mindi McDowell
_________________________________________________________________


This document can also be found at



Copyright 2005 Carnegie Mellon University

Terms of use





-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQhOItBhoSezw4YfQAQJSJwf/QM7iSSl2ZXgjPo8KjNXSY2OyceXbhgrI
IVYfQGGwdBDAANQNtaGk/IrHwB5xTXN13SKPIT02pSXaVJpsEVM9CIoW3PHqhsFV
26HEllDwuFv/DZ8amgbAAUcDAC7gab6+APTWg//Q9F0Se17wkGZYHVlMigmgi61U
+r/4HoF9gQ9hQ5XXrR5Y31NOKuRw5lB1YU1YzpTe5uU2/C1/pFjn4xZR6FcmTgSY
itA1Pi6NbJe7qElQoS5teXN68UsZeIIdxQu+DsidF4uJUM53zeLuva8qZWNVJRsY
vwPdvYWMY8AGLOs3hSwAvDrQzMsDfLaxkd9RirK9wAtr9kYsJA549A==
=AkjD
-----END PGP SIGNATURE-----







To unsubscribe, send a message to ecartis@xxxxxxxxxxxxx with
"unsubscribe juno_accmail" in the body or subject.
OR visit //freelists.org
~*~



Other related posts:

  • » [JA] US-CERT Cyber Security Tip ST05-004 -- Avoiding Copyright Infringement