Computer Ethics: Intellectual Property
Computer Ethics: Intellectual Property
Computer Ethics: Intellectual Property
Lecture 5
Intellectual Property
Anonymity
Outline
Is Anonymity Protected?
Against Anonymity
Protecting Access and Innovation
Intellectual Property and Changing Technology
What is Intellectual Property?
Challenges of New Technologies
Copyright law and significant cases
A bit of history
The fair use doctrine
Significant cases
Copying and Sharing
Defensive and Aggressive Responses
The DMCA versus Fair Use, Freedom of Speech and Innovation.
Video Sharing
New Business Models and Constructive Solutions
Ethical Arguments about copying
International Piracy
Anonymity
Some centuries ago writers have used pseudonyms, politicians have chosen to remain
anonymous.
Today, many people use pseudonyms to talk about their private life online
In countries with oppressive government, human rights activists use pseudonyms to
protect themselves.
Send anonymous emails via a remailer service
Who is interested in anonymity?
Individuals protecting from identity theft, consumer profiling and oppressive
governments.
Governments, Secret Agency Services and Businesses, keeping their plans and
projects secret
CIA helped fund an Anonymizer Start-Up company.
Criminal and antisocial purposes, Fraud, harassment and extortion
Used to distribute child pornography, Libel or threaten others etc
Anonymity
Anonymity makes it difficult to track wrongdoers
U.S and E.U ask ISP-s to keep records of the true identity of users and records of online
activity for a certain period of time.
Such requirements are against anonymity. Privacy advocates say such law conflicts
with F.A
More costs on ISP-s for storing the records.
Potential for illegal access
Does the potential for crime by those who want to escape law-enforcement outweigh
the loss of privacy and restraint on freedom of speech for honest people who use
anonymity responsibly?
Direct Censorship is not the only factor who can limit the information that we receive
Businesses use the gov. regulatory power to delay or prevent competition.
Net Neutrality: how telephone companies interact with broadband customers
Common carriers were prohibited from discriminating against content or customers’
identity, providing open-access
Restraints on flexible deals with ISPs or cable TVs reduced incentive for investment in
more and improved broadband capacity.
Protecting Advocates of net-neutrality: the gov. should mandate all telecommunication
companies treat the content passing through them equally.
Access and Two issues:
Innovation Whether companies that provide communications networks should be
permitted to prioritize content based on the meaning or who was its author
Whether companies should offer different levels of services at different prices.
Opponents of Net Neutrality
Neutrality regulations slow the advance of high-speed
internet and infrastructure improvements
Continued investments is necessary for HD video
transmission, online backup services, remote sensors
Supporters of Net Neutrality
Lack of pricing regulation would erode Internet diversity
Only big companies will be able to afford prices
Flexible pricing would give telecom companies too much
power on the content
Anonymity
Is Anonymity Protected?
Outline
Against Anonymity
Protecting Access and Innovation
Intellectual Property and Changing Technology
What is Intellectual Property?
Challenges of New Technologies
Copyright law and significant cases
A bit of history
The fair use doctrine
Significant cases
Copying and Sharing
Defensive and Aggressive Responses
The DMCA versus Fair Use, Freedom of Speech and Innovation.
Video Sharing
New Business Models and Constructive Solutions
Ethical Arguments about copying
International Piracy
What is Intellectual Property?
Creative works such as books, articles, plays, songs, works of
art, movies, software etc. are protected by copyright, a legal
concept that defines rights to intellectual property.
No need to explicitly apply for a copyright
Patent, another legal concept
Trademarks and trade secrets, other forms of intellectual
property
Why is intellectual property given legal protection?
The value of a book, song or computer program is much
more than the cost of printing, putting into a disk or
uploading on the Web.
The value comes from creativity, ideas and research skills.
Both individual and social benefits.
The protected thing is the intangible creative work, not
its particular physical form.
The author of a particular piece of property may hold
the copyright or transfer it to a music, recording
company, movie studio etc.
Copyrights last for a limited time, for ex 70 years. After
that the work belongs to public domain.
The holder has the following exclusive rights:
US
To make copies of the work
To produce derivative works, such as translations
copyright To distribute copies
law
To perform the work in public
To display the work in public
Taking intellectual property by copying is different from theft of physical property,
and copyright law does not prohibit all unauthorized copying and distribution.
Very important exception is the ‘fair use’ doctrine
Facts, ideas, concepts and processes are not copyrightable.
The government grants patents for inventions of devices and processes.
Giving the inventor a monopoly on the invention for a specified period of
time.
Previous technologies raised challenges to intellectual-property
protection.
Challenges of Photocopiers
new
Computers and communication technologies made violations to
intellectual property easier:
MGM vs Grokster
Music and movie industry sued Grokster
Grokster did not provide a centralized server for
storing files, but they provided the software for
sharing the files.
Lower court and appeals court ruled that
distribution of file-sharing software was in
accordance with ‘Fair Usage’, however Supreme
Court ruled that companies could sue the
companies for encouraging of copyright
infringement.
Anonymity
Is Anonymity Protected?
Against Anonymity
Outline
Protecting Access and Innovation
Intellectual Property and Changing Technology
What is Intellectual Property?
Challenges of New Technologies
Copyright law and significant cases
A bit of history
The fair use doctrine
Significant cases
Copying and Sharing
Defensive and Aggressive Responses
The DMCA versus Fair Use, Freedom of Speech and Innovation.
Video Sharing
New Business Models and Constructive Solutions
Ethical Arguments about copying
International Piracy
Copying and Sharing
Unauthorized copying and sharing of music continue at a huge rate on the
Web.
Sales have steadily dropped since 2000.
What is the problem?
To people enjoying movies, the problem is to get them cheaply and
conveniently.
To writers, authors and people working in marketing, the problem is to
ensure that they are paid for the time and effort.
To the entertainment industry, to publishers and software companies the
problem is to protect their investment as expected
To amateurs, the problem is to continue to create without unreasonably
burdensome requirements and threats of lawsuits.
To scholars and advocates: protect intellectual property, but also protect
fair usage.
Copying and Sharing (cont’)
Responses from the Content Industries:
Ideas from the software industries
Expiration dates within the software
Dongles (a device that must be plugged into a
computer port)
Copy protection that prevents copying
Activation or registration codes
Obtained court orders to shut down Internet bulletin
boards and Web sites
Targeted ISP-s, threatening legal action against
those whose subscribers operated file sharing
services.
Sophisticated tools to search billions of Web pages
for copies of specific text, images, sound or video.
Copying and Sharing (cont.)
Responses from the Content Industries (cont.):
Banning, suing and taxing
Ban or delay technology via lawsuits
CD-recording devices
Digital Audio Tapes (DAT)
DVD players
Portable MP3 players
RIAA vs Diamond Multimedia
Rio Machine, a portable device for playing MP3 files.
Require that new technology include copyright protections
The costs of fighting industry lawsuits effectively shut many
companies down.
Tax digital media to compensate the industry for expected losses
Additional taxes to photocopiers, printers and manufacturers of PCs
Copying and Sharing (cont.)
Digital Rights Management :
Collection of techniques that control uses of intellectual property in
digital formats
Includes hardware and software schemes using encryption
The producer of a file has flexibility to specify what a user may do with it
Subscription to sites where a user could listen till a specific number
of songs for a certain fee
Apple, Microsoft and Sony all use different schemes of DRM
Criticism of DRM
It prevents fair uses as well as infringing uses, for ex. Some DRM
protected products do not work on machines running the Linux OS.
Serious disadvantage on content industries. Virtually, all copy-
protection schemes are quickly cracked.
Copying and Sharing (cont.)
International Piracy:
Some countries do not recognize or protect intellectual
property
Counterfeiting of brand name products is common
Countries that have high piracy rates often do not have
a significant software industry
Many countries that have a high amount of piracy are
exporting the pirated copies to countries with strict
copyright laws
Economic sanctions often penalize legitimate
businesses, not those they seek to target
Discussion questions