Premium Essay

Is3350 Unit 7 Discussion

In:

Submitted By Hedi
Words 417
Pages 2
Violation of your copyright privileges, and how you feel knowing that thousands of users are simply copying and sharing your composition, for which they might have paid for otherwise. Peer-to-Peer (“P2P”) file sharing is a way of exchanging or transferring files of which you do not have permission to share can have serious consequences.
We have worked hard to compose this new pop song and it is unfair that others are sharing and copying this song without paying for it. We are in the business of entertaining our fans but we are also a business and as such, we rely on the revenues generated from the sales of our music.
• Enabling your case as a consideration in the purview of “fair use” under the law.
Fair use is a concept that allows use of limited portions of a copyrighted work, without the permission of the copyright owner, for purposes such as scholarship, research, and criticism. Fair use does not mean that if you think it's fair that you should be able to use a work, it's okay. Rather, whether a particular use of copyrighted material is a fair use must be judged according to the four criteria in the Copyright Act:
Purpose and character of the use (why do you want to use it?).
Nature of the copyrighted work (what kind of work is it?).
Amount and substantially used (how much do you want to copy?).
Effect on the potential market for or value of the work (will your copying contribute to decreasing the value or demand for the work?). The artist was going to use his song for significant revenue. But considering the fact that the song was "leaked", the artist lost the chance to market his copyrighted song for the anticipated revenue.
• Your feelings about the reduction in your expected income from your creative efforts that you will face due to the unethical and illegal file sharing technology.
All music that is

Similar Documents

Premium Essay

Test

...Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10