1. Why did TPB believe it was not violating copyright laws? What did the Swedish court rule?
They stated that TPB was a search engine providing search services, such as Google or Yahoo do. They claimed that they were not responsible of the content that the users searched and downloaded. The Swedish court declared that the founder were guilty of violating the copyright policies, and sentenced them to one year in prison and a payment of $3.5 million.
2. How has TPB managed to continue operating despite being fraud in violation of copyright laws?
TPB was able to appeal the courts and none of them had to go to jail or make the payment. They use more secure locations and made copies of the programs in different countries in case their servers in Sweden are confiscated.
3. How has the music industry reacted to the problems created by pirates like TPB?
The music industry has taken several actions to prevent piracy cases. However, the industry had to switch its distribution model, since most of the market wanted to obtain a digital copy rather than the traditional CD.
1. What basic assumption does the study of ethics make about individuals?
Is the study of the principles that individuals and organizations use to determine if an action is considered right or wrong.
5. Explain why someone with serious medical conditions might be concerned about researching his or her condition online, through medical search engines or pharmaceutical site, for example. What is the one technology that could prevent one’s identity from being revealed?
An individual with a serious medical condition might be concerned of his/her privacy when researching his/her condition online. Cookies could be store on their computers, and insurance companies, for example, will be able to track them. Also, the Web sites that storage their information can sell the information to potential companies interested in these clients.
A good way to prevent this could be to created an anonymous or hide user in order to prevent the tracking of the user’s information.
10. How do safe harbors work? What is the government’s role in them?
Safe private, self-regulated policies that meet the objectives and regulations set by the government. The government should make sure that everyone follows the rule and update the policy to meet the protection needs.
15. Define cyber squatting. How is it different to cyber piracy? What type of intellectual property violation does cybersquatting entail?
Squatting is using someone else’s domain name-trade and makes a profit from its use. Because cyber piracy diverts traffic away from the trade mark and devaluates its value. It violates the intellectual property of the owner of the trademark, which is his or her personal creation.
20. What is the doctrine of “fair use”? Why did the courts decide that Google’s scanning of copyrighted book was a “fair use”?
“Fair use” is a fair use of any copyright material that is copied and “transform” it for specific uses. Because there are not a specific number of pages that can be scanned or copied.
2. Develop a list of privacy protection features that should be present if a Web site is serious about protecting privacy. Then, visit at least four well-known Web sites and examine their privacy policies. Write a report that rates each of the Web site on the criteria you have developed.
· Protection of payment information
· Protection of customer confidential information
· Limit the access of other companies to the customer information
· Do not sell private information to others
Google 7: It is a safe place, but it shares/sells personal information to private companies that will have access/knowledge of your characteristics
Facebook 5: Same case than Google, plus they permit other companies to have access to your personal information such as your profile, messages, friends, etc.
Amazon 8: Secure and private. Their only issue is that they control your behavior too much to offer you more products.