Digital Law Introduction
Digital Law Introduction
Digital Law Introduction
Introduction
Definition: Digital law is the electronic responsibility for actions, deeds which is either
ethical or unethical.
Unethical use manifests itself in form of theft and/or crime. Ethical manifests itself in the
form of abiding by the laws of society. It is basically about what you are and are not allowed
to do while surfing and using the Internet. Everybody should respect the law and abide by it.
Not following the law can result in serious punishment.
The Internet has made it easy to post, locate, and download a vast array of materials. Indeed,
this ability to share information easily is one of the strengths of the Internet. However, users
often do not consider what is appropriate, inappropriate, or even illegal when posting or
accessing information on the Internet. Users often remark, “We did not think it was wrong -
all we were doing was sharing information.” The issues of intellectual property rights and
copyright protection are very real, and have very real consequences for violations.
These issues were brought to the forefront when the Recording Industry Association of
America (RIAA) fined students and others for downloading music illegally (Wired News,
2003). This action caused some technology users to think twice about what is appropriate and
illegal for online file sharing. However, in 2009 a three-year compilation of 16 countries by
the International Federation of the Phonographic Industry (IFPI) found that 95% of music
files were illegally shared (IFPI, 2009). Ironically, a 2003 survey conducted by Ipsos (a
market research company) for Business Software Alliance indicated that twothirds of college
faculty and administrators said it is wrong to download or swap files while less than one-
quarter of students felt the same way (CyberAtlas, 2003).
Essential questions
Are students using technology the way it was intended?
Are students infringing on others’ rights by the way they use technology?
Should students using digital technologies be accountable for how they use digital
technologies?
The new digital technologies are bringing with them a whole new realm of issues that most
likely were not imagined by their creators. Often these issues arise from unforeseen and
unintended uses of the new technology. For example, the issue of sexting (the taking and
sharing of sexually explicit materials, such as nude or semi-nude pictures) has become huge
for teens. If the participant is under the age of 16, this can be considered child pornography
even if the sender is a willing participant or has sent a self-portrait. If this material is received
by a phone (or other device), the person who owns the device can be criminally charged for
just having the material (even if that person didn’t want it in the first place). Whoever sends
the pictures to others can be arrested for the distribution of child pornography (again, even if
underage persons take and send pictures of themselves). Conviction for one of these crimes
can ruin someone’s reputation permanently, and will require that the person register as a sex
offender. Each state and country is different, but many have already passed such laws. Even if
the laws in your area do not yet cover sexting as a crime, the recipients (or sender) may be in
an area where such laws do apply.
There will always be people who do not follow the rules of society and who engage in
activities that run counter to the ideals of society as a whole. In this regard, digital society is
no different. As such, consequences are being established for those who act as inappropriate
digital citizens - users who steal others’ information, hack into servers, create and release
viruses, and so on. As new laws are being drafted, it is important that digital citizens help to
decide how to address these activities as they occur. If members of the digital society do not
provide information to help determine these good-citizenship policies, the laws passed by
politicians will not reflect a good understanding of digital society.
Laws related to technology use are becoming more of an issue for school districts. Even
though issues may occur outside the school walls or not on school computers, the effects may
still need to be addressed during the school day. Administrators need to provide teachers and
students with resources and guidance on what is legal and illegal.
The legal aspects of student technology use can be a major concern for school administrators.
Technology leaders and teachers need to provide resources to help administrators make good
decisions. Likewise, teaching students how to make good choices helps not only the students,
but the school administrators. Students need to realize that what they do today may affect
them in the future.
They also need to determine whether their technology rules and policies are supported legally.
Digital citizenship helps all technology users become more aware of the legal ramifications of
technology use.
IP Spoofing is a technique used to get access to computers, where the intruder sends a
message to a computer with an IP address telling them that the message is coming from a
trusted machine and person. To stop IP Spoofing packet filtering is a programm that blocks
other packets getting into your network. This prevents an outside attacker from gaining access
to an internal machine.
Software Piracy is copying and selling of unauthorized computer software, movies etc. This
happens a lot in the Mexico, China, Indonesia, Russia, Brazil and Zimbabwe but many other
countries are also involved. Most of these countries have Copyright Infringement Laws but
many citizens do not abide by them however some countries are more strict about them than
others.
There are 4 types of software piracy:
Industrial Piracy: An individual or group attempts duplication and distribution on a
large scale for profit.
Corporate Piracy: Unprotected contents are shared through net works such as peer-to-
peer, LAN and Internet.
Reseller Piracy: Involves computer hardware companies selling machines with illegal
copies of software preloaded on their hard drive.
Home Piracy: Includes everything from trading disks with friends to running a not-for-
profit bulletin board for the purpose of illegal software distribution.
Computer hacking is the practice of changing computer hardware and software. People who
are involved with such activities are often called hackers. Since the word “hack” has long
been used to describe someone who is not able to do their job very well. Some hackers claim
this term is offensive, since they are very skilled in their topics. Computer hacking is most
common among teenagers and young adults, although there are many older hackers as well.
Many hackers consider computer hacking an “art” form. They often enjoy programming and
have expert-level skills in one particular program.
Plagiarism
According to the Merriam-Webster online dictionary, to ‘plagiarize’ means:
to steal and pass off (the ideas or words of another) as one’s own
to use (another’s production) without crediting the source
to commit literary theft
to present as new and original an idea or product derived from an existing source.
In other words, plagiarism is an act of fraud. It involves stealing someone else’s work and inclusion of
any idea from someone else without giving due credit by citing and referencing that source in his/her
work.
Copying someone else’s work can have serious consequences. These can be personal or
professional and also legal. Most cases of plagiarism can be avoided, however, by citing
sources. Simply acknowledging that certain material has been borrowed and providing your
audience with the information necessary to find that source is usually enough to prevent
plagiarism.
References
Ribble, M. (2015). Digital Citizenship in Schools: Nine elements all students should know.
3rd ed. ISTE.