Copyright and Ethics : Assignment

Added on - 21 Feb 2021

  • 7

    Pages

  • 1535

    Words

  • 8

    Views

  • 0

    Downloads

Trusted by +2 million users,
assist thousands of students everyday
Showing pages 1 to 3 of 7 pages
Copyright and Ethics
Table of ContentsQuestion 1........................................................................................................................................1Question 2........................................................................................................................................1Question 3........................................................................................................................................1Question 4........................................................................................................................................2Question 5........................................................................................................................................2Question 6........................................................................................................................................2Question 7........................................................................................................................................2Question 8........................................................................................................................................3Question 9........................................................................................................................................3Question 10......................................................................................................................................3REFERENCES...............................................................................................................................5
Question 1There exist broad range of information that organisation needs to protect as breach ofcopyright and privacy will lead them to have adverse impact. Basically, they are liable to protectfinancial assets of organisation, strategies related with their future planning, employees andclients information (Coleman, 2012). The reason for this is that if this information is leaked thenintruder can make use of this to have benefits. Along with this, it will create adverse impact onorganisation on the whole in terms of their market share, customers clients as well as on theirimage within the market.Question 2Region DVD codes are referred to digital rights management techniques that areconfigured for allowing right holders for controlling distribution of DVD at international market,it comprises of date, price, content and release date as per specific region. This region coding canbe legitimately decoded by the usage of hardware. They are not expensive like Philips DVDplayer can unlock or decode them in few seconds. Along with this, there are SamsungProgressive Scan DVD player that comes with HD Upconversion with a model number DVD-HD860, Pioneer DV-393-s DVD player (Five area of customer service.2019). Furthermorethere are also certain encoding standards like National Television System Committee (NTSC),Sequential color with memory (SECAM) and Phase alternating line (PAL).Question 3All the images which are present on the Internet generally protected by the copyright asartistic works.There is presence of different type of copyrights depends upon the category of theproduct and service which is going to be protected. So, each category have their differentaspects which are needed to protect so, it is different in nature in respect of all.To use the image needed to follow the process. It includes about taking permission to usephoto, provide credit to creator, ascertain the rules under fair use of copyright and use ofimages with creative commons license.Proper acknowledgement is needed to take from copyright holder and not able to use thesame on the basis of fair use of image1
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document