r espect others ownership and defend your personal safety

14
RESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY

Upload: virginia-cooper

Post on 27-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

RESPECT OTHERS OWNERSHIP AND DEFEND YOUR PERSONAL SAFETY

Copyright

COPYRIGHTDefinition: Copyright is defined as “right to authorise the use of one’s work in

different ways. It is the permission or the right to copy. The emphasis is not so much on the right to copy but on the right to prevent others from unfairly taking advantage ownership of the original owner of the copyright, who in most cases is the author, composer, artist and sculptor where the work originated.” (N.Krishnasamy, 2006 Pg1)

According to Intellectual Property Corporation of Malaysia, copyright is defined as:

Copyright is the exclusive right given to the owner of a copyright for a specific period. Copyright protection in Malaysia is governed by the Copyright Act 1987. There is no system of registration for copyright in Malaysia. A work that is eligible is protected automatically upon fulfillment of the following conditions:-

sufficient effort has been expected to make the work original in character;

the work has been written down, recorded or reduced to a material form; 

the author is qualified person or the work is made in Malaysia or the work is first published in Malaysia

COPYRIGHT

What does copyright protect? literary works; musical works; artistic works; films; sound recordings; broadcasts; and derivative worksSource: (Intellectual Property Corporation of Malaysia)

What does not copyright protect? The copyright protection shall only extend to expression and not

ideas, procedures, methods of operation or mathematical concepts as such. 

Source: (http://umcic.um.edu.my)

COPYRIGHT What is copyright infringement? Copyright is infringed by any person who, without the consent or licence of the

owner of the copyright, imports an article into Malaysia for the purpose of:

(a) Selling, letting for hire, or by way of trade, offering or exposing for sale or hire, the article;

(b) distributing the article:

(i) for the purpose of trade; or

(ii) for any other purpose to an extent that it will affect prejudicially the owner of the copyright; or

(c) by way of trade, exhibiting the article in public. What could the author do for copyright infringement? The author of copyright has two methods of enforcing his rights. The author

may enforce his or her rights through civil actions or criminal proceedings

Copyright Video- http://www.youtube.com/watch?v=Eu3Vkw46J_0

(Source:http://www.utem.edu.my/crim/download/7copyright.pdf)

SINGER DJ DAVE WINS COPYRIGHT INFRINGEMENT SUIT OVER MERDEKA DO-THE STAR

Identity Theft

IDENTITY THEFT

Identity theft may refer to somebody using another person’s information to gain benefits from the identity of that person.

According to Jeff Lanza, one of the FBI Agent in US, “Identity theft occurs when someone becomes you. What’s the motivation for this surreptitious subrogation? Of course in most cases, it’s financial gain, but perpetrators also use false identities to get a job, to get healthcare, or to commit a different crime.”

Identity theft could be worst into an extent where “personal information can be accessed from your computer or at a public computer terminal. With sufficient information, criminals can make credit card purchases, apply for loans or transfer money directly from your bank, while pretending to be you.” (Source: http://www.cybersmart.gov.au)

Identity Theft Video-http://www.youtube.com/watch?v=g0a6yo2ya3Q

IDENTITY THEFT

Identity theft is always on the news, however cases are often happened although precautions steps are introduced by most of the bank industries. Here are some examples how the identity theft become you:

“While some identity thieves may focus on getting your credit cards and maxing them out before you even realize they're missing, an increasing number are using one piece of information about you -- often a credit card number -- in order to steal your entire identity” (Source: http://www.maybank2u.com.my)

“Watch your personal documents, be careful to whom you give out your data over the phone, and be careful of mail theft.” (Source: http://www.maybank2u.com.my)

“Your identity and personal information are valuable. Criminals can find out your personal details and use them to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driving licenses in your name.” (Source: http://www.identitytheft.org.uk).

“They might steal your wallet or purse. They might snatch your mail. They might invade your trash. They might watch or listen for your personal information while you’re shopping or on your cell phone.” (Source: Jeff Lanza, FBI- http://www.fbi.gov)

HOW TO PROTECT YOURSELF FROM IDENTITY THEFT? Criminals commit identity theft by stealing your personal

information. This is often done by taking documents from your rubbish or by making contact with you and pretending to be from a legitimate organization. (Source: http://www.identitytheft.org.uk)

If a cashier or salesperson takes your card and either turns away from you or takes too long to conduct what is usually a normal transaction, she may be scanning your card into a handheld skimming terminal to harvest the information. (Source: http://www.maybank2u.com.my)

Lock your mailbox and be sure to stop mail when you’re out of town for more than a few days. Shred your trash with a cross cut shredder. Be careful what you say about yourself in public—especially when you’re on your cell phone. You can protect your computer with a fire-wall, anti-virus software, or a program that removes spyware. (Source: Jeff Lanza, FBI- http://www.fbi.gov)

WOMEN DECLARED BANKRUPT CLAIMS IDENTITY THEFT-THE STAR

Do not expose our identity to anyone we do not know. We never know what they will do with our identity.

An identity theft could caused us bought something we never bought, something we never use and something we never ever could even pay for.

REFERENCES

Copyright Intellectual Property Corporation of Malaysia

http://www.myipo.gov.my/en/copyright/generalinformation.html Video for Copyright,

http://www.youtube.com/watch?v=Eu3Vkw46J_0 Symbol for Copyright

http://cinemaowls.wikispaces.com/Copyright+Free+Resources Photo for Copyright

http://laqueesha.glogster.com/copyright/ Article from Nagasvare Krishnasamy

www.abu.org.my/abu/index.cfm/elementid/32480/-Malaysia Singer DJ Dave wins copyright infringement suit over Merdeka

do-The Star

http://thestar.com.my/news/story.asp?file=/2011/8/27/courts/9379462&sec=courts

Identity Theft Women declared bankrupt claims identity theft-The Star

http://thestar.com.my/news/story.asp?file=/2010/1/20/courts/5503644&sec=courts

Article from Identitytheft.org

http://www.identitytheft.org.uk/what-is-identity-theft.asp Article from Mybank2u

http://www.maybank2u.com.my/mbb_info/m2u/public/personalDetai Article from Jeff Lanza, FBI

http://www.fbi.gov/news/stories/2006/august/idtheft_082106 Video for Identity Theft

http://www.youtube.com/watch?v=g0a6yo2ya3Q Article from Cybersmart

http://www.cybersmart.gov.au Picture for Maybank secure login

https://www.maybank2u.com.my/mbb/m2u/common/M2ULogin.do?action=Login

REFERENCES

THANK YOU…

(Source: http://www.1citizen.com.my)