Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Case Study:

Lab - Digital Milennium Copyright Act: Napster

Review the following case study on the Digital Millennium Copyright Act and Napster.

Napster was a company that used peer-to-peer networking to provide a filesharing service that gave users the ability to share music. The company existed only from June 1999 to July 2001.

In December 1999 the Recording Industry Association of America (RIAA) took legal action against Napster for copyright infringements. RIAA, the plaintiff represented all major record labels in this action.

It claimed that Napster violated "exclusive rights for reproduction and distribution of their copyright works." RIAA claimed that Napster made a "direct" infringement on its copyright and that it was liable for "contributory infringement of the plaintiff's copyright and for "vicarious infringement of the plaintiff's copyright."

The law stopped Napster from continuing its operations is the Digital Millennium Copyright Act that was enacted in 1998. The act addresses treaties signed in 1996 at the World Intellectual Property Organization (WIPO) Geneva conference and it contains other provisions. Software and entertainment
industries supported the law, but many others opposed it, including academics, scientists, and librarians.

Source: Digital Millineum Copyright Act

As cybersecurity manager you are responsible for staying up-to-date with laws that may affect ABC organization legally.

Your CISO has asked you to create a presentation for the next board meeting where you will present information about this act and how it could affect your organization which is a software company that specializes in multimedia applications which can be downloaded or accessed for a subscription via the web. Create a PowerPoint® narration (voice) report of at least 10 slides based on your findings about this law (not including the cover page and reference page).

If you do not own a copy of Microsoft PowerPoint use a comparable slide  software or Google Slides . If your tool does not offer the ability to put audio on the slides utilize another tool to
record the audio portion, i.e., VLC Media or another tool that will allow you to
record .mp3 file format that transitions with the slides.

In the presentation, address the following:

1. Provide the five most important factors about the law.

2. Find something about the law that is a little known fact that directly affects ABC organization which puts the organization at risk.

3. Give information about the following: History of the law ABC's responsibility for complying with this law What is ABC's liability for failing to follow this law

4. Make a recommendation for how ABC can ensure they observe the law especially with their subscription service which is available on the web. Make sure to provide a reference slide that provides APA citations of any sources used in the PowerPoint presentation. This slide does not require narration.

Written Requirements

Your PowerPoint narration presentation should be 10 or more slides in length.

Be sure to use appropriate APA format and cite your Reading or other sources that you used in your presentation.

The presentation should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. 

Remember that the slides will contain summary information of what you provide in your narration. Points deducted from grade for each writing, spelling, or grammar error are at your instructor's discretion.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92774888
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussion 1security support responsibilities please

Discussion : 1. "Security Support Responsibilities" Please respond to the following: • Imagine you are the CIO of an organization. Construct an outline of four ongoing responsibilities that the digital forensics personne ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

Discussion questionchoose one of the questions listed below

Discussion Question Choose one of the questions listed below and respond in your main post, following the instructions below. Reply to two other colleague's posts. 1.- Division of Labor - Chapter 1 Provide an example of ...

Instructionsin this final assignment you will develop a

Instructions In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below. Identify the components of an information ...

Discussion your task is to compare and contrast the

Discussion : Your task is to compare and contrast the different approaches and techniques that can be used to secure both planes (control plane and the management plane) of a Cisco device. Also answer the question of whe ...

College of arts amp sciences cybersecurityuse the computers

College of Arts & Sciences: Cybersecurity Use the Computers & Applied Science database Locate the articles: "The Case for Banning Killer Robots: Point" by Stephen Goose and "The Case for Banning Killer Robots: Counterpoi ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Discussionsearch google scholar for a company school or

Discussion Search "google scholar" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to en ...

Review the building shared services at rr communications

Review the Building Shared Services at RR Communications case study online, and ansswer the below questions. Describe the advantages of a single customer service center for RR Communications. Devise an implementation str ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As