• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  • Level: GCSE
  • Subject: ICT
  • Document length: 2010 words

Is the UK copyright act of 1988 still an adequate means of protecting intellectual property from infringements such as illegal copying, plagiarism and piracy?

Extracts from this document...

Introduction

Is the UK copyright act of 1988 still an adequate means of protecting intellectual property from infringements such as illegal copying, plagiarism and piracy? "It is difficult for intellectual property laws to keep pace with technology. When technological advances cause ambiguity in the law, courts rely on the law's purposes to resolve that ambiguity. However, when technology gets too far ahead of the law, and it becomes difficult and awkward to apply the old principles, it is time for re-evaluation and change." (Working Group on Intellectual Property Rights (Information Infrastructure Task Force), Intellectual Property and the National Information Infrastructure (Preliminary Draft, July 1, 1994)) The copyright, Designs and Patent Act (CDPA) of 1988 was introduced to give legal protection to the creators of these works in order to prevent exploitation and to ensure their moral rights. The purpose of the CDPA was to protect the following types of work: * Literary Works * Dramatic Works * Artistic Works * Musical Works * Films * Broadcasts * Published Edition * Performers' Rights Whilst the CDPA theoretically protects certain technological plagiarism through Section 107 of the Act which states that where an individual sells, hires, exhibits, or distributes an infringing copy of ...read more.

Middle

site, thereby altering his or her perception of the material. The controversial nature and threat to copyright of this feature was seen in the Washington Post Co. v. Total News case. * Ease of Plagiarism and illegal copying Although the UK Copyright Act of 1988 protects Musical/Artistical works and the rights of performers, technology has once again outdated this feature of the act as well. The introduction of uploading software, CD copiers and file formats such as MP3 and AIV have meant that these works are no longer protected. This point was perhaps best highlighted in the recent court case between Napster.com and the Recording Industry Association of America (RIAA) which branded Napster a "copyright infringement machine" (3). However whilst Napster has now been shutdown, nevertheless it acted as a catalyst to many other "sharing communities" like itself such as aimster.com, imesh.com and mp3.com. Similarly this approach to illegal copying is not merely limited to music files and is extended to movies and software. This is as a result costing the entertainment industry and software companies amongst other, billions of dollars out of pocket. ...read more.

Conclusion

In contrast such a dual method will mean every country will have two sovereigns governing different areas of law. This would create vast grey areas between them that could render the proposal ineffective. Conclusion To conclude, the UK Copyright Act of 1988 was adequate at the time of design. However in the thirteen years since its design, Technology has come forward leaps and bounds. As a result this act that was initially designed mainly for the purpose of non electronic sources has now become out of date or is being largely ignored due to the growth of technology. However when incorporating any solutions to the current inadequacies, it is vital to realise that whilst the rights of copyright owners are an important component of the copyright equation, so are the rights of public for information dissemination, freedom of expression and informational privacy. As a result looking into the future, the government needs to re-evaluate the interests of all those involved and legislate towards a new more flexible copyright framework, suitable for the digital age. Similarly, due to the global nature of digital technology with no geographical boundaries, perhaps a more suitable solution would be to incorporate such a framework into a "cyberlaw". Marwan Nawaz Word Count: 2006 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    Often prospective employers would require a prospective employee to provide a copy of the prospective employee's police record as a condition of obtaining employment. Subject to some exemptions, the prospective employer can no longer force the individual to provide a copy of that record.

  2. Data Protection Act

    relevant exemption applies):- - The data subject has given his consent to the processing - The processing is necessary - a) For the performance of a contract to which the data subject is a party; or b) For the taking of steps at the request of the data subject with a view to entering into a contract.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Highly sophisticated encryption shall be needed for the data which are crucial and important. Therefore not all data will need to be highly secured and is something that should be mentioned in this specific law. Overall, I strongly believe that the pros prevail over the cons because the law keeps

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Basically, it aims to act against hackers and viruses which cause problems and try to access data which belongs to someone else. With the advancement of technology, the previous laws in regards of hacking and viruses soon became insufficient. As the internet and computer use expanded, people became more prone to hacking and viruses.

  1. Data Protection Act

    1. Name 2. Phone Number 3. Address 4. Age 5. E-mail (if applicable) This is so that people who join don't have to give out extra unnecessary information to blockbuster. This is to protect their privacy and this will encourage more people to join. This law effects blockbuster all the time and if a worker was

  2. Leaflet design for Finding Nemo.

    3. 4. 5. 6. (Poster) Research I looked for graphics on the Internet. I used a programme called google, as mentioned above, to act as my search engine to find the pictures I needed. I typed in Finding Nemo on the images section, and it came up with a

  1. Privacy and Data Protection: IT Law

    Overview of the transposition in the member states Concerning the 1995 Directive, implementation was a slow process. The Commission had to act against some of the member states before the Court to force them to implement the Directive23. The first report from the Commission on the implementation of the

  2. Copyright - what it means

    message they did not write! One web site confidently asserts that all list owners must approve before email can be forwarded. Yet, absent rules governing particular lists, I am unaware of any legal basis for it. Why would the power of approval be implicitly given to list owners?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work