StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Report based on the Aye Choonz music service - Essay Example

Cite this document
Summary
This law paper is answering several question regarding the digital law and trademarks. The case study is given - The Palz Choonz service and his “peer-to-peer” file sharing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Report based on the Aye Choonz music service
Read Text Preview

Extract of sample "Report based on the Aye Choonz music service"

What copyright issues might arise from the Palz Choonz service for users and for the service owners? (25 marks) The Palz Choonz service epitomizes what is known as the “peer-to-peer” file sharing. Users can upload music files from their devices and by connecting to the Aye Choonz system, allow other users to retrieve the file on demand. Users can choose the music to make available and can also obtain electronic copies of music that any other person may have chosen to upload to the system. Using the “MP3” technology, music files are duplicated, transferred and stored for efficient reproduction and sound recording in a computer-readable format. The copyright and patent concepts were both included in the Copyright, Designs and Patents Act (CDPA) 1988 (s. 4(1) and.5 A (1)). Under Article 1, (s. 4(a), of the constitution, the DPA secures for a limited time period to Authors and Inventors the exclusive Right to their respective Writing and Discoveries In the case of Napster the Ninth Circuit also held that Napster was not protected under Sony Corp. of America v. Universal City Studio, Inc., “the Betamax case”, because of Napster’s “actual, specific knowledge of direct infringement.” Napster argued that the existing Audio Home Recording Act 9(17 U.S.C. §§1001-10) protected them under the Digital Millennium Copyright Act’s safe harbor clause (17U.S.C § 512). The Ninth Circuit agreed that downloading MP3 files is not covered by the Audio Home Recording Act. In the case of A&M Records, Inc. v. Napster, Inc.: With each request, the system made an additional “reproduction,” and the transmission constituted a “distribution” of the work.1 In conclusion, subscribers of Palz Choonz are committing infringements that can result in legal liability but litigation against a vast number of individuals is obviously problematic; a lawsuit against Aye Choonz service is a more efficient route of either shutting down the system or restructuring it to include royalty payments. Aye Choonz is liable for the misdeeds of its users, and thus liable to “contributory infringement” or “vicarious infringement.”2 And in violation of the Audio Home Recording Act3 or the Digital Millennium Copyright Act.4 (S. 198(1)) 2. What, if any, rights might the Aye Choonz service owners have in their Buy Choonz customer database? (25 marks) Customer database brings about the issue of privacy, which is a complex legal issue. The Electronic Communications Privacy Act is tasked with protecting users. Websites such as Aye Choonz collect significant amounts of personal and identifiable data that can trigger liability risk (s.3 (1, b, i)). Users5 consent to the collections of names, physical or email addresses and credit card information through forms are archived on the site. By Aye Choonz allowing third-party advertiser’s6 access to the database, it means that these organisations can track users’ browsing habits. Using cookies information is collected as a user surfs the web and feeds the information to a web server. The Aye Choonz vendor site will send cookies which are basically an identification number to the client’s computer, where it is stored in a file on the client’s hard drive and serves as a digital identifier tag that notifies Aye Choonz whenever the client re-enters the Buy Choonz site (s.3 (1,c).. According to The Electronic Communication Privacy Act7 sites like Aye Choonz can be liable for allowing commercial organisations to place cookies on users’ hard drives. Aye Choonz can also face the Common-law Privacy tort8 which is a common law doctrine of personal privacy and includes four grounds of tort (s.3 (5, 6)). Mc Veigh V. Cohen, the U.S. Navy obtained personal information from America Online regarding an anonymous user who described himself in his AOL user profile as a gay military officer (McVeigh, 1998) Proponents of online profiling contend that collecting user data allows sites to improve services. Aye Choonz should disclose data sharing with a third party to users even if the data is intended for internal use. Also adopt the opt-out approach, which allows consumers to choose not to allow their data to be shared with third parties or used for marketing purposes. 3. Could any trade mark issues arise from the use of Aye Choonz as a name for the service? (25 marks) When setting up a website, the first step is registering the domain name, www. AyeChoonz.com. A domain name is the unique address that guides a user’s browser to the computer on which a website resides. It has two elements, the top-level domain (TLD) and the second-level domain (SLD). TLD would be the familiar www. AyeChoonz.com and the SLD is the domain name ChoonzNewz. In all the current open gTLDs (.com, .org and .net) must abide by a standard Uniform Domain Name Dispute Resolution Agreement9 most commercial concerns usually occur when similar names are registered as this confuses the customer. The name Aye Choonz can be mistaken for the more established iTunes. That is why the Anticybersquatting Consumer Protection Act was created in November 1999. This Act made it easier for individuals and companies to take over domain names that are confusingly similar to their names or valid trademarks and had to establish that the domain name holder acted in bad faith (Article.21). Microsoft vs. MikeRoweSoft was a legal disagreement between Microsoft and a Canadian student named Mike Rowe over the domain name registered as "MikeRoweSoft.com". Microsoft Corporation saw it as trademark violation because of its phonetic similarity to their trademarked corporate name and demanded that he give up the domain. In 1995, a company acquired the domain name “candyland” and spent a substantial amount advertising adult publications but in 1996 Hasbro planned to offer an internet version of its board game “Candy land”. Hasbro sued and won as it was ruled that the use of “Candyland” in connection to sexually explicit pornographic material tarnished the pure, sweet, wholesome and fun imagery associated with the Hasbro’s “Candyland” trademark[(pg 2) CYBER LAW]. Registering a domain name is often done without any legal representation. Many legal issues arise over trademark and copyright infringement issues. The Uniform Domain Name Dispute Resolution Policy challenges existing domain names (s.55 (a, i)). The trademark owners who own the trademark that are confusingly similar to established brands and the Parties that registered the domain name have no legitimate right or interest to the domain name registered and uses it in bad faith. 4. What must the owners of the Aye Choonz service do to ensure that they comply with data protection law? (25 marks) The data protection laws strike a balance between the rights of individuals to privacy and the ability of service providers (Aye Choonz) to use data for the purposes of their business (s.56 (3)). The Data Protection Act in 1984 introduced basic rules of registration10 for users of data and rights of access to that data for the users to who it related to. These rights and rules were superseded by the Data Protection Act of 1998.11 Aye Choonz are the data controllers, they determine the purposes or manner for which the personal data will be processed and used. Personal data is the information relating to a living individual who can be identified from the data (s.1 (2)). Thus Aye Choonz is obligated to process data fairly and lawfully. The data should only be obtained for lawful and specified purposes. The data should be relevant, adequate and not excessive information of the users (s.1 (2, b)). Section 2(1) (c) of the Data Protection Act, 2003 provides that data “shall be adequate, relevant and not excessive”. In the case of Swan Leisure centre in rathmines vs. a guest12, the complainant said that the guest registration form was too intrusive and this lead to his refused entry to the swimming pool. The registration form contained the usual questions name, address, telephone number email date of birth. But the 2nd page was a list of medical-related questions history of heart disease, respiratory diseases and diabetes which he found to be too personal to share. The increased use of information technology and the internet ensures that data protection remains an important and relevant law (s.19 (1d)) that online businesses are required to comply with. The internet is all about information and the transfer, storage, dissemination and collection of vital information and thus such vital and mostly private and personal data is very delicate and has to be safe guarded by service providers like Aye Choonz13. (Word Count 1566) Bibliography Bednarz, T. & C. Waelde, C., 2009. Keyword advertising and trademarks: fair innovation or free riding? Carey, P., 2009. Data protection: practical guide to UK and EU law. 3rd ed. Oxford: Oxford University Press. Edwards, L. & Waelde, C., eds. Law and the Internet. 3rd ed. Oxford: Hart, pp. 311-334 Hargreaves, I., 2011. Digital opportunity: a review of intellectual property and growth. Retrieved on November 27 2013 from, < http://www.ipo.gov.uk/ipreview-finalreport.pdf> Jones, H. & Benson, C., 2011. Publishing law, 4th ed. Abingdon: Routledge, 2011 MacQueen, H. et al, 2011. Contemporary intellectual property, 2nd ed. Oxford: Oxford University Press Privacy in Electronic Communications Regulations 2003 (SI 2003/2426) (implement the E-Privacy Directive in the UK) Privacy in Electronic Communications Regulations 2011 (SI 2011/1208) (implement the Cookie Directive in the UK). Phillips, J. & A. Firth, 2009. Introduction to intellectual property law. 4th ed. Oxford: Oxford. The Copyright, Designs and Patents Acts 1988. Retrieved on November 27 2013 from, The Copyright and Rights in Databases Regulations 1997. Retrieved on November 27 213 from, Wilson, C., 2009. Domain names and trade marks: an uncomfortable interrelationship. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Report based on the Aye Choonz music service Essay”, n.d.)
Retrieved from https://studentshare.org/law/1492772-report-based-on-the-aye-choonz-music-service
(Report Based on the Aye Choonz Music Service Essay)
https://studentshare.org/law/1492772-report-based-on-the-aye-choonz-music-service.
“Report Based on the Aye Choonz Music Service Essay”, n.d. https://studentshare.org/law/1492772-report-based-on-the-aye-choonz-music-service.
  • Cited: 0 times

CHECK THESE SAMPLES OF Report based on the Aye Choonz music service

Decision Support System

These decisions that customers make are based on several factors that attract them.... This report "Decision Support System" discusses information system that would support decision making for both the Hydraul Holding Company (the franchisor) and the franchisees.... At the moment there is no section in place to capture customer feedback....
8 Pages (2000 words) Report

Networking Capabilities of the Garmin GNS 430/530 Avionics System

This report ''Networking Capabilities of the Garmin GNS 430/530 Avionics System'' will explore the operation of the Garmin GNS 430/530 as a communication device in the airplane industry and other fields.... It gives a brief history of The GNS 430 as well as its predecessors in the industry.... nbsp;… The report will then discuss the hardware installations of the GNS and how they were vital for its success in the past years as a communication device....
7 Pages (1750 words) Report

Advanced Web Design

In this report, the experience of developing the RS Holiday House website is reflected and based on the skill areas learned in the workshop sessions.... The paper "Advanced Web Design" presents a detailed analysis of web-based application development and implementation, some aspects of the development of a web site for the RS Holiday House.... Planning The process of web development varies from developing the easiest static pages with plain text to the highly complex web based electronic businesses, social network website or Internet applications (Alexander, 2009), (Shelly, Cashman, & Vermaat, 2005), and (Shelly, Cashman, & Vermaat, 2005)....
7 Pages (1750 words) Report

Health and Well-being of Individuals in a Residential Childcare Setting

This paper ''Public Health'' tells that As defined by the UK Department of Health, social care is 'helping people live their lives'.... Social care broadly consists of old, disabled, mentally ill or, even people with learning disabilities.... t also includes help provided to children in the absence of their parents and family....
5 Pages (1250 words) Report

The Cloud Computing in Business Security

The paper "The Cloud Computing in Business Security" highlights that concept of cloud computing is generally separated into two sets of models, such as deployment models and service models.... hellip; Generally, one needs to specify whether to use one machine per service or whether to deploy one big machine and several virtual servers.... The second concern arises regarding acquiring the cloud service; the customers might buy it and own it or might rent it from a service provider from a public cloud....
20 Pages (5000 words) Report

Installation and Configuration of an Operating System

Windows's various log-based tools include event viewer and Event Log service, Performance Data Log service and Performance Alerts and Logs.... Basic operating system monitoring tools are classified into log-based tools and real-time tools.... Log-based tools record the performance information meant for analyzing, post-processing and finding trends in the operating system.... System activity reporter and CPUstat are the only log-based tools found in UNIX....
5 Pages (1250 words) Report

Network Security in the Organization

hellip; Antispoofing ACLs provide traffic filtering of source addresses from the service provider's own address space.... By filtering out packets with the source address ranges belonging to the internal IP space, a service provider provides the basis for per-service source-based ACL deployment (such as SNMP access lists or vty access classes).... Users must have an Internet service Provider that lets them dial into a SLIP/PPP server....
10 Pages (2500 words) Report

An Incident with One of the Fire and Rescue Service in the Community

This report "An Incident with One of the Fire and Rescue service in the Community" discusses Work-Based Learning (WBL) that enables the students to learn a variety of skills by going beyond classroom walls to practice the skills in the community.... The study entails the report of an incident with one of the fire and rescue service in the community....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us