Task:
Application: Copyright and its Various Owner Rights The Internet has facilitated exposure for a multitude of industries, artists, and products. However, inherent challenges exist when attempting to protect ownership. If users have access to someone else’s media and documents, should they be able to copy, modify, or distribute them? This is a crucial question that individuals and legislators are attempting to answer in this digital age. You have just passed the state bar exam and are now officially an attorney. As a reward, the junior partner has assigned you a case. Your client is a popular band named Pixel the Pony. The band’s manager, Hub “The Hippo,” and record producer, Mac “The Meerkat” are in your office. Hub explains that the band’s new single “Pony Express” is being distributed illegally by music lovers on the Internet in mp3 format. He discusses at length the substantial time and costs the band incurred creating this original work. Once he finishes, Mac shows you spreadsheets detailing costs, expenses, and projected profits. She feels that the illegal distribution (via peer-to-peer networks [P2P]) will result in the record label losing significant income. Hub and Mac want the distributions to stop immediately and those responsible held accountable. So far, the record label’s investigators have determined that illegal distribution has occurred in the United States and abroad. For this Assignment, write a 5-page paper in APA format that:
1.Specifies which U.S. intellectual property, digital rights management, and/or property laws apply to this case
2. Enables your case as a consideration in the purview of “fair use” under the law
3. Proposes remedies the law provides for the enlisted violations
4. Addresses how your client’s expected revenues will be adversely impacted
5. Discusses legal remedies that you will be seeking on behalf of your client
6. Briefly addresses possible international jurisdictional problems
This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit’s assigned Learning Resources.
In Unit 8, you will use a variety of resources. This page outlines the resources that you will need to
complete the Assignments.
Optional Resources
• Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
Chapter 14, “Protecting Children on the Internet” (pp. 379–390) This chapter examines pedophiles using the Internet to traffic in child pornography and find new victims, and examines tactics law enforcement can use to address this crime.
• Zeviar-Geese, G. (n.d.). The state of the law on cyberjurisdiction and cybercrime on the Internet. Retrieved from http://www.law.gonzaga.edu/gjil/2006/03/the-state-of-the-law-oncyberjurisdiction- and-cybercrime-on-the-internet/
The post ITEC6630 Computer Law Crime And Investigation appeared first on Homeworkaider.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"