Digital Property

From SI410
Revision as of 15:15, 12 April 2019 by Joanliu (Talk | contribs)

Jump to: navigation, search
An Expanding Digital Property Network [1]

Digital Property; or digital assets, consists of all data and information owned by someone in digital form. This pertains to anything that can be stored on computers either on personal hard drives or circulating around the internet. Digital property ranges from word documents, emails, and code files, to photos, videos, audio attachments. This variety in digital property gets even more complicated when attempting to categorize the data into physical property within files or intellectual property of the ideas running throughout the objects. What makes digital property the most non-comformative in nature is its lack of solid presence that is typical of personal property. This makes it difficult to track, monitor, and protect digital property.

An Expanding Empire of Digital Property

The digital world is expanding at an unprecedented speed as individuals and businesses move towards the trend of greater online presence. In other words, information is being commercialized and distributed in mass. The improved user convenience and organization characterized by digitalizing information is accelerating this movement. This means that everyone is storing more data digitally, and the global digital property content is multiplying. Humanity is interacting with digital technologies at an exponential rate, leading some to argue that it can be difficult to differentiate between online and offline personas[2]. It is contested that the the once strictly digital cyber space is now an indistinguishable part of humanity's natural modern environment[2]. With this trend of greater online interaction and content capacity comes the necessity for greater cultural and legislative change accordingly.

Legislation Regarding Digital Property

The United States prides itself in supporting creativity and innovation to enact progress. Therefore, protection of intellectual property is treated as a fundamental right and is highlighted in the constitution. In Article 1, Section 8, Clause 8 it states that Congress has the power to “promote the Progress of Science and Useful arts, by securing, for limited Times, to Authors and Investors, the exclusive Right to their respective Writings and Discoveries”. [3] There was no way for the Founding Fathers to have predicted the digital age we have today in the 21st century, therefore digital property is not mentioned specifically in the constitution. However, they did account for intellectual property protection which was later developed into a system of patents, copyright, and trademark rights and laws. Despite these barriers put in place to protect innovators and promote advancements, the complications of the digital property off-shoot from traditional works skews the property protection process further.

Currently the European Union is working to coordinate the protection of intellectual property with technology in light of the increasingly digital age we live in. The United States is also attempting to create legal structure to protect intellectual property in regards to data and technology through the National Information Infrastructure.[4] The difference between countries in stages of integrating digital property protection laws within current legislation poses another problem. The laws vary by country, although the internet network expands worldwide. [5] Exchange of certain information may be legal in one country, but can be communicated across borders instantaneously and become considered illegal sharing of digital property.

Ethical Dilemmas

Increased accessibility

The digital age enables information to be shared more efficiently through file uploads, mass email chains, and sharing of social media posts, all of which make up digital property. This increased fluidity of information in turn leads to greater accessibility. Instead of physical property being passed along manually, the virtual circulation of digital property creates an expansive network expanding the web worldwide. This increased accessibility makes protection of digital property more complex, as the information can be possessed by numerous people at once without concern for the original source. [5] [4]This continuous process of copying material to be shared with the world can lead to the degradation of content quality as well. [4] Original content can be altered intentionally for example with effects on images and videos, or unintentionally with the composition of pixels degrading or content being lost in the transitional process.

Passwords

With increasing quantifiable data online and on computers, passwords and passcodes have grown more prevalent in cyber space. Digital property can be protected through patents, copyright, and trademark laws, but if the individual proprietors don’t take steps to safe-guard their personal digital belongings through passwords, legislation can do little. The privacy breach that the expansive network of internet users poses to personal digital property can be minimized by strong passwords and diversification of these passwords between different accounts. [6] Many online entities are doing their part to assist users in creating newer, stronger passwords in order to protect their customers personal information and avoid any negative publicity on the corporate side. A method known as nudging is commonly used where websites display pop-ups, occasionally when a user logs-in, encouraging the user to update their password.[7] There can be many different reasons to nudge a user, most commonly this is due to the user retaining the same password for a lengthy amount of time, attempted theft or hack, and as a requirement for employees for various companies. [8]

Violations of patents, copyrights, and trademarks

Copyright, Trademark, and Patent Symbols[9]

The legislation that does exist regarding digital property is not perfect, but attempts to set boundaries and sanctions as punishment for infringing on intellectual and contractual property. Patents, copyrights, and trademarks are violated constantly, as artists and inventors have difficulty distinguishing inspiration from originality. As Snapper details about plagiarism, authorization to digital property is outlined with very fine lines, and interpretation of patent and copyright laws is difficult. [10]

Barrack Obama "Hope" Campaign Poster [11]

An example of a digital property rights violation that recently occurred was with a "Hope" campaign poster for Barrack Obama. The original source of the photo before the editing was obscure due to the advanced entanglement of digital property circulating the internet. [12]

Lagging Legislation

In addition to unclear legislation to protect digital property, it is also not up to date. With rapidly evolving technology, and society's cultural and business practices changing in response, the legislative process is slow in comparison. Passing new laws proves to take much longer than the invention of new technological resources and the acceptance of these advancements by society. Legislation not being able to keep pace with rapid innovation in the technology field creates further ethical dilemmas of stolen digital property.

References

  1. “State-by-State Digital Estate Planning Laws.” Everplans, www.everplans.com/articles/state-by-state-digital-estate-planning-laws.
  2. 2.0 2.1 Lupton, Deborah. “Routledge Handbook of Physical Cultural Studies.” Routledge Handbook of Physical Cultural Studies, London:Routledge.
  3. “Did You Know Intellectual Property Is Protected Under the Constitution?” U.S. Chamber of Commerce, 19 Dec. 2017, www.uschamber.com/series/above-the-fold/did-you-know-intellectual-property-protected-under-the-constitution.
  4. 4.0 4.1 4.2 “US6314409B2 - System for Controlling Access and Distribution of Digital Property.” Google Patents, Google, patents.google.com/patent/US6314409B2/en.
  5. 5.0 5.1 “The Digital Dilemma.” Google Books, books.google.com/books?hl=en&lr=&id=e_GbAgAAQBAJ&oi=fnd&pg=PT22&dq=digital%2Bproperty&ots=cZsvtCwskz&sig=XtBETmEdw61eZhtLXEmQu4NJtnk#v=onepage&q=digital%20property&f=false.
  6. Adams, Anne, et al. “Making Passwords Secure and Usable.” SpringerLink, Springer, London, 1 Jan. 1997, link.springer.com/chapter/10.1007/978-1-4471-3601-9_1.
  7. Renaud, Karen, and Verena Zimmermann. “Guidelines for Ethical Nudging in Password Authentication.” SAIEE Africa Research Journal, South African Institute of Electrical Engineers, June 2018, www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1991-16962018000200002&lng=en&nrm=iso&tlng=en.
  8. Renaud, Karen, et al. “Lessons Learned from Evaluating Eight Password Nudges in the Wild.” 2017.
  9. “Patents, Copyrights and Trademarks – Oh My!” Shenandoah Valley, www.valleysbdc.org/patents-copyrights-and-trademarks-oh-my/.
  10. Snapper, John. “The Matter of Plagiarism: What, Why, and It.” The Handbook of Information and Computer Ethics, by Kenneth Einar. Himma and Herman T. Tavani, John Wiley & Sons, 2008, pp. 533–552.
  11. Scott, Mac. “Obama Hope Poster - Shepard Fairey (2008).” Medium, FGD1 The Archive, 15 Oct. 2017, medium.com/fgd1-the-archive/obama-hope-poster-by-shepard-fairey-1307a8b6c7be.
  12. Fisher III, William W., Frank Cost, Shepard Fairey, and Meir Feder. "Reflections on the hope poster case." Harv. JL & Tech. 25 (2011): 243.