30.07.2015 Views

The Malaysian Accountant - The Malaysian Institute Of Certified ...

The Malaysian Accountant - The Malaysian Institute Of Certified ...

The Malaysian Accountant - The Malaysian Institute Of Certified ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FEATUREInternet Piracy- Copyright Infringementand Adequacy of <strong>Malaysian</strong> LawBY INDRAN SHANMUGANATHANIntroduction<strong>The</strong> Internet is a worldwide system of computer networks.Using the same protocol, any one computer can getinformation from or talk to any other connected computer. Ittherefore facilitates content and information transmission,sharing and retrieval.Role of Internet Service ProvidersWith new technologies and the facilities offered by theInternet, on-line piracy has come about in many ways. Inmost instances, the Internet service providers are involved.Commercial undertakings have without theauthorisation of or any payment to copyright ownersripped and made available recorded music for download.<strong>Of</strong>ten times, hacking software is posted. It may be used tobreak copy protection and other technological measuresavailable and embedded in copyright protected materialsto prevent unauthorised copy and transmission. <strong>The</strong>ymake their money through banner advertising. <strong>The</strong>re arealso other sites that provide links to these unauthoriseddatabases.Peer to peer (“P2P”) networks and systems allows agroup of computer users using the same networkingprogram to connect with each other and directly access filesfrom each other’s hard drives. <strong>The</strong> common softwareenables users at any time to connect directly with the harddrives of all other users logged onto the Internet. <strong>The</strong>electronic files of a user are therefore made available to allother users. <strong>The</strong>re are various participants to a P2Pnetwork.<strong>The</strong>y include (i) providers of the P2P software, (ii)intermediaries such as Internet and other service providers,(iii) uploaders and, (iv) downloaders.<strong>The</strong> role of the Internet service providers is alsoimportant for another reason. Individual items of softwareheld by uploaders are identified by reference to an Internetprotocol or IP address. <strong>The</strong> address is numeric in form andis allocated to a particular address space in such a mannerthat an individual computer or a network of individualcomputers will communicate to the Internet via thataddress. <strong>The</strong> IP address but not the identity of the up-loadermay be identified. <strong>The</strong> cross referencing between the IPaddress and the individual’s details is held by the Internetservice provider who provides with interconnectivity to theInternet. Unless the identity of the up-loader is divulged, noeffective action can be taken against the up-loader.In the case of a motion picture, sound recording,musical works, audio visual product and business software,only the person by whom the arrangements for the makingof the motion picture or recording can authorise it to beplaced or copied onto a website, or transmitted across anetwork, or performed or downloaded by a computer. <strong>The</strong>seworks however contain much underlying works which arethemselves individually protected. Such underlyingsynchronised works would include literary and dramaticworks, musical works, artistic works, image rights and soon. <strong>The</strong> rights of the individual owners of such underlyingworks should be protected. <strong>The</strong>y should continue to retaintheir respective rights to take both civil and criminal actionagainst infringers.www.micpa.com.myJune/August 2007 | <strong>The</strong> <strong>Malaysian</strong> <strong>Accountant</strong> |5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!