Anybody and everybody in the present scenario feels free to download and use anything that is on the World Wide Web. In the earlier researches, researches have found out that the legislation of most of the countries is not able to protect the works of photographers from illegal publishing online, the main reason being that the legislation is too old and does not incorporate the new technological issues.The study will, therefore, elaborate the copyright law on infringement in different countries and the loopholes attached with it. The different types of infringements will be discussed in the paper. For instance, Primary infringement stands for ‘the copying of a work, making available to the public and adaptation of it’ and secondary infringement involves ‘dealings with infringing copies through acts of importation, sale, or other distribution’ (Christie et al, 2008).Moreover, another fact which may be considered is that the Copyright, Designs, and Patents Act 1988 considers various types of material as the objects of potential infringement. But it doesn’t consider the rights of photographers on their works. This is mainly due to the fact that the legislation of most of the countries concerning copyright law is old enough to have the illegal publishing of photos on the Internet examined in there. Moreover, the legal acts of some countries do not include the section about photography as an entertainment product at all.The question whether all kinds of photography (documentary, commercial or artistic) qualify for copyright protection was asked by Baade (1997). The author brings the example from Time, Inc. Bernard Geis (1968), a case during which the. How Can the Photographers Prevent Illegal Publishing of Their Phostos In the Internet.
Baade, Patricia L. (1996-1997) Photographers Rights: Case for Sufficient Originality Test in Copyright Law, John Marshall Law Review, No. 30, p. 149-195
Carr, M. (2009a) Protect Your Photos [Online] Available from: http://cameras.about.com/cs/printing/a/protectimages.htm [Accessed 11 January 2010]
Carr, M. (2009b) How to Watermark Your Photos [Online] Available from: http://cameras.about.com/od/printing/ss/watermark.htm [Accessed 11 January 2010]
Christie, A., Gare, S. (2008) Intellectual Property. 9 Ed. Oxford University Press: Oxford, 630 p.
Clark, B. (2007) Illegal downloads: sharing out online liability: sharing files, sharing risks, Journal of Intellectual Property Law and Practice, Vol. 2, Iss. 6, p. 402-418
EU News (2004) EU forks out 50 million to clean Internet. Network, Vol. 2004, Iss.3, p. 3
Gastineau, John (1997) Bent Fish - Issues of Ownership and Infringement in Digitally Processed Images, Copyright Law Symposium, 40, p. 383 – 429
Hecker, J. (2003) Comment: Contracting and the Rights of Photographers, Case Western Reserve law review, Vol. 53, Iss. 3, p:659 – 664
Mcconchie, S. (2009) Seven Ways You’re Breaking the Law Online [Online] Available from: http://kiwicommons.com/2009/10/seven-ways-you-may-be-breaking-the-law [Accessed 11 January 2010]
Owen, M. (2007) Photographers don’t deserve special treatment. University of Auckland Business Review, Vol. 9, Iss.1, p. 42-46
Saxby, S. (1997) Policies for Cyberspace. Illegal Content on the Internet. Network Security, vol. 1997, Iss, 4, p. 16-19
Seidenberg, S. (2007) Perfect solution. Adult Media mogul challenges online copyright infringers. Inside Counsel, October Issue, p. 26-27
Spring, T. (2009) Have Data Stored Online? Protect it! PC World, Vol. 27, Iss. 8, p. 12-13
Sweeting, P. (2001) Study: Rapid upswing in illegal movie downloads, Video Business, Vol. 21, Iss. 11, p. 1-2
WIPO (2010a) What is WIPO? [Online] Available from: http://www.wipo.int/about-wipo/en/what_is_wipo.html [Accessed 11 January 2010]
WIPO (2010b) Contracting Parties [Online] Available from: http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&treaty_id=16 [Accessed 11 January 2010]
WIPO (2010c) WIPO Copyright Treaty [Online] Available from: http://www.wipo.int/treaties/en/ip/wct/trtdocs_wo033.html#P78_9739 [Accessed 11 January 2010]
I have changed the whole paper according to the requirement of your lecturer and the guidelines provided by him. Have included the research questions, increased the literature review mentioning the works of previous researchers to about 1650 words and gained a focus on the methodology. I think it should be fine now. The only thing that you are required to do is change the bibliography according to the day and time you have used the internet to add quotes.
Wish you all the best.
Thanks and Regards.
Please type your essay title, choose your document type, enter your email and we send you essay samples