SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Legal issues and preservation JISC-PoWR Workshop Preservation of Web Resources: Making a Start ,[object Object],[object Object],[object Object],[object Object]
Disclaimers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Legal issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Protection ,[object Object],[object Object]
Content related rules ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
IP ,[object Object],trade marks copyright
Copyright ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Third Party sites
[object Object]
[object Object]
[object Object]
Overwhelmed? ,[object Object]
 
Risk management not total risk aversion ,[object Object]
Risk management for preservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some thoughts... ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks! ,[object Object],[object Object],[object Object],[object Object]
Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Legal issues, Jordan Hatcher, opencontentlawyer

Writing for the web/Privacy/Copyright
Writing for the web/Privacy/CopyrightWriting for the web/Privacy/Copyright
Writing for the web/Privacy/Copyrighttime4online
 
Policy Restricting Personal Use Of Computers And Systems
Policy Restricting Personal Use Of Computers And SystemsPolicy Restricting Personal Use Of Computers And Systems
Policy Restricting Personal Use Of Computers And SystemsBrenda White
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Copyright, Public Domain & Creative Commons for Educators
Copyright, Public Domain & Creative Commons for Educators Copyright, Public Domain & Creative Commons for Educators
Copyright, Public Domain & Creative Commons for Educators robin fay
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
Traklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IPTraklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IPTraklight.com
 
Creating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, MetadataCreating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, MetadataRobert Pearce
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)ElaineLee
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPRNeil Witt
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Slideshare & IPR concerns v2(4.3)
Slideshare & IPR concerns v2(4.3)Slideshare & IPR concerns v2(4.3)
Slideshare & IPR concerns v2(4.3)Marie Daccache
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignMassimo Menichinelli
 
Managing Elearning Resources Fife Mar09
Managing Elearning Resources  Fife Mar09Managing Elearning Resources  Fife Mar09
Managing Elearning Resources Fife Mar09Iriss
 
Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Maanit Zemel
 

Ähnlich wie Legal issues, Jordan Hatcher, opencontentlawyer (20)

Writing for the web/Privacy/Copyright
Writing for the web/Privacy/CopyrightWriting for the web/Privacy/Copyright
Writing for the web/Privacy/Copyright
 
Policy Restricting Personal Use Of Computers And Systems
Policy Restricting Personal Use Of Computers And SystemsPolicy Restricting Personal Use Of Computers And Systems
Policy Restricting Personal Use Of Computers And Systems
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Copyright, Public Domain & Creative Commons for Educators
Copyright, Public Domain & Creative Commons for Educators Copyright, Public Domain & Creative Commons for Educators
Copyright, Public Domain & Creative Commons for Educators
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Traklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IPTraklight | 85 Broads How to Prepare for Funding | IP
Traklight | 85 Broads How to Prepare for Funding | IP
 
Privacy
PrivacyPrivacy
Privacy
 
Creating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, MetadataCreating OERs, problems and solutions: The law, Accessibility, Metadata
Creating OERs, problems and solutions: The law, Accessibility, Metadata
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)Ip Law And The Internet Presentation (1)
Ip Law And The Internet Presentation (1)
 
Web 2.0 and IPR
Web 2.0 and IPRWeb 2.0 and IPR
Web 2.0 and IPR
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Hacking3e ppt ch01
Hacking3e ppt ch01Hacking3e ppt ch01
Hacking3e ppt ch01
 
Slideshare & IPR concerns v2(4.3)
Slideshare & IPR concerns v2(4.3)Slideshare & IPR concerns v2(4.3)
Slideshare & IPR concerns v2(4.3)
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Digital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open DesignDigital Fabrication Studio 0.3 IP - Open Design
Digital Fabrication Studio 0.3 IP - Open Design
 
Managing Elearning Resources Fife Mar09
Managing Elearning Resources  Fife Mar09Managing Elearning Resources  Fife Mar09
Managing Elearning Resources Fife Mar09
 
Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content Managing the Risks of User-Generated Content
Managing the Risks of User-Generated Content
 
Unit 14 - Lo2
Unit 14 - Lo2Unit 14 - Lo2
Unit 14 - Lo2
 

Mehr von jiscpowr

Preservation for the Next Generation
Preservation for the Next GenerationPreservation for the Next Generation
Preservation for the Next Generationjiscpowr
 
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)jiscpowr
 
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...jiscpowr
 
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)jiscpowr
 
Introduction to JISC PoWR (Kevin Ashley, ULCC)
Introduction to JISC PoWR (Kevin Ashley, ULCC)Introduction to JISC PoWR (Kevin Ashley, ULCC)
Introduction to JISC PoWR (Kevin Ashley, ULCC)jiscpowr
 
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)jiscpowr
 
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)jiscpowr
 
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)jiscpowr
 
University of Bath: Case Study
University of Bath: Case StudyUniversity of Bath: Case Study
University of Bath: Case Studyjiscpowr
 
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...ReStore: A sustainable web resources repository, Arshad Khan, National Centre...
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...jiscpowr
 
Preservation of Web Resources Part II, Ed Pinsent, ULCC
Preservation of Web Resources Part II, Ed Pinsent, ULCCPreservation of Web Resources Part II, Ed Pinsent, ULCC
Preservation of Web Resources Part II, Ed Pinsent, ULCCjiscpowr
 
Challenges for Web Resource Preservation, Marieke Guy, UKOLN
Challenges for Web Resource Preservation, Marieke Guy, UKOLNChallenges for Web Resource Preservation, Marieke Guy, UKOLN
Challenges for Web Resource Preservation, Marieke Guy, UKOLNjiscpowr
 
Preservation of Web Resources Part I, Kevin Ashley, ULCC
Preservation of Web Resources Part I, Kevin Ashley, ULCCPreservation of Web Resources Part I, Kevin Ashley, ULCC
Preservation of Web Resources Part I, Kevin Ashley, ULCCjiscpowr
 

Mehr von jiscpowr (13)

Preservation for the Next Generation
Preservation for the Next GenerationPreservation for the Next Generation
Preservation for the Next Generation
 
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)
Web Preservation in a Web 2.0 Environment (Brian Kelly, UKOLN)
 
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...
Records Management vs. Web Management: Beyond the Stereotypes (Marieke Guy, U...
 
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)
The JISC-PoWR Handbook - Identifying Web Issues (Richard Davis, ULCC)
 
Introduction to JISC PoWR (Kevin Ashley, ULCC)
Introduction to JISC PoWR (Kevin Ashley, ULCC)Introduction to JISC PoWR (Kevin Ashley, ULCC)
Introduction to JISC PoWR (Kevin Ashley, ULCC)
 
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)
The JISC-PoWR Handbook - Explaining Web Preservation (Kevin Ashley, ULCC)
 
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)
The JISC-PoWR Workshops - Inputs and Outcomes (Marieke Guy, UKOLN)
 
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)
The JISC-PoWR Handbook - Recommended Approaches (Ed Pinsent, ULCC)
 
University of Bath: Case Study
University of Bath: Case StudyUniversity of Bath: Case Study
University of Bath: Case Study
 
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...ReStore: A sustainable web resources repository, Arshad Khan, National Centre...
ReStore: A sustainable web resources repository, Arshad Khan, National Centre...
 
Preservation of Web Resources Part II, Ed Pinsent, ULCC
Preservation of Web Resources Part II, Ed Pinsent, ULCCPreservation of Web Resources Part II, Ed Pinsent, ULCC
Preservation of Web Resources Part II, Ed Pinsent, ULCC
 
Challenges for Web Resource Preservation, Marieke Guy, UKOLN
Challenges for Web Resource Preservation, Marieke Guy, UKOLNChallenges for Web Resource Preservation, Marieke Guy, UKOLN
Challenges for Web Resource Preservation, Marieke Guy, UKOLN
 
Preservation of Web Resources Part I, Kevin Ashley, ULCC
Preservation of Web Resources Part I, Kevin Ashley, ULCCPreservation of Web Resources Part I, Kevin Ashley, ULCC
Preservation of Web Resources Part I, Kevin Ashley, ULCC
 

Kürzlich hochgeladen

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Kürzlich hochgeladen (20)

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Legal issues, Jordan Hatcher, opencontentlawyer