view the rest of the comments
Technology
This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.
Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.
Rules:
1: All Lemmy rules apply
2: Do not post low effort posts
3: NEVER post naziped*gore stuff
4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.
5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)
6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist
7: crypto related posts, unless essential, are disallowed
Don't we already have pretty robust laws when it comes to person's likeness?
I presume most contracts cover this aspect mainly for the purposes of marketing and future references. Of course the actors probably didn't expect the extent the current technology could allow their likeness to be exploited.
It would probably make sense to require more specific contracts for this purpose, and have previously signed general contracts become insufficient for using actors' likeness for this purpose.
They say they are expected to accept contracts that were designed for the old business model while the industry structure and technologies have changed. Here's some video of the speeches & demonstrations.
Here is an alternative Piped link(s): https://piped.video/watch?v=9jBBItLnxRc
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I'm open-source, check me out at GitHub.
Good bot.
If a corporation puts their crimes inside a computer, they can get away with it for years before anybody figures out how to do anything about it.
It's not really that complicated if there's a will and resources to investigate. You can legally compel someone to produce evidence or show you how they do things whether it's in an Excel file or in a paper ledger.
Conversely, you can burn a paper ledger just as easily as you can delete a computer file. In fact computer files might actually be more resilient since they can be recovered if not properly destroyed.