Staying Out of Prison in the Information Economy.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Freedom of Expression Prepared By Najib sani & Muhammad Tajuddeen M.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
Chapter 16 Lesson 1 Civil and Criminal Law.
Chapter 3 Tort Law.
Miller vs. California By tyler bundies. What freedom was uestioned? Is obscenity protected by the first amendment? Does the first amendment give you the.
ISP Liability for Defamation and Copyright Violation Richard Warner.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
CLIL WEBSITE BLOG FORUM NETIQUETTE. What is CLIL? It means Content and Language Integrated Learning and it is a methodology which aims at having students.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
1 CS 501 Spring 2007 CS 501: Software Engineering Lectures 5 & 6 Legal Aspects of Software Engineering.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
Chapter 5 Freedom of Expression
Grade 5 Student Assistants
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
COMM 226 Intellectual property rights Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Electronic Use Policies.   Social Media  Internet.
Software Engineering II
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Internet Driver’s License è Training è Test è Signed Internet Use Agreement.
Bradley Lecture International IP Law IM 350 – Fall 2012 Steven L. Baron November 15, 2012.
Cultural Differences CE 104 Civil Engineering Projects Tim Ellis, Ph.D., P.E. Department of Civil Construction and Environmental Engineering Iowa State.
The Federal Court System …and Justice For All. Federal Court System and State Court System (2 courts) Often interact Goal is to solve legal disputes and.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
CS CS 501: Software Engineering Lectures 5 & 6 Legal Aspects of Software Engineering.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 5 Legal Aspects of Software Engineering I.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
MILLER VS CALIFORNIA By Justin Lacks. THE ISSUE Marvin Miller worked for a company that dealt with "adult" material In an attempt to advertise their product,
N a p s t e r. How it all began… Napster began in a college dorm room when a student named Shawn Fanning wanted to share some of his songs with his friends.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
New York Times v. Sullivan (1963) By: Carmen Vaca.
Freedom of Speech and Press. The Big Idea While the 1st and 14th Amendments gives Americans the right to express ideas freely, the Constitution and the.
1. What are some freedoms that we have in our daily lives as US citizens? 2. Can your freedoms ever be taken away or limited? (explain!)
CS CS 5150: Software Engineering Lecture 6 Legal Aspects of Software Engineering 2.
CS CS 5150: Software Engineering Lecture 6 Legal Aspects of Software Engineering.
1 CS 501 Spring 2008 CS 501: Software Engineering Lectures 5 & 6 Legal Aspects of Software Engineering.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
11 Copyright Myths By: Michael Armstrong. What is a copyright? A copyright is the exclusive right to make copies, license, and otherwise exploit a literary,
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 5 Legal Aspects of Software Engineering I.
“ 10 Big Myths about Copyright Explained” By: Brad Templeton Presented By: Nichole Au December 6, 2007.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Attorney is another name for a Lawyer. There are more than 1 million lawyers in the United States –More than 70% have their own private practice –10%
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
A Crash Course in Press Law For the High School Press.
Civil Law Civil Law – is also considered private law as it is between individuals. It may also be called “Tort” Law, as a tort is a wrong committed against.
Chapter 5 – The Court System. Trial Courts  Trial Courts – listen to testimony, consider evidence, and decide the facts in disputed situations  Plaintiff.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
1 ST AMENDMENT; FREE SPEECH AND FREEDOM OF THE PRESS ELIZABETH MANWILL MIA MAY RAMI KHALAF MATT MARTY.
Legal and Professional Issues In Information Security.
Chapter 9: Internet Law, Social Media, and Privacy
Legal Issues in Software Engineering
Presented by Ika Novita Dewi, MCS
Lesson # 7 A Practical Guide to Computer Forensics Investigations
A Gift of Fire Third edition Sara Baase
Media Law.
Essentials of the legal environment today, 5e
Judicial Branch.
Other 1st Amendment Rights and 2nd Amendment Rights
A Gift of Fire Third edition Sara Baase
Differences and similarities
Presentation transcript:

Staying Out of Prison in the Information Economy

Lecture Caveats I am not a lawyer and do not have any formal legal training This lecture is made up of my observations of the legal system to make you aware of important issues concentrating on an information technology workplace Cardinal Rule: Be aware of the law, but always consult an attorney if/when you become involved with it.

Law Caveats Some people read the text of the law and think they know it. Things are never so easy. If you have questions ask a lawyer. Others ignore the law relying on corporate lawyers in case something goes wrong. This is not a good idea. As in any other system, catching problems in the design phase is always better than in the debugging phase.

Talk Overview Life for Lawyers Vs. Life for Engineers Patents, copyright, trademarks, trade secrets reviewed Defamation ISP Liability Privacy Jurisdiction Issues

Life for Computer Professionals Binary –Problem solutions either work or not. Little room for gray areas. Physical and mathematical laws ultimate authority when disputes arise Guiding Philosophy - “Tell me what you need and I will create a system with appropriate trade-offs at least cost to solve your problem.”

Life for Lawyers Gray –Effort and intent often matter as much as results Supreme court ultimate authority when disputes arise Guiding Philosophy - “Laws are passed based on how society should run - even if enforcement and legal interpretation issues have yet to be nailed down.”

When Worlds Collide... Legal community always behind the technology curve Lawyers and politicians typically have poor technical backgrounds As a result, analogies often made between new technological paradigms and old world systems - some more easily defended than others. Different interpretations would result in different laws

Patents Embodiment of a specific methodology Competing products must use different method for achieving same task to avoid payments Definite lifespan beyond which patent information freely available for use by the public

Copyright Specific work Automatically held when work is created, but easier to defend if it is registered Definite lifetime beyond which the work is freely available to the public

Trademark Specific name or phrase Generic terms cannot be trademarked Trademarks can be lost if they are not defended –Lost trademarks: aspirin, kleenex –Held Trademarks: Coke, Pepsi

Trade Secrets Does not expire - as long as it is kept secret Competitors may not use secrets obtained through extraordinary means Example: Walled chemical plant layout learned through helicopter use

Defamation Publishing damaging statements you cannot prove about others The publisher and author are both liable Slander is a less serious, but similar, crime where damaging statements that cannot be proven are made in a public arena

Bally Total Fitness Vs. Faber A “Bally Sucks” web site was created by Faber complaining about Bally fitness centers The trademarked Bally seal was placed on the site overlaid with the words “Sucks” Bally sued Faber making claims of trademark infringement, dilution, and unfair competition.

Bally Case Decision No trademark infringement - little possibility of confusion No dilution - the defendant did not sell a competing product and did not convey confusion about the author’s identity No dilution (lessening ability of the plaintiff’s mark to identify its goods and services) since defendant was not marketing a competing product Incidentally - no slander, negative opinions protected under the first amendment

ISP Liability What is an Internet Service Provider Like? –Phone Company: Route information flows between individuals –Newspaper: Package content for distribution in a public forum Answer determines ISP’s legal liability The rules have been in a constant state of flux in recent years

Ancient History (~Decade Ago) Defamatory posting on Prodigy (Stratton Oakmont Vs. Prodigy Services 1995) –Prodigy a large ISP –Claimed to be “family friendly”. Prodigy advertised that internal newsgroups monitored for bad/inappropriate language –Role of a publisher - hence, Prodigy like a newspaper –CompuServe did not monitor users activity - like a telephone company (Cubby Inc. Vs. CompuServe Inc. in 1991)

Modern Era Communications Decency Act ISP may monitor user activity (according to policy) If statement to the effect that ISP does not take responsibility for user traffic in place then no ISP liability, BUT –Area for complaints must be available –Complaint response must happen in a timely fashion

DMCA Digital Millennium Copyright Act –If a copyright infringement is claimed a web site must be taken down (however tenuous the claim may be) –Web site can only be reinstated after an appeals process.

Near Future?... European Computer Crime Treaty may be created by the end of this year ISP’s may be required to monitor user traffic with a 40 day data-log. ISP’s not explicitly exempt from liability Hacker/Security Tools Illegal Citizens must provide passwords for data seized by police

Privacy in the Workplace Test for employers/employees - “Do you have a reasonable expectation of privacy?” A case can be made that private on business machines still private, but this is not the law Work-related material on business machines is definitely not private

Privacy in Legally, is like a postal letter –Expectation of privacy in transit –Mail loses its special protected status once it leaves the letter carrier's grasp For , –Expectation of privacy while signal travels over Internet – loses its protected status at the mail server whether you have read it or not

Spam and Address Spoofing Matthew Seidl v. Greentree Mortgage Co. (1998) Greentree hired third party to send mass to potential customers (spam) Return address spoofed to read (an actual address) Over 7,000 complaints sent to nobody resulting in denial of service for 3 days Libel case dismissed since third party was a contractor. Likely that third party would, in fact, be vulnerable to a lawsuit.

Business Electronic Communications Privacy Act (1986) says all business communication belongs to that business Deleting can be ruled spoliation (intentionally destroying company records) Archive worthless if it cannot be indexed effectively (in effect, saving everything can be equivalent to saving nothing)

What about Privacy at Home? A lot of public information is considered private. An increasing amount of public information available on the Internet –Reverse phone lookups –Campaign Contributions –Housing prices –(Thwarted) Driver’s license information and photographs

Data Collection Data collection has few boundaries in U.S. Check privacy policy (can change!!) EU Safe Harbor agreement may change things in the future (TRUSTe web site privacy seal program)

Jurisdiction “The Internet has no boundaries” Is that really true? If you break a law in Finland, but you were on the Internet in the United States, what happens to you? What if you are in California and you break a law in Minnesota?

E-Commerce Big Questions Did you sell an illegal item to a resident of community X? Did you try to stop the flow of illegal sales into X? An easy example of where this might come up is found in the on-line pornography boom.

Obscene or Offensive? Indecent speech and offensive speech protected under the 1st Amendment Obscene speech is not But what is obscene speech?

Miller Test for Obscenity (1) Whether “the average person applying contemporary community standards”, would find that the work, taken as a whole, appeals primarily to prurient interest. (2) Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by applicable state law. (3) Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.

Federal Court System 94 US District Courts (89 in the 50 states) 13 Judicial Circuits, each with a court of appeals Supreme Court ultimate appellate court Jurisdiction can be a determining factor in case outcomes

US V. Thomas (1994) Mr. And Mrs. Thomas ran a pornographic BBS in California State officer paid a membership fee and downloaded pornography in Tennessee Couple tried in Federal court in Tennessee and lost their case

International Jurisdiction Extradition over civil suits unlikely Big Question #1: Do you have assets in the country in question? Big Question #2: Will you ever try to enter country X?

Godfrey Vs. Dolenga Dolenga was a Cornell Biochemistry Master’s student from British Columbia Godfrey, a nuclear physicist from London, made anti-Canadian remarks in a newsgroup Dolenga responded by flaming Godfrey Godfrey notified Cornell of the offensive remarks, but they were not removed (First Amendment) Godfrey filed defamation suits against Dolenga and Cornell in Britain (one of at least seven such cases )

Dolenga Did Not Defend Himself... Dolenga was found guilty by default in English court BUT - Dolenga does not have assets in England and it is unlikely that American courts will enforce the British judgement.

Cornell Did Defend Itself Cornell has assets in England (the Cornell abroad program) The suit was for roughly 80,000 pounds. The University could have settled, but chose to take the case to court The suit was brought to a successful conclusion (for Cornell) Lessons to be taken away from this...

Conclusions... The law is constantly changing and never as simple as it seems You should try to be familiar with the law to protect yourself (corporate lawyers are like a fire department, not like a seeing eye dog) Even so, you DO need the help of someone with formal training when dealing with legal issues