Anonymity and SPAM The Good, the Bad and the Ugly!

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

Virginia State Bar Annual Meeting Corporate Counsel Section Update on Do Not Call & Spam Michael Goodman Federal Trade Commission
The First Amendment guarantees people the right to express themselves through speech and writing – Allows everyone to hear opinions and ideas of others.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Internet and the Law. SPAM CAN-SPAM Act of 2003 CAN-SPAM Act of 2003 The Controlling the Assault of Non-Solicited Pornography and Marketing Act The Controlling.
ISP Liability for Defamation and Copyright Violation Richard Warner.
1 Freedom of Expression Prepared By Joseph Leung.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Chapter 5 Freedom of Expression
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
AP GOVERNMENT. CIVIL LIBERTIES  Civil Liberties are individual’s legal and constitutional protections against the government.  Although our civil liberties.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
CSE/ISE 312 Freedom of Speech (Part 2) “Anonymity is a shield from the tyranny of the majority” - US Supreme Court.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Chapter 19 Section 3 Objective: To understand the scope of and the limits on free speech and press.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Behind the Machine: Anonymity and Free Speech Bill of Rights protects free speech But – there are still times when we do not want to be identified? Examples?
Chapter 3: 1st Amendment.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 15 Regulation of Advertising McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.
OBJECTIVES:  COMPARE and CONTRAST federal and state court systems  LIST and EXPLAIN the differences between criminal and civil cases  DESCRIBE the basic.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Attorney is another name for a Lawyer. There are more than 1 million lawyers in the United States –More than 70% have their own private practice –10%
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
1. Freedom of Speech Americans have right to freedom of expression to help protect unpopular opinions Founders wanted well-informed public Speech is limited.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Presented by Ika Novita Dewi, MCS
Freedom of Expression.
Welcome!.
A Gift of Fire Third edition Sara Baase
Behind the Machine “The Good, The Bad, and the Ugly”
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Anonymity and SPAM The Good, the Bad and the Ugly!

Anonymous? The quality or state of being anonymous, which is the condition of having a name or identity that is unknown or concealed. [RFC 2828] Anonymity is the state of not being identifiable within a set, called the "anonymity set". When referring to human beings, we say that a person is anonymous when the identity of that person is not known. Being anonymous usually is a result of not disclosing one's identity. This may be simply because the person was not asked, as in an occasional encounter between strangers, or because the person is unable or unwilling to tell. en.wikipedia.org/wiki/Anonymity en.wikipedia.org/wiki/Anonymity " Anonymity" and "confidentiality" do not have the same meaning and are not interchangeable.

Anonymous? Why would someone want to be anonymous? The Founding Fathers often chose anonymity in their protests by using pseudonyms on printed material or not listing authorship at all. Signing the Declaration of Independence was a very big deal! Is this new to the Internet? Is Anonymity on the Internet more important than in “real life?”

Anonymous Internet Services? Should people be able to and Surf the Web anonymously? Anonymizer.com Zero-Knowledge System SafeWeb Some of these providers use encryption services so that even the ISP cannot identify the user

Anonymous Internet Services? SafeWeb – developed tools to assist individuals living under governments that limit Internet access such as China, and Iran. CIA uses SafeWeb – So no one knows you’re a spy!

Anonymity and Free Speech Bill of Rights protects free speech, but – there are still times when we do not want to be identified? Examples?

Anonymity and Free Speech “In 1995 the Supreme Court invalidated an Ohio law under which a women was fined for distributing pamphlets against a proposed school tax without putting her name on them. The Court ruled that distribution of anonymous political leaflets (by an individual) is an exercise of freedom of speech protected by the First Amendment. The Court said ‘anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority.’”

Anonymity and Free Speech As a result of this Ohio ruling, a federal court threw out a 1996 Georgia law against using a false identity on the Internet. But, going to court to enforce one’s rights can be expensive. Often the threat of legal action shuts down free speech.

Anonymity and Free Speech The ability to post anonymously is good. Is it? Is it always good? How do we filter truth from fiction? How do we protect ourselves from libel or defamation of character?

Anonymity and Free Speech “Because of its potential to shield criminal activity or because they consider it “ bad netiquette” some services choose to discourage or prohibit anonymity. Some require identification of all members and users. Some do not accept any from known anonymous r er sites. On the other hand, Web sites that emphasize debate on controversial issues or have discussion groups on socially sensitive topics often consider anonymity to be a reasonable way to protect privacy and encourage open, honest discussion.

Anonymity and Free Speech Anonymity on the Internet issued for criminal and antisocial purposes including the planning of terrorist attacks. Law enforcement officials argue for laws that require ISPs to maintain records of the true identity of each user and to maintain records of online activity for a specific period of time for potential use in criminal investigations.

Anonymity and Free Speech Protecting the Many from the Few This Can limit Free Speech because the basic rules of our legal system change! To do so – we become Innocent until proven guilty

SPAM Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited . … Real spam is generally advertising for some product sent to a mailing list or newsgroup. list newsgroup The Internet version of junk mail. Spamming is sending the same message to a large number of mailing lists or newsgroups usually to advertise something.

SPAM A new survey shows American business users [indicate] the difference between spam and desired is whether the user has previously transacted business with the sender.

SPAM First Amendment – Guarantees Free Speech Is SPAM a variant of Free Speech?

SPAM and Free Speech Can the use of filters by organizations and companies such as AOL, MSN and ISPs use of SPAM viewed as violations of the sender or the receivers free speech? Is AOL like a membership organization with “property” where SPAM is an invasion of private property or like the Post Office?

SPAM and Free Speech What about anti-SPAM listing services that provide lists of “SPAMers.” Who get included? Who decides? Is a Harris Poll survey SPAM?

SPAM, Free Speech and the Legal System?! Thirty-six states have tried by enacting their own versions of anti-spam laws Only two state prosecutions were ever successfully brought against spammers, and only one was able to enforce its law against an out-of-state spammer.

SPAM, Free Speech and the Legal System?! CAN-SPAM Act of 2003 The Controlling the Assault of Non-Solicited Pornography and Marketing Act requires unsolicited commercial messages to be labeled (though not by a standard method) and to include opt-out instructions and the sender's physical address. It prohibits the use of deceptive subject lines and false headers in such messages. The FTC is authorized (but not required) to establish a "do-not- " registry. State laws that require labels on unsolicited commercial or prohibit such messages entirely are pre-empted, although provisions merely addressing falsity and deception would remain in place. The CAN-SPAM Act took effect on January 1,