Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
“Fair Use” – Copyright in Cyberspace Adapted by Jack Davis from “Cyberspace Law for Non-Lawyers” Larry Lessig, David Post, Eugene Volokh ©1999 – Social.
Chapter 32 Agency Liability to Third Parties and Termination BUSINESS LAW: Text & Cases — Legal, Ethical, International, and E-Commerce Environment 11.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
VISD Acceptable Use Policy
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
VoIP Voice over Internet Protocol or “It is not Voice over IP; it is Everything over IP…” Bob Pepper, FCC.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
An Introduction to Internet Law (Psst: There's no such thing!) Steven J. McDonald General Counsel Rhode Island School of Design and Robert W. Hamilton.
Standards and Guidelines for Web Page Publishing December 9, 2009.
HOSPITAL COPYRIGHT TOOLKIT A Guide to the Canadian Copyright Act A Presentation prepared by Jan Figurski, MLS Mary McDiarmid, MISt, AHIP c2007.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Electronic Use Policies.   Social Media  Internet.
Driver Education for the Information Superhighway: The Law and Policy of the Internet Steven J. McDonald Associate Legal Counsel The Ohio State University.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Copyright and Licensing Legal issues associated with electronic resource access and usage.
Computer Ethics for Computer Users
Compliance and Enforcement of the Privacy Rule. HHS/OCR February/March Compliance Date  April 14, 2003 – Compliance for all but small health plans.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Contract Law and Copyright Exceptions: What’s at stake? Benjamin White Head of Intellectual Property British Library.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
Digital Citizenship Working and playing in a digital word.
The Legalities of Technicalities By Kellie Birdwell.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Freedom of Speech Computers in the World.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
Information Systems Unit 3.
Wayne College Library Copyright in the Classroom Demonstrate an understanding of intellectual property, copyright, and fair use of copyrighted materials.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Your Copyright Crash Course! April Tafolla Adame Elementary September 2011.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
School Accounts Presented by: Mrs. Mazzola.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Open Meetings Open Records and Ethics Training Member Training.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
HIPAA PRIVACY & SECURITY TRAINING
Ogletree, Deakins, Nash, Smoak & Stewart PC
Chapter 10 Cyberlaw, Social Media, and Privacy
Current Privacy Issues That May Affect Your Credit Union
Technician License Course.
Presentation transcript:

Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information Hiding

How Can I Possibly Deal with That? If a student sends a series of threatening messages to another student, and your computer use/ policy doesn't specifically prohibit this kind of harassment, can you do anything about it? If a student sends a series of threatening messages to another student, and your computer use/ policy doesn't specifically prohibit this kind of harassment, can you do anything about it?

It is new technology. Do we need new laws? "Technological advances must continually be evaluated and their relation to legal rules determined so that antiquated rules are not misapplied in modern settings.... Yet, if the substance of a transaction has not changed, new technology does not require a new legal rule merely because of its novelty. “ "Technological advances must continually be evaluated and their relation to legal rules determined so that antiquated rules are not misapplied in modern settings.... Yet, if the substance of a transaction has not changed, new technology does not require a new legal rule merely because of its novelty. “ – Daniel v. Dow Jones & Co.

What is the Internet?

What is the Internet, really? A bulletin board A bulletin board A printing press A printing press A library A library A bookstore A bookstore A television set and a television station A television set and a television station A telephone, with lots of party lines and unlimited conference calling A telephone, with lots of party lines and unlimited conference calling A post office A post office......

What is the Internet, really? A medium of communication! A medium of communication!

How Can I Possibly Deal with That? If a student sends a series of threatening typewritten letters to another student, and your typewriter use policy doesn't specifically prohibit this kind of threat harassment, can you do anything about it? If a student sends a series of threatening typewritten letters to another student, and your typewriter use policy doesn't specifically prohibit this kind of threat harassment, can you do anything about it? Of course! Of course! The medium is not the message The medium is not the message

Three Key Misconceptions Cyberspace is a separate legal jurisdiction Cyberspace is a separate legal jurisdiction In fact, conduct that is illegal or a violation of policy in the "offline" world is just as illegal or a violation of policy when it occurs online In fact, conduct that is illegal or a violation of policy in the "offline" world is just as illegal or a violation of policy when it occurs online If it's technically possible, it's legal If it's technically possible, it's legal In fact, the technology has some legal implications, but it does not define the outer limits of the law In fact, the technology has some legal implications, but it does not define the outer limits of the law Free access = free speech = unfettered speech Free access = free speech = unfettered speech In fact, even public institutions may limit the use of their computer resources to business-related purposes In fact, even public institutions may limit the use of their computer resources to business-related purposes

One Key Point Internet law (and policy) existed long before the Internet: Internet law (and policy) existed long before the Internet: The law of libel The law of libel The law of privacy The law of privacy The law of copyright The law of copyright Criminal law Criminal law Your threatening policy, code of student conduct, workplace rules Your threatening policy, code of student conduct, workplace rules Etc. Etc.

And Two Key Implications Internet-specific rules aren't necessary and may create problems Internet-specific rules aren't necessary and may create problems Except when there are unique issues that aren't already covered by generally applicable laws and policies Except when there are unique issues that aren't already covered by generally applicable laws and policies Education is critical Education is critical It isn't always immediately clear (surprise!) how the law applies to new situations It isn't always immediately clear (surprise!) how the law applies to new situations

Who is responsible? Publishers Publishers Create content and hold it forth as their own Create content and hold it forth as their own Directly liable for the libels they disseminate Directly liable for the libels they disseminate Distributors Distributors Don't create, but choose to, and actively do, distribute Don't create, but choose to, and actively do, distribute Liable only if they "knew or should have known" that what they are distributing is libelous Liable only if they "knew or should have known" that what they are distributing is libelous No duty to prescreen No duty to prescreen Conduits Conduits Operate a system by which other people communicate Operate a system by which other people communicate No liability for libel No liability for libel

A Model Use Policy (computing / typewriter ) All users of university computing resources must: All users of university computing resources must: Comply with all Palestinian and other applicable law; all generally applicable university rules and policies; and all applicable contracts and licenses. Comply with all Palestinian and other applicable law; all generally applicable university rules and policies; and all applicable contracts and licenses.

A Model Use Policy (computing / typewriter ) All users of university computing resources must: All users of university computing resources must: Refrain from using those resources for personal commercial purposes or for personal financial or other gain. Personal use of university computing resources for other purposes is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the user's job or other university responsibilities, and is otherwise in compliance with this policy. Refrain from using those resources for personal commercial purposes or for personal financial or other gain. Personal use of university computing resources for other purposes is permitted when it does not consume a significant amount of those resources, does not interfere with the performance of the user's job or other university responsibilities, and is otherwise in compliance with this policy.

Wait a minute, have you noticed this: All users of university computing resources must: All users of university computing resources must: Respect the finite capacity of those resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. Respect the finite capacity of those resources and limit use so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users.

But What About... File-sharing? File-sharing? Copyright policies and law Copyright policies and law Excessive use restriction Excessive use restriction Spam? Spam? Personal use/no commercial use restriction Personal use/no commercial use restriction Excessive use restriction Excessive use restriction harassment law harassment law Harassment on blogs and any other emerging technologies Harassment on blogs and any other emerging technologies Harassment policies Harassment policies Libel law Libel law

The following topics: * Computer and Internet privacy * Case study: Data Protection Act 1998 (UK) * Computer Crimes * Software licensing