Larry Downes March 20, 2006 From the Ox to the Cyberstalker FROM INFORMATION, KNOWLEDGE.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

LPA Pre-Award Certification & Assurances Survey July 23, 2014.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
High School 101 Online Safety Tuesday, August 19 th, 8 th period.
Anti-Bullying and harassment Presentation
Forgery, Fraud, and Crimes Against the Public Mr. Whitaker.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
Cyberbullying.
 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.
1 Copyright © 2012 M. E. Kabay. All rights reserved. Cyberstalking & Cyberbullying Our House Summit on Sexual Violence M. E. Kabay, PhD, CISSP-ISSMP.
Copyright Atomic Dog Publishing, /18 Social Responsibility and Management Ethics Chapter 3.
Managing Diverse Employees in a Multicultural Environment chapter five McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights.
Bullying Facts and Fiction. Bullying defined Any willful attempt or threat to inflict on another person when accompanied by an apparent present ability.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
8 - Free Speech Harvard CSCI E-2a November 17, 2008 Harvard CSCI E-2a November 17, 2008.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Final PowerPoint Presentation. The Wide World of Censorship By: Donnia Zack-Williams Sarah D’Orsie Katie Sullivan.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Boston and Kesling Middle School  Bullying means overt, repeated acts or gestures including verbal or written communications transmitted;
By Kenrick 8B2. * Cyberbullying is defined in legal glossaries as * actions that use information and communication technologies to support deliberate,
Chapter Five Civil Liberties.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Ch3 Freedom of Speech The US Constitution.
Digital Citizenship Created By: Kelli Stinson June 2011.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
The law on Intermediary Liability in India
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Class 22 Copyright, Spring, 2008 Copyright and the Constitution Randal C. Picker Leffmann Professor of Commercial Law The Law School The University of.
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
A near-invisible niche for the vast majority of its existence, computer culture has only recently stepped into the big leagues and has yet to even learn.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Technology in Action Quiz 1 Review Chapters 1, 2, 3, & 4.
Crimes against persons 7.3 Stalking, Cyberstalking and Hazing Forensics – November 12,
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.
{ Cyber Bullying. Cyber Bullying is typically referred to as “ a communication or posting by one or more people using cybertechnology or digital media.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Constitutional Rights Chp. 2 Civil Rights – Bill of Rights and other amendments to the Constitution have become a shield for the personal, natural rights.
Public nuisance and order Copyright Unfair contract terms.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
+ What does Title IX Mean for Student Organization Advisors? Julia Broussard, LMSW Coordinator of Violence Prevention & Support Services Tulane University.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
THE PROTECTION OF CHILDREN FROM SEXUAL OFFENCES ACT(POCSO), 2012
Combing the words “sex” with “texting” describes the act of someone sending sexually explicit messages or images of themselves electronically - primarily.
Digital Crimes Cell Phone Computer. Malicious Use of a Telephone MCL e Threatening physical harm or damage to a person or property in the course.
Support. Image Credit Agenda: Times they are a changing What is the law What Social media are students into Tips and Tricks Sharing/ Support.
Haley Jurbala Derek Hegna Ashley Hitchcock Andrew Howard COURT CASES- GROUP 2.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Chapter 2 The internet. How is it different from other media?
Chapter 13 Public Order Crimes
Freedom of Speech in Cyberspace
Common Copyright Misconceptions
Common Copyright Misconceptions
Presentation transcript:

Larry Downes March 20, 2006 From the Ox to the Cyberstalker FROM INFORMATION, KNOWLEDGE

Copyright 2006 by Larry Downes. All rights reserved. My research interests The accident-prone intersection of Economic Innovation, Law, and Technology

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Centralization and the Law, 1906 Brooks Adams, “[Y]ou can no more reason from highway precedents to railway problems than you can reason from the ox to the electric battery.”

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Communications Decency Act “Whoever... initiates the transmission of... communication which is obscene or indecent, knowing that the recipient of the communication is under 18 years of age... shall be fined under Title 18, or imprisoned not more than two years, or both." 47 U.S.C.A. §223(a) (1996)

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Communications Decency Act “Whoever... initiates the transmission of... communication which is obscene or indecent, knowing that the recipient of the communication is under 18 years of age... shall be fined under Title 18, or imprisoned not more than two years, or both." 47 U.S.C.A. §223(a) (1996) VOID! 1 1 ACLU v. Reno, 520 U.S (1997)

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Violence Against Women Act, 2006 “Whoever... utilizes a telecommunications device, whether or not conversation or communication ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number or who receives the communications; shall be fined under Title 18, or imprisoned not more than two years, or both." 47 U.S.C.A. §223(a) (2006)

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Violence Against Women Act, 2006 “[Telecommunications device] includes any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet.” 47 U.S.C.A. §223(h) (2006) (“Preventing Cyberstalking”)

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Unintended Consequences The Cyberstalking provision would apply if you throw your PDA at me from the back row of class. Even if you missed me. Even if I didn’t realize you’d thrown it. Two years in a federal prison.

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Response to CDA I

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. Response to CDA II? “All I can say is that some things never change.”

FROM INFORMATION, KNOWLEDGE Copyright 2006 by Larry Downes. All rights reserved. The Enemy has Changed