An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National.

Slides:



Advertisements
Similar presentations
Chapter 3 The American Judicial System, Jurisdiction, and Venue
Advertisements

“Fair Use” – Copyright in Cyberspace Adapted by Jack Davis from “Cyberspace Law for Non-Lawyers” Larry Lessig, David Post, Eugene Volokh ©1999 – Social.
Copyright © Jeffrey Pittman Jurisdiction. Pittman - Cyberlaw & E-Commerce 2 Jurisdiction refers to a court’s power to hear and decide a case –
Internet Jurisdiction Law of e-Commerce Copyright, Peter S. Vogel,
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
Actg 6100 Legal Issues Chapter 3 Courts and Alternative Dispute Resolution.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
ISP Liability for Defamation and Copyright Violation Richard Warner.
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
Law for Business and Personal Use
American Tort Law Carolyn McAllaster Clinical Professor of Law Duke University School of Law.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
CONCEPTUAL FRAMEWORK Choosing a Trial Court
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
An Introduction to Internet Law (Psst: There's no such thing!) Steven J. McDonald General Counsel Rhode Island School of Design Margie Hodges Shaw University.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2005.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
An Introduction to Internet Law (Psst: There's no such thing!) Steven J. McDonald General Counsel Rhode Island School of Design and Robert W. Hamilton.
Standards and Guidelines for Web Page Publishing December 9, 2009.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Courts, Jurisdiction, and Administrative Agencies
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
Teachers and the Law, 8 th Edition © 2011 Pearson Education, Inc. All rights reserved. Teachers and the Law, 8e by David Schimmel, Leslie R. Stellman,
Gerri Spinella Ed.D. Elizabeth McDonald Ed.D.
© 2011 South-Western | Cengage Learning GOALS LESSON 1.1 LAW, JUSTICE, AND ETHICS Recognize the difference between law and justice Apply ethics to personal.
Unit 2 Seminar Jurisdiction. General Questions Any general questions about the course so far?
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
History, Structure and Function of the American Legal System 1 Court Systems and Practices.
Driver Education for the Information Superhighway: The Law and Policy of the Internet Steven J. McDonald Associate Legal Counsel The Ohio State University.
COPYRIGHT AND FAIR USE POLICIES By Amanda Newell.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Dispute Resolution Chapter 2. Judicial Review Marbury v. Madison –Establishes the idea of judicial review.
Civil Liberties and Public Policy. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against the government.
Bradley Lecture International IP Law IM 350 – Fall 2012 Steven L. Baron November 15, 2012.
CIVIL PROCEDURE CLASS 38 Professor Fischer Columbus School of Law The Catholic University of America November 18, 2005.
CIVIL PROCEDURE CLASS 33 Professor Fischer Columbus School of Law The Catholic University of America November 11, 2002.
Copyright – What you should know! Matthew Mayo and Martha Nixon EDTC 6149.
BA 619 Legal Environment of Business Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 47 Accountant’s Liability and Malpractice Twomey Jennings Anderson’s.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
The Judicial System The Courts and Jurisdiction. Courts Trial Courts: Decides controversies by determining facts and applying appropriate rules Appellate.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Copyright © Allyn & Bacon 2008 Chapter 7 Liability and Student Records This multimedia product and its contents are protected under copyright law. The.
Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
BA 665 Computers and the Law Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
CIVIL PROCEDURE CLASS 37 Professor Fischer Columbus School of Law The Catholic University of America November
Chapter 1.  That which must be obeyed and followed by citizens, subject to sanctions or legal consequences  A body of rules of action or conduct prescribed.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
The U.S. Legal System Module 1 NURS Summer II
Legal Basics for IT Professionals
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
HIPAA Administrative Simplification
Introduction to the American Legal System
Current Issues In Asset Seizure Under U.S. Law
Principles of Administrative Law <Instructor Name>
Chapter 3 The American Judicial System, Jurisdiction, and Venue
Jurisdiction Class 3.
Instructor Erlan Bakiev, Ph. D.
Jody Blanke, Professor Computer Information Systems and Law
The Issues with Technology in education
Introduction to the Law
Introduction to the Law
Chapter 1: Jurisdiction and Venue in Cyberspace.
Presentation transcript:

An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National Conference on Law and Higher Education

Agenda A Brief Overview of the First 500 Years of Internet Law Computer Use Policies: Do You Really Even Need One? Liability for Computer Misconduct: What You Don’t Know Probably Won’t Hurt You Meta-Geography and Cyberjurisdiction Privacy in Cyberspace (“Stalking 101”) Questions (and Maybe Even Some Answers)

A Brief Overview of the First 500 Years of Internet Law In the beginning was the word....

What is the Internet? A bulletin board A printing press A library A bookstore A television set and a television station A telephone, with lots of party lines and unlimited conference calling A post office...

What is the Internet? A medium of communication

And that means that... Everyone with Internet access is potentially an international publisher and broadcaster –Including your five-year-old This has some fairly significant legal implications –The same laws that apply to the New York Times, NBC, and NPR apply to Internet users –Including your five-year-old

Three Key Misconceptions Cyberspace is a separate legal jurisdiction –In fact, conduct that is illegal or a violation of policy in the “offline” world is just as illegal or a violation of policy when it occurs online Free access = free speech = unfettered speech –In fact, even public institutions may limit the use of their computer resources to business-related purposes If it’s technically possible, it’s legal –In fact, the technology has some legal implications, but it does not define the outer limits of the law

One Key Point Internet law (and policy) existed long before the Internet: –The law of libel –The law of privacy –The law of copyright –Criminal law –Your sexual harassment policy, code of student conduct, workplace rules –...

And Two Key Implications Internet-specific rules aren’t necessary and may create problems –Except when there are unique issues that aren’t already covered by generally applicable laws and policies Education is critical

New Whines and Old Battles It isn’t always immediately clear (surprise!) how the law applies to new situations For example, the law of libel developed long before there were Internet service providers So, are ISPs liable for the libels that occur on their systems?

The Law of the Horse “This case requires the law to add another paragraph to the ‘rules of the road’ for the ‘information superhighway’ and cyberspace. It is yet another testimony to the resiliency and flexibility of the case-by- case incremental development concept we inherited from the Common Law, which emphasizes adherence to [precedent]. As our superior court noted in United States v. Maxwell, new technologies present new challenges, but they are met by adapting existing legal concepts to them.” United States v. Monroe (A.F.C.C.A. 1999)

Key Dates in the Development of the Law of ISP Liability Fogg v. Boston & Lowell RR. Co Layne v. The Tribune Co Hellar v. Bianco Anderson v. New York Telephone Spence v. Flynt

Who is responsible? Publishers –Create content and hold it forth as their own –Directly liable for the libels they disseminate Distributors –Don’t create, but choose to, and actively do, distribute –Liable only if they “knew or should have known” that what they are distributing is libelous –No duty to prescreen Conduits –Operate a system by which other people communicate –No liability for libel, regardless of knowledge

Key Dates in the Development of the Law of ISP Liability Cubby v. CompuServe Stratton Oakmont v. Prodigy The Communications Decency Act Zeran v. America Online Lunney v. Prodigy

Whose law applies? Subject matter jurisdiction –Jurisdiction over the case Type of case Amount in dispute Personal jurisdiction –Jurisdiction over the parties Originally a matter of pure geography...

Judicial Geography

Internet Geography

Where do you want to be sued today?

A Really Big Shoe “[D]ue process requires only that in order to subject a defendant to a judgment in personam, if he be not present within the territory of the forum, he have certain minimum contacts with it such that the maintenance of the suit does not offend ‘traditional notions of fair play and substantial justice.’” International Shoe Co. v. Washington (U.S. 1945)

And Another “ We find that Sullivan, as the producer and master of ceremonies of ‘The Ed Sullivan Show,’ entered Arizona by producing the play entitled ‘A Case of Libel’ in New York City.... [T] he telecast of the show... in Arizona [was] voluntary, purposeful, reasonably foreseeable and calculated to have effect in Arizona....” Pegler v. Sullivan (Ariz. Ct. App. 1967)

Zippo Dee Doo Dah “[T]he likelihood that personal jurisdiction can be constitutionally exercised is directly proportionate to the nature and quality of commercial activity that an entity conducts over the Internet. This sliding scale is consistent with well developed personal jurisdiction principles.” Zippo Mfg. Co. v. Zippo Dot Com, Inc. (W.D. Pa. 1997)

Zippo’s Three Ways “If a defendant enters into contracts with residents of a foreign jurisdiction that involved the knowing and repeated transmission of computer files over the Internet, personal jurisdiction is proper.” “A passive Web site that does little more than make information available to those who are interested in it is not grounds for the exercise [of] personal jurisdiction.” “The middle ground is occupied by interactive Web sites where a user can exchange information with the host computer. In these cases, the exercise of jurisdiction is determined by examining the level of interactivity and commercial nature of the exchange of information that occurs on the Web site.”

International Jurisdiction Within the U.S., the law usually doesn’t vary much from state to state But the Internet doesn’t stop at national borders, either “In the information age, the whole planet is just a click away. So, unfortunately, are all the lawyers.” -- University Business “In cyberspace, the First Amendment is just a local ordinance.” -- variously attributed

The Key to Handling Online Privacy Issues Successfully Ignore the law

I know what you did last summer AnyWho – Lucas County Property Records – DejaNews – Privacy.net – Caches, History Files, Log Files and more

What is Privacy? “The right to be left alone -- the most comprehensive of rights, and the right most valued by a free people.” Justice Louis Brandeis Olmstead v. U.S. (1928)

The Legal Basis for Privacy: A Patchwork Quilt U.S. and State Constitutions –But no explicit reference in U.S. Constitution –Fourth Amendment (and State versions) Statutory Privacy –Electronic Communications Privacy Act (and State versions) –But also FERPA, State open records laws, and discovery rules –And much, much more The Common Law of Privacy

One Slight Problem: No One Understands This Stuff The Fifth Circuit on the Electronic Communications Privacy Act: –“[A] statute... which is famous (if not infamous) for its lack of clarity” -- Steve Jackson Games, Inc. v. United States Secret Service The Ninth Circuit on the Fifth Circuit: –“[T]he Fifth Circuit... might have put the matter too mildly.” -- U.S. v. Smith

The Fourth Amendment in Cyberspace Who owns the system? Who has access to the system? How does the system work? How is the system used? Is the system password-protected? What policies apply to the system? What is the ordinary practice?

Law Enforcement Access Under ECPA Voluntary or at government request? Obtained inadvertently or intentionally? In transmission or in storage? –In storage more than 180 days? Contents or log files? With consent of user or without? With notice to user or without?

Untangling the Privacy Mess Ignore the law Establish -- and follow -- a policy –Decide what expectations are reasonable –Obtain consent, explicitly or implicitly Options: –No privacy –Total privacy –Somewhere in between

Finally: Top 6 ½ Tips for Success 1. Forget about computers 1.5. Even in your use policy 2. Treat pornography as you would the Bible 3. Don’t (or do) get personal 4. Even publics should be private to some degree 5. Don’t go looking for trouble 6. Teach your children well