The Case for The Right to Prevent Access Richard Warner.

Slides:



Advertisements
Similar presentations
Trespass to Chattels: eBay and Intel Richard Warner.
Advertisements

Chapter 15 Intentional Torts Intentional Torts - When people deliberately cause harm or loss to another person Intent – the desire to commit an act for.
Contracts and Communication John G. Huisman Fleissner Davis and Johnson
American Free Enterprise
Click Wrap Contracts Richard Warner.  Web sites typically contain an agreement defining the terms on which the web site may be used.  In many cases,
Keywords and Pop-Ups Richard Warner. Keyword Advertising  If you search on Google for U-Haul or Ryder Truck, several advertisements appear on the right.
By: Brad Templeton Presented by: Kelly Canales “10 Big Myths about Copyright Explained?”
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Riverside Community School District
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
The Free Market Why Do Markets Exist?. A market is an arrangement that allows buyers and sellers to exchange goods and services.
Different Types of Economies
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
Capitalism and Free Enterprise
Spam and The Computer Fraud and Abuse Act Richard Warner.
Business Law. Your neighbor Shana is using a multipurpose woodcutting machine in her basement hobby shop. Suddenly, because of a defect in the two-year.
Read to Learn Describe the three basic economic questions each country must answer to make decisions about using their resources.
Introduction to Economics Chapter 17
Characteristics of a Market Economy
Building a site on the World Wide Web requires more than simply learning the HTML language and starting out. You need to get a place to put your Web pages,
CMLS 2011 – Tucson Legal Seminar Listing Syndication – MLS Exec. Perspective.
Principles and Rules of Copyright Copyright is protection for intellectual property.
Objective 5.02 Understand ethics and ethical decision-making.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
For Real Estate Agents Farming Equipment Heavy Equipment Real Estate Motor Vehicles.
COMPUTER ETHICS Do you know the difference between right and wrong?
Improving availability strategically. In store availability Whose responsibility ? Who cares? Shelf filling or in-store logistics? In-store DC or DB (disorganised.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Capitalism and Free Enterprise Market economy is based on capitalism – Capitalism thrives on competition – Free enterprise is another term to describe.
Copyright © 2005 Pearson Education Inc. Marketing in the Digital Age Chapter 3 PowerPoint slides Express version Instructor name Course name School name.
Warm Up Turn to page 25 in your textbook Read “Consumer Action” What can Yolanda do to help her business be more profitable? How will she know if her price.
Intentional Torts. What are Intentional Torts? Actions that you take deliberately to cause harm Two types – those causing injury to people and those causing.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Case Against eBay Richard Warner. Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
By: Brad Templeton Presenter: Michael Brown Eng 393 Section 0301.
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
Trespass, Computers, and Networks. Scattered data Collected organized data Benefits at least some consumers The Generic Fact Pattern.
1 Introduction to Business and Economics Copyright Goodheart-Willcox Co., Inc. May not be posted to a publicly accessible website. Section 1.1 Introduction.
Legal Implications of Interconnectivity William Fisher July 4, 2002 © All rights reserved.
Basic Economic Concepts Economics: the discipline that deals with the allocation of scarce resources for the purpose of fulfilling society’s needs and.
FABRIZIO MONCALVO Case analysis. Case Analysis  Where the services of an intermediary, such as an operator of a website, have been used by a third party.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
Unit 1: What is economics all ABOUT? Chapters 1-6.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
EBay and Intel. eBay v. Bidder’s Edge eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the.
Design 11 Mr. Jean September 12 th, The plan: Video clip of the day Rules of Copyright Design of our world (15minutes) Assignment #1 –Editing and.
Protection of Databases Richard Warner. In the United States  Merely factual compilations of data in databases receive no copyright protection. Feist.
Unit 4 Dealing with Student Rights and Responsibilities in Public Schools.
Assessment PS502 Dr. Lenz. When and why assessments are performed Pre-employment screenings Evaluation and placement of children in school programs Determination.
Lawrence kholberg /kohlberg.html.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
Principles and Rules of Copyright
American Free Enterprise
Trespass in the Spam Cases
Basic Economic Concepts
Class Name, Instructor Name
E-Commerce and Economic Forces
American Free Enterprise
The Use and Abuse of the Carterfone Principle
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

The Case for The Right to Prevent Access Richard Warner

First Claim  The case for the right rests on two claims.  First: Internet systems contain information that, absent a right to prevent access, receives legal protection against appropriation and use by third parties.  Purely factual compilations of data receive no copyright protection, and, absent a right to prevent access, the information can be searched and extracted by others.

Second Claim  Second: it would promote both freedom and efficiency to protect this information by a right to prevent access.  The right promotes freedom by allowing the property owner to decide who can have access to and use his or her property.

Protecting Freedom  If we do not protect the freedom in this way, how will we determine the extent to which Internet system owners have control over their property?  Are we going to invent a new approach?  It is difficult to regulate appropriately when confronted with rapid and revolutionary technological, cultural, and economic change.

The Sensible Course  The sensible course is to start with a model which is relatively well-understood and whose consequences are predictable with some accuracy; and then  adapt the model to the new situations we confront on the Internet.

Promoting Efficiency  A commitment to a free market economy is a commitment to letting market participants decide to what, when, and with whom they buy and sell.  Other things being equal, letting market participants decide is more efficient than taking the decision out of their hands

Efficiency and Property Rights  Property rights play an essential role in placing market decisions in the hands of market participants.  Not only do they define who is entitled to exchange what;  they also enable sellers to control with whom they share business resources and to whom they will sell, as well as where, when and how they do so.

 In the brick-and-mortar world, trespass to land and trespass to chattels provide a business with a broad right to control access to its real and personal property Cullane v. State (282 Ark. 286, 668 S. W. 2d 24 (S. Ct. Ark. 1984)  Why not do so on the Internet?  Let’s look more closely at the need for such protection. Brick-And-Mortar Analogy

The eBay Business Context  eBay’s revenue depends on a network effect.  To see why, ask: why do buyers go to eBay? Because it has the most items for sale. Why is that?  Because most sellers use eBay.  Why? Because most buyers use it.  So...

A Network Effect  So: most buyers and sellers use eBay because most buyers and sellers expect most buyers and sellers to use eBay.  This ensures that most buyers and sellers do in fact continue to use eBay,  which ensures that most buyers and sellers will continue to expect most buyers and sellers to use eBay,  which ensures that...

The Network Effect and Revenue  eBay’s revenue depends on this network effect.  Its revenue comes from primarily from transaction fees charged to sellers.  The fees are relatively small, so eBay has to have a large volume of sales.  eBay’s size matters for this reason, and its size is a function of the network effect.

Bidder’s Edge’s Threat  Bidder’ Edge threatened to undercut eBay’s network effect.  Imagine large numbers of buyers had begun to use Bidder’s Edge in preference to any other site, and imagine you are a seller.  Where should you post your item for sale?

It Does Not Matter  No matter where you put it, buyers will find it on Bidder’s Edge.  Hence, sellers would no longer have a powerful motive to post on eBay.  eBay’s network effect would be undercut.

Defense for eBay?  Should eBay be able to defend itself against this threat?  Surely it should.  Does it already have adequate legal protection?

Computer Fraud and Abuse Act  Does the Computer Fraud and Abuse Act provide the desired protection?  Only if eBay lost at least $5000 as a result of Bidder’s Edge’s activities.  eBay probably lost very little if anything.

What eBay Wants  eBay is looking for an injunction to stop Bidder’s Edge before it causes significant damage.  Compare EF Cultural Travel v. Explorica, where:  There was sufficient damage;  The access was discovered long after it happened.

IP Law Protection?  Trademark violation? No. No trademarked items involved. Compare Oyster Software v. Forms Processing, which involved copying trademarked language in metatags.

Copyright violation?  The data Bidder’s Edge wants is factual information complied in a database, and, under Feist, there is no copyright protection. Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340 (1991).  The situation is the same in Register.com v. Verio and Tickets.com v. Ticketmaster.

Trespass To Chattels  We can provide protection via trespass to chattels. But should we follow eBay or Intel?  eBay: any intentional, unauthorized use of another computer system is trespass.  Intel: intentional, unauthorized use is a trespass only when it sufficiently impairs value or sufficiently harms a relevant interest. Just using computer capacity is not enough.

Looks Like Intel  It looks like we should follow Intel.  What eBay wants to protect itself from is a threat to its business.  In the brick-and-mortar cases, we allow businesses to protect themselves from just such a threat by finding a trespass.  So why not count the business threat as a sufficient harm?

The Problem  We need to develop a systematic view of what counts as a impairment/harm that will provide a principled ground for deciding particular cases.  This is likely to prove very difficult as there will be many different types of impairment and harm.  Why are some impairments and harms sufficient for trespass while others are not?

An Example  Rex owns and runs Real Web Babes (RWB), a web site consisting of a collection of hyperlinks to web pages with pictures of women.  RWB links to resumes containing pictures of women; to personal web sites displaying pictures of vacations; and so on.  Rex catalogues the pictures in terms of attractiveness on a 1 to 10 scale.

Example Continued  He collects the links using automated robot search software which he sends to publicly accessible web sites.  Sally maintains a personal web site on which she displays pictures of her vacations.  Rex links to the site.  Sally is offended, and she notifies Rex that he is not authorized to link to her site.

Trespass?  Rex does not remove the link.  Instead, he posts a message that quotes Sally’s demand that RWB not link to her site, and adds “Don’t let this one tell us what we can and can’t do!” John, a visitor to Rex’s site, reads the posting and uses the link.  Should we regard Sally’s offense a sufficient impairment in value or harm to support a trespass to chattels claim?

How Broad A Right?  Conclusion: an Internet system should have the right to prevent access when there is sufficient harm to the business.  We have not argued that a system owner should be able to turn any access into a trespass simply by informing the other party that such access is no longer authorized.

A Better Alternative  Go back to eBay; count any use of computing capacity as an impairment of value.  To see how to limit the right, recall that trespass to chattels involves intentional, unauthorized access; and, by making an Internet system publicly accessible, the system owner impliedly consents to public access.

Limiting the Right  So: we can limit the right to prevent access by developing a doctrine about when consent is implied, and when it is, and is not, revocable.  We hold that a publicly accessible web site gives implied consent (across a wide range of cases) to receiving , searches by search engines, and to various forms of hyperlinking.  We hold that consent can be revoked in these cases only in exceptional circumstances.