Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.

Slides:



Advertisements
Similar presentations
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
Advertisements

Why E-Commerce is Like a Bottle of Tylenol Professor Peter P. Swire Ohio State Law School Conference on New Technologies and International Governance February.
Finding the Best of the Imperfect Alternatives for Privacy, Health IT, and Cybersecurity Peter Swire Moritz College of Law Wisconsin Symposium in Honor.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Trust Over Time on the Internet Peter Swire Moritz College of Law Penn Law School Symposium on the Evolving Internet October 19, 2012.
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
Trustwrap: The Importance of Legal Rules to E-Commerce and Internet Privacy Professor Peter P. Swire Moritz College of Law The Ohio State University Enforcing.
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Silicon Flatirons.
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Freedom of Speech (Part 3)
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
1 Freedom of Expression Prepared By Joseph Leung.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
E-Commerce: Regulatory, Ethical, and Social Environments
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
4-1 Technology – Impact on Our Lives Information technology– processes and applications that create new methods to solve problems, perform tasks, and manage.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Jamel Callands Austin Chaet Carson Gallimore. Downloading
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
State and Local Government FEDERALISM. Public Policy If people do not agree on the solution to a public problem, issues arise. An issue is a point of.
SNB - REACT Business Perspective IPR Protection April 1, 2009 Presentation Eli Mufisovski.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
Transposition of the E-Commerce directive in Estonia Workshop on Electronic Commerce Directive Belgrade.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
IT Security  .
Ethical, Social, and Political Issues in E-commerce
Seminar On Cyber Crime Submitted To: Submitted By:
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 13 Security and Ethical Challenges.
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime
Shandong University of Finance and Economics, China
Presentation transcript:

Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review Symposium November 12, 2004

Overview n Elephants and Mice n What weve learned since 1998 n When does choice of law matter on the Internet? n Surveillance as a (controversial) tool for increasing the enforceability of law on the Internet

I. Elephants and Mice n Metaphor for when law and choice of law most likely to be effective on the Internet n Elephants: – Powerful, thick skin, impossible to hide – Subject to jurisdiction & COL – Can lobby & influence laws – Will have to comply once laws are in force

Elephants and Mice n Mice: – Small and mobile: porn and piracy sites that can reopen elsewhere if shut down – Breed annoyingly quickly: new sites open – Hide offshore & in crannies of network – Jurisdiction often doubtful & rarely enter the light of open court to dispute COL

II. Since 1998 n 1998 article predicted or described areas for Internet COL disputes: – Areas of COL conflict: privacy; hate speech; treasonable/political speech; defamation; taxation; gambling; pornography; intellectual property – Areas of possible conflict: labor laws; professional licensing – Analysis of B-to-C E-Commerce

Not Predicted in 1998 n Spyware/adware: adware by large companies (elephants) and law can address that; some spyware by mice n Cybercrime was missing – Computer hacking – Computer viruses – Identity theft – Phishing

III. When does COL Matter on the Net? n The task here: COL as a dependent variable n When will the COL rule matter on the Internet? – Law works (despite tech counter-measures)? – Is there jurisdiction? – Lack of harmonization? – Lack of self-regulation? – IFF yes to all these, then COL rule matters

Technology and Law n Early romantic view that the Internet treats censorship (or regulation) as damage, and routes around it n In practice, have not seen much strong encryption, untraceable e-cash, & untraceable routing of communications n Tech counter-measures less than many predicted, so law more likely to be effective

Is There Jurisdiction? n For elephants, there will often be jurisdiction & ability to enforce judgments (assets in country) n Some elephants (Yahoo) defend with corporate separateness – May work legally, less desirable for local companies n For mice, less likely to have jurisdiction, and enforceability of judgments is even less

Is There Harmonization? n Some harmonization, such as for privacy (Safe Harbor) & IP (TRIPS) n Major gaps, such as privacy (Safe Harbor), hate speech, treason, defamation, gambling, taxation, etc. n Big change since 1998 is COE Cybercrime Convention – Dual criminality & cooperation in investigations

Is There Self-Regulation? n COL in E-Commerce minimized by other systems – Credit card agreements – Clicks and bricks retailers, with local law applying – eBay, with its own legal & reputation systems n These self-regulatory systems have won in the market (my Trustwrap article)

International COL May Matter n Even when a case survives the filters, international E-Commerce less than predicted in 1998 – E-Commerce growth has not matched the expectations of the bubble – Self-regulatory systems reduce COL – Direct, transnational sales to consumers less than expected

Whats Left? n The 1998 list against elephants: – Hate speech (Yahoo!) – Defamation (Australia case) – Privacy (future of the Safe Harbor) – Internet gambling (WTO action) n In short, important but limited categories of cases raise COL issues on the Internet

Conclusion: Surveillance? n There are numerous other actions, by mice, that cause harm over the Internet in the eyes of at least some countries, – Piracy – Spam – Child or other pornography – Hacker and virus attacks – Terrorist communications & attacks

Surveillance could solve these n The temptation is to increase surveillance of Internet usage so that these mice cant hide n A key variable to how these harms get resolved among nations is likely to be the level of surveillance created over the Internet, more than decisions about COL

Conclusion n In the surveillance debates, the image of annoying-but-charming mice could become an image of rabid & dangerous rats n In the post-9/11 world, a major inquiry should be deciding in what ways and under what procedural protections surveillance of the Internet will exist. n Thats an important job (says the privacy scholar), but for another day