Driver Education for the Information Superhighway: The Law and Policy of the Internet Steven J. McDonald Associate Legal Counsel The Ohio State University.

Slides:



Advertisements
Similar presentations
Chapter 3 The American Judicial System, Jurisdiction, and Venue
Advertisements

Look What I Did! Student Conduct, Online Communities, and You Derek Smith & Jessica Tittermary Delaware Valley College MACUHO Annual Conference October.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
Copyright © Jeffrey Pittman Jurisdiction. Pittman - Cyberlaw & E-Commerce 2 Jurisdiction refers to a court’s power to hear and decide a case –
IS3350 Security Issues in Legal Context
Internet Jurisdiction Law of e-Commerce Copyright, Peter S. Vogel,
Abbreviated Chapter Outline
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
Actg 6100 Legal Issues Chapter 3 Courts and Alternative Dispute Resolution.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
ISP Liability for Defamation and Copyright Violation Richard Warner.
Internet and Laws University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and.
Law for Business and Personal Use
American Tort Law Carolyn McAllaster Clinical Professor of Law Duke University School of Law.
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
CONCEPTUAL FRAMEWORK Choosing a Trial Court
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
An Introduction to Internet Law (Psst: There's no such thing!) Steven J. McDonald General Counsel Rhode Island School of Design Margie Hodges Shaw University.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2005.
An Introduction to Internet Law (Psst: There's no such thing!) Steven J. McDonald General Counsel Rhode Island School of Design and Robert W. Hamilton.
Standards and Guidelines for Web Page Publishing December 9, 2009.
+ Protecting Individual Liberties Section 1 Chapter 14.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
Office of the General Counsel1 COPYRIGHT and the TEACH Act The Technology, Education, and Copyright Harmonization Act Copyright © 2007 Villanova University.
© 2011 South-Western | Cengage Learning GOALS LESSON 1.1 LAW, JUSTICE, AND ETHICS Recognize the difference between law and justice Apply ethics to personal.
Unit 2 Seminar Jurisdiction. General Questions Any general questions about the course so far?
An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Electronic Use Policies.   Social Media  Internet.
History, Structure and Function of the American Legal System 1 Court Systems and Practices.
COPYRIGHT AND FAIR USE POLICIES By Amanda Newell.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Dispute Resolution Chapter 2. Judicial Review Marbury v. Madison –Establishes the idea of judicial review.
Civil Liberties and Public Policy. The Bill of Rights– Then and Now Civil Liberties – Definition: The legal constitutional protections against the government.
Bradley Lecture International IP Law IM 350 – Fall 2012 Steven L. Baron November 15, 2012.
CIVIL PROCEDURE CLASS 38 Professor Fischer Columbus School of Law The Catholic University of America November 18, 2005.
CIVIL PROCEDURE CLASS 33 Professor Fischer Columbus School of Law The Catholic University of America November 11, 2002.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
BA 619 Legal Environment of Business Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
The Judicial System The Courts and Jurisdiction. Courts Trial Courts: Decides controversies by determining facts and applying appropriate rules Appellate.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
BA 665 Computers and the Law Introduction to the Law Jody Blanke, Professor Computer Information Systems and Law.
CIVIL PROCEDURE CLASS 37 Professor Fischer Columbus School of Law The Catholic University of America November
The Internet and freedom of expression law Training workshop on media and freedom of expression law.
Chapter 1.  That which must be obeyed and followed by citizens, subject to sanctions or legal consequences  A body of rules of action or conduct prescribed.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Legal Basics for IT Professionals
Surveillance around the world
Chapter 9: Internet Law, Social Media, and Privacy
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Chapter 10 Cyberlaw, Social Media, and Privacy
HIPAA Administrative Simplification
Chapter 3 The American Judicial System, Jurisdiction, and Venue
Jurisdiction Class 3.
Online Legal and Ethical Issues
Jody Blanke, Professor Computer Information Systems and Law
The Issues with Technology in education
Introduction to the Law
Introduction to the Law
Chapter 1: Jurisdiction and Venue in Cyberspace.
Presentation transcript:

Driver Education for the Information Superhighway: The Law and Policy of the Internet Steven J. McDonald Associate Legal Counsel The Ohio State University 22nd Annual National Conference on Law and Higher Education

Agenda A brief overview of Internet law since 1728 Computer use policies: Do you really even need one? Liability for computer misconduct: What you don’t know probably won’t hurt you Meta-geography and cyber-jurisdiction Privacy in cyberspace (“Stalking 101”) Questions (and maybe even some answers)

Two Views on Internet Law “In the future, virtually all law will be Internet law in one way or another.” –George Gilder Internet law is all law, right now.

A Brief Overview of Internet Law Since 1728 In the beginning was the word....

What is the Internet? A bulletin board A printing press A library A bookstore A television set and a television station A telephone, with lots of party lines and unlimited conference calling A post office...

What is the Internet? A medium of communication

And that means that... Everyone with Internet access is potentially an international publisher and broadcaster –Including your five-year-old This has some fairly significant legal implications –The same laws that apply to the New York Times, NBC, and NPR apply to Internet users –Including your five-year-old

Three Key Misconceptions Cyberspace is a separate legal jurisdiction –In fact, conduct that is illegal or a violation of policy in the “offline” world is just as illegal or a violation of policy when it occurs online Free access = free speech = unfettered speech –In fact, even public institutions may limit the use of their computer resources to business-related purposes If it’s technically possible, it’s legal –In fact, the technology has some legal implications, but it does not define the outer limits of the law

One Key Point Internet law (and policy) existed long before the Internet: –The law of libel –The law of privacy –The law of copyright –Criminal law –Your sexual harassment policy, code of student conduct, workplace rules –...

And Two Key Implications Internet-specific rules aren’t necessary and may create problems –Except when there are unique issues that aren’t already covered by generally applicable laws and policies Education is critical

Driver Education for the Information Superhighway Ohio State: Virtual Legality – James Madison: Electronic Information Security User Education – Cornell: Travelers of the Electronic Highway –

New Whines and Old Battles It isn’t always immediately clear (surprise!) how the law applies to new situations For example, the law of libel developed long before there were Internet service providers So, are we liable for the libels that occur on our systems?

The Law of the Horse “This case requires the law to add another paragraph to the ‘rules of the road’ for the ‘information superhighway’ and cyberspace. It is yet another testimony to the resiliency and flexibility of the case-by- case incremental development concept we inherited from the Common Law, which emphasizes adherence to [precedent]. As our superior court noted in United States v. Maxwell, new technologies present new challenges, but they are met by adapting existing legal concepts to them.” United States v. Monroe (A.F.C.C.A. 1999)

Key Dates in the Development of the Law of ISP Liability The King v. Clerk Fogg v. Boston & Lowell RR. Co Layne v. The Tribune Co Hellar v. Bianco Anderson v. New York Telephone Spence v. Flynt

Who is responsible? Publishers –Create content and hold it forth as their own –Directly liable for the libels they disseminate Distributors –Don’t create, but choose to, and actively do, distribute –Liable only if they “knew or should have known” that what they are distributing is libelous –No duty to prescreen Conduits –Operate a system by which other people communicate –No liability for libel, regardless of knowledge

Key Dates in the Development of the Law of ISP Liability Cubby v. CompuServe Stratton Oakmont v. Prodigy The Communications Decency Act Zeran v. America Online Digital Millennium Copyright Act Lunney v. Prodigy

Whose law applies? Subject matter jurisdiction –Jurisdiction over the case Type of case Amount in dispute Personal jurisdiction –Jurisdiction over the parties Originally a matter of pure geography...

Judicial Geography

Internet Geography

Where do you want to be sued today?

A Really Big Shoe “[D]ue process requires only that in order to subject a defendant to a judgment in personam, if he be not present within the territory of the forum, he have certain minimum contacts with it such that the maintenance of the suit does not offend ‘traditional notions of fair play and substantial justice.’” International Shoe Co. v. Washington (U.S. 1945)

And Another “ We find that Sullivan, as the producer and master of ceremonies of ‘The Ed Sullivan Show,’ entered Arizona by producing the play entitled ‘A Case of Libel’ in New York City.... [T] he telecast of the show... in Arizona [was] voluntary, purposeful, reasonably foreseeable and calculated to have effect in Arizona....” Pegler v. Sullivan (Ariz. Ct. App. 1967)

Zippo Dee Doo Dah “If a defendant enters into contracts with residents of a foreign jurisdiction that involved the knowing and repeated transmission of computer files over the Internet, personal jurisdiction is proper.” “A passive Web site that does little more than make information available to those who are interested in it is not grounds for the exercise [of] personal jurisdiction.” “The middle ground is occupied by interactive Web sites where a user can exchange information with the host computer. In these cases, the exercise of jurisdiction is determined by examining the level of interactivity and commercial nature of the exchange of information that occurs on the Web site.” Zippo Mfg. Co. v. Zippo Dot Com, Inc. (W.D. Pa. 1997)

So, what does that mean for us? “Under the facts presented here, the court finds that while there has been no showing that contracts are entered into over the Johns Hopkins' website, the website is more than passive advertisement. It offers a means of transferring information, recruiting students, receiving donations from alumni, and soliciting and conducting business. As such, the Johns Hopkins' website has a sufficient level of interactivity and commercial nature to place it in the middle range of the sliding scale....” Peyman v. Johns Hopkins University (E.D. La. 2000)

International Jurisdiction Within the U.S., the law usually doesn’t vary much from state to state But the Internet doesn’t stop at national borders, either “In the information age, the whole planet is just a click away. So, unfortunately, are all the lawyers.” -- University Business “In cyberspace, the First Amendment is just a local ordinance.” -- variously attributed

The Key to Handling Online Privacy Issues Successfully Ignore the law

I know what you did last summer AnyWho – Lucas County Property Records – DejaNews – Privacy.net – Caches, History Files, Log Files, and more

What is Privacy? “[T]he right to be let alone -- the most comprehensive of rights, and the right most valued by civilized men.” Justice Louis Brandeis Olmstead v. U.S. (1928)

The Legal Basis for Privacy: A Patchwork Quilt U.S. and State Constitutions –But no explicit reference in U.S. Constitution –Fourth Amendment (and State versions) Statutory Privacy –Electronic Communications Privacy Act (and State versions) –But also FERPA, State open records laws, and discovery rules –And much, much more The Common Law of Privacy

One Slight Problem: No One Understands This Stuff The Fifth Circuit on the Electronic Communications Privacy Act: –“[A] statute... which is famous (if not infamous) for its lack of clarity” -- Steve Jackson Games, Inc. v. United States Secret Service The Ninth Circuit on the Fifth Circuit: –“[T]he Fifth Circuit... might have put the matter too mildly.” -- U.S. v. Smith

The Fourth Amendment in Cyberspace Who owns the system? Who has access to the system? How does the system work? How is the system used? Is the system password-protected? What policies apply to the system? What is the ordinary practice?

Law Enforcement Access Under ECPA Voluntary or at government request? Obtained inadvertently or intentionally? In transmission or in storage? –In storage more than 180 days? Contents or log files? With consent of user or without? With notice to user or without?

Untangling the Privacy Mess Ignore the law Establish -- and follow -- a policy –Decide what expectations are reasonable –Obtain consent, explicitly or implicitly Options: –No privacy –Total privacy –Somewhere in between

OSU’s Computer Use Policy: Privacy Use of university-provided computing resources is not completely private But we don’t monitor individual use routinely But we may monitor individual use when we suspect misconduct or misuse But any such monitoring must be pre- approved by the CIO or the CIO’s designee

Finally: Top Five Tips for Success 1. Forget about computers 2. Treat pornography as you would the Bible 3. Even publics should be private 4. Don’t go looking for trouble 5. Teach your children well