Online Privacy, Government, and Intellectual Property Rouda’s CSCI 101 class.

Slides:



Advertisements
Similar presentations
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Intellectual Property Image: William J. Wynn.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta 1.
New Developments in E- Commerce: Legal Issues Professor Nancy King Oregon State University Aarhus School of Business.
COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Privacy MGMT Summer 2012, Dannelly Night 3, Lecture Part 2.
USA PATRIOT ACT USA PATRIOT ACT
Ethics and Legal Issues in Computing
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Patents Copyright © Jeffrey Pittman. Pittman - Cyberlaw & E- Commerce 2 Legal Framework of Patents The U.S. Constitution, Article 1, Section 8:
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Intellectual Property and Online Privacy Doman’s CSCI 101 class.
Week 3: File sharing.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Chapter 5 Intellectual Property & Internet Law
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Intellectual Property Rights: Protection or Monopolization?
Intellectual Property Rights CSCI 327 Social Implications of Computing © ™© ™
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
CS110: Computers and the Internet Intellectual Property.
COPYRIGHT AND FAIR USE POLICIES By Amanda Newell.
Computer Ethics.
Intellectual Property (Part 1)
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
Fundamentals of Business Law Summarized Cases, 8 th Ed., and Excerpted Cases, 2 nd Ed. ROGER LeROY MILLER Institute for University Studies Arlington, Texas.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Civil Law. Law that governs private property, contracts and disputes involving individuals and businesses.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Jody Blanke, Professor Computer Information Systems and Law Mercer University, Atlanta 1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Understanding the Constitution
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Privacy and the Law.
Chapter 9: Internet Law, Social Media, and Privacy
Limiting the Right of Search
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
CS 115: COMPUTING FOR The Socio-Techno Web
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Computers and the Internet
Forensics Week 7.
Understanding Law: Mr Thompson, APT Academy
A Gift of Fire Third edition Sara Baase
Essentials of the legal environment today, 5e
The Surveillance State
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Online Privacy, Government, and Intellectual Property Rouda’s CSCI 101 class

SPAM Costs 90% of is SPAM consumes lots of disk space!!! bandwidth? CAN SPAM Act of 2003 The law permits marketers to send unsolicited commercial as long as it contains all of the following: an opt-out mechanism; a valid subject line and header (routing) information; the legitimate physical address of the mailer; and a label if the content is adult Ethics Issues

Web Censorship The US government does not censor content  several anti-web-porn laws have been struck down as unconstitutional  CIPA requires libraries to install filter software Many Foreign governments do censor web content  China and Google Are ISPs responsible for what their users' post?  maybe Ethics Issues

Workplace Privacy Question: How much privacy are you entitled to at work? Is your company allowed to read your ? … Answer: They can do almost anything. It is their office, their phone, their computer, etc. Legal Issues

Online Privacy Q: Does shopping online give you more or less privacy than actually walking into the store?  more privacy - your neighbors will not see you there  less privacy - online shopping gives the company much more info about you (exactly what you looked at, how long you looked, perhaps other places that you shop, etc…)

Your Digital Footprint Sources of Data about You 1. cookie files what web sites you visit 2. credit cards where you shop 3. preferred shopper programs what items you buy 4. credit history how much money you have, where you live, your age, etc. Future Sources of Data  RFID Tags  Cellular GEO-tagging

Online Privacy Example DoubleClick.com gathers cookie data from advertising banners placed on many web sites DC can cross-reference data to build profiles of individual users' surfing habits DC owns Abacus Inc., a consumer database company containing the names, addresses, phone numbers, etc... of 90% of American Households Google purchased DoubleClick in March 2008 for $3.1 Billion  In congressional hearings, Microsoft warned of a potential monopolistic effect Ethics Issues

Privacy vs. Government Can, and does, your government spy on you? Legal Issues

4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Katz vs. United States without a warrant, police placed a bug on the outside of a public phone booth used by Katz to make illegal bets In 1967, the US Supreme Court ruled Katz's rights were violated.  Katz reasonably thought his conversation was private, hence the recording was an illegal search and seizure  the 4 th amendment protects people, not places  the 4 th amendment governs seizure of tangible items, as well as recording of oral statements Legal Issues

Patriot Act allows officials to track s without showing probable cause allows roving surveillance for intelligence (not just crime investigation) tapped device does not have to be owned by the suspect search warrants no longer have to be served warrants for records do not require probable cause … Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Legal Issues

Intellectual Property Intellectual Property is any unique product of the human intellect that has commercial value. For example: books, songs, movies, software US Constitution The congress shall have the power to promote the progress of science and the useful arts, by securing for limited times to authors and inventors the exclusive rights to their respective writings and discoveries. Legal Issues

Trade Secrets  the invention is private Patents  the invention is public  inventor has exclusive rights for 20 years Trademarks Copyrights Protecting Intellectual Property

Ethics DMI - VJY2w&feature=related VJY2w&feature=related D6lbk&feature=related D6lbk&feature=related

Sony vs Universal Studios In 1976, Universal and Disney sued Sony stating that the Betamax enabled people to copy copyrighted material. In 1983, the supreme court ruled 5-4 that the private, noncommercial use of copyrighted material is "fair use". Also, the Betamax machine could copy non- copyrighted as well as copyrighted material. Legal Issues

MGM vs Grokster MGM et.al. sued because 90% of Grokster content was copyrighted. Lower court judge quickly ruled in favor of Grokster.  citing Sony vs Universal, Grokster has "substantial non-infringing uses"  August 2004 Supreme Court overruled in favor of MGM et.al.  "We hold that one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties."  June 2005, vote count was 9-0 Legal Issues

Digital Millennium Copyright Act making any copy of a digital copyrighted work is prohibited  eg. making a backup copy of a software application is illegal (unless the maker says okay). illegal to possess the technology to circumvent copyright protection technology  eg. figuring out how to decode a DVD that you own is illegal Legal Issues

Opinion Homework Is it okay to borrow software for a short time? Is it okay to borrow software for a short time? Write 3-5 paragraphs with your opinion on this subject and them to me at Write 3-5 paragraphs with your opinion on this subject and them to me at

Next Classes… Next Week: Storing Information image and movie files the defrag program (where is it on a Mac?) Information Security how viruses and malware work what is a firewall wireless Security Two Weeks from Today: Midterm Exam