Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000.

Slides:



Advertisements
Similar presentations
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Advertisements

Intellectual Property Protection Considerations in a Global Economy Keith D. Grzelak, Chair IEEE-USA Intellectual Property Policy Committee.
1 Prof. Dr. Josef Drexl Unit for Intellectual Property and Competition Law Max Planck Institute for Intellectual Property, Competition and Tax Law International.
UN Comprehensive Study on Cybercrime
What is the job of a football referee?. The United Nations Aims What is it? History of… UN Charter.
Advocacy in Brussels. What not to do…… What do we want?
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Section 1: Constitution
Office of the U.S. Trade Representative Kira M. Alvarez CHIEF NEGOTIATOR AND DEPUTY ASSISTANT U.S.T.R. For intellectual property enforcement.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Global Marketing Management, 5e
Chapter 5 Copyright (c) 2007 John Wiley & Sons, Inc. 1 Global Marketing Management, 4e Chapter 5 Political and Legal Environments.
Legal, Ethical, and Professional Issues in Information Security
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Chapter 7 The environment of electronic commerce: legal, ethical, and tax issues Joseph Mitchum and TsunSheng, Tao.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
The Digital Millennium Copyright Act (DMCA) Claire Stewart MM450 February 14, 2006.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
Introduction to IT and E- Commerce Law and Policy Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Program in IS Management Department.
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
Framework of IPR Introduction International IP Law - Course Professor Niklas Bruun IPR University Center University of Helsinki 25 October 2010.
Intellectual Property
NEW FRONTIERS EDP May 2013 – Nov 2013 David Brophy - FRKelly Protecting IP David Brophy An introduction to Chinese IP law.
JOURNAL QUESTIONS FOR CHOOSE TWO TO ANSWER! Why is it important for consumers to know what is in food products? What kinds of things do you need.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Global Marketing Management, 5e Chapter 5Copyright (c) 2009 John Wiley & Sons, Inc. 1 Chapter 5 Political and Legal Environments.
Computer Legislation The need for computer laws Go to Contents.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
For Computer Use in Business
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
What are they? Why do we have them?
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
CS 306 Unit 5 Societal Institutions: Law. Politics, Education, and Military The Copyright Paradox, Jonathon Band Fighting Content Piracy in the Digital.
CHAPTER 3 INTERNATIONAL LAW DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
The Pirates of North Africa How this political issue affected the Articles of confederation.
Internet Safety. Let’s Take Questions First! ● On your notecard, please write down 1- 2 questions you have regarding internet safety.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
1 WIPO NATIONAL SEMINAR ON INTELLECTUAL PROPERTY RIGHTS AND THE PROTECTION OF PHARMACEUTICAL PRODUCTS Damascus, April 25 and 26, 2005 Effective Protection.
Intellectual Property Rights. Are associated with:  Patents  Trademarks  Copyrights  Trade secrets  Protective devices granted by the state to facilitate.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
CLASSIFYING LAW. CLASSIFYING THE LAW Our laws get divided or classified in a number of ways: SUBSTANTIVE LAW – (The Substance of law) consists of all.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Chapter 4: Laws, Regulations, and Compliance
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Chapter 26 International Law and Global Commerce Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Charbel Fakhoury General Manager, Microsoft Eastern Mediterranean The Economic Consequences of Software Piracy Beirut, Lebanon May 5, 2003.
LAW 421 Week 2 DQ 2 To purchase this material link 421-Week-2-DQ-2 For more courses visit our website
by John Bagby and F. William McCarty
Ethical, Social, and Political Issues in E-commerce
Comparative legal studies (Zinkovskiy Sergey, associate professor, PhD Department of the Theory and History of State and Law) Topic 3 Problems of harmonization.
PICS: Platform for Internet Content Selection
Chapter 14 Online Commerce and E-Contracts
Copyright laws A Comparative Analysis of Global Copyright Laws and the Evolution of Copyright Law in Canada.
Laws that Regulate Businesses
Cyber Law and E-Commerce
Presentation transcript:

Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000

Human Stages First Stage –Natural life (no rules) Second Stage –“Civilization” Third Stage –Internet

First Stage Live and grow alone, if you need or want something… you build, create or just take it from some one else (weaker than you) ALL IS PERFECT!!!

First Stage BUT ALL CHANGE!!! Why? Because every one is doing the same and some are stronger than others (even you), and take advantage of that.

First Stage What to do?

First Stage Finish the conflict by my self, but, –Is that enough? Finish the conflict WITH the other Do nothing?

First Stage NO!

Fist Stage Let’s create something powerful than all of us and because of that it will be able to protect us.

Second Stage “Civilization” Something call NATION-STATE define by Merriam-Webster Collegiate Dictionary as: a form of political organization under which a relatively homogeneous people inhabits a sovereign state; especially : a state containing one as opposed to several nationalities

Second State “Civilization” Why the NATION-STATE control many things? –Because WE gave that right out FEAR of each others How the NATION-STATE do that? –“using” it’s elements like the tree branches So, it’s a favor? –NO! it’s his obligation, and must do anything to do that. (our goals)

Second State “Civilization” How will protect me against the others? –With rules that all of us must follow, if not, we will prosecute and punish What about the other countries? –Being more powerful and looking for international understanding and cooperation How will be able to do all that? –Taxes that I supposed to pay, that’s my daily contribution

Second Stage “Civilization” But, that “security” implies that I will be tracked? How will do that? What about my PRIVACY?

Second Stage “Civilization” Privacy Vs. Security “VERSUS”!!?? Is in that way? What is he looking? I had something to hide?

Second Stage “Civilization” He is with you, no against you.

Third Stage INTERNET, where the borders are? Who knows, what is he going to do? YOU KNOWS!!!

Third Stage MY SAFE Why? Because it’s his obligation How? Using ALL the tools available to him

Third Stage There is two Issues on internet to be protected for de NATION-STATE: - What the people does on internet (hack, crack etc) - What the people says on internet

Third Stage Can we fight against that issues? Of course we can, but we can’t, why? Because that why the NATION- STATE is. What happen if the NATION-STATE doesn’t work? In that case we can act?…

Third Stage Internet is more that Illinois, more that Southwest, more that U.S.A., more that North America, Nafta, even much more than a America as a continent.

Third Stage If the problem affect only Illinois, or U.S.A., even the Nafta group, there is no so much problem, because there is a few regulation to punish that’s actions, some of that regulation are: -Communications Decency Act (CDA) -Child Pornography Prevention Act (CPPA) -Child Online Protection Act (COPA) -Children’s Online Privacy Protection Act (COPPA) -Digital Millennium Copyright Act (DMCA) -Uniform Computer Information Transaction ACT (UCITA)* -Uniform Trade Secrets Act (UTSA)* *Proposed by National Conference of Commissioners on Uniform State Laws (NCCUSL)

Third Stage If the conflict is international there is a few regulations like: -Patent Cooperation Treaty (PCT) -Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) -Some models law from international organizations like the commission of the United Nations, also know as UNCITRAL

Third Stage The regulation is enough? No the regulation MUST contain some kind of an effective ENFORCEMENT MECHANISMS, and these mechanisms MUST be applied in ALL the cases why? Because the goal of the sanction is to punish and to show that to others.

Third Stage That’s “easy” in the real world, but how do that in Internet? When something happen on internet we need to do: 1. Stop the illegal action 2. Punish the one who did it.

Third Stage STOP THE ILLEGAL ACTION 1. How internet works 2. How the people can access to that information 3. How we can stop that? AND THEN???

Third Stage BACK TO REAL WORLD!!! Create a global legislation, and then all the countries use that legislations for his own legislations.

Third Stage COOPERATION IS THE CLUE!!!