FIDIS - Future of Identity in the Information Society Identity in the Context of Civil Law - discussion FIDIS - WP 2 Fontainebleau - 10th December 2004.

Slides:



Advertisements
Similar presentations
UN Comprehensive Study on Cybercrime
Advertisements

Working world wide against HIV for the health and human rights of men who have sex with men Working world wide against HIV for the health and human rights.
© JANET(UK) 2011 Running a Public Communications Service Andrew Cormack Chief Regulatory Adviser, Janet
IP enforcement and privacy rights: Let's keep the balance! Etienne Wéry Partner, Ulys ( Attorney at Law – Paris’
UN Guiding Principles on Business and Human Rights
Intellectual Property Image: William J. Wynn.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Slide 1 Whois Workshop, ICANN Montreal Meeting Topic, June 2003 Privacy and Data protection consideration of the Whois directories discussion Diana ALONSO.
© OECD SIGMA A joint initiative of the OECD and the European Union, principally financed by the EU © OECD SIGMA A joint initiative of the OECD and the.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Supporting Further and Higher Education JISC Legal Information Service 21 January 2003 Introduction to Copyright John Kelly JISC Legal.
Whistleblower Protection Institution Overview of Georgian Legislation and international experience Maia Dvalishvili Deputy Head, Civil Service Bureau of.
Changes to copyright exceptions for libraries and archives Robin Stout Copyright Policy Intellectual Property Office.
COPYRIGHT, DESIGNS & PATENTS ACT (1988) By Hassan Hanif & Dharamdeep Janjua.
LAW OF TORT Overview. Objective To place the law of tort in context In world legal systems In UK law.
Copyright / Legal liability Paul Van den Bulck Brussels 28 November 2002 Law of : New Technologies Intellectual.
Nicola Lucchi Department of Accounting & Law Jönköping International Business School INTERNET CONTENT GOVERNANCE & HUMAN RIGHTS.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
FACEBOOK CASE: a French experience Amal TALEB UFC – QUE CHOISIR April 21st, 2015.
Working towards responsible business practices in the oil and gas sector Rose Kimotho Programme Manager (East Africa) Institute for Human Rights and Business.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
Open Competition Intellectual Property Specialists (AST 3/ AD6) OHIM, Alicante – Spain Open for application: October 31st 2013 Apply before : December.
Baker & McKenzie Presented by Gabriela Vendlova 3 December 2002 Intellectual Property Rights: Importance of Trademark Protection in the Digital World.
1 Melbourne Law School University of Melbourne IP trends in the European Union: an overview of recent decisions of the Court of Justice Enrico Bonadio.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
SPARKS Project Nick Lester Director of Transport, Environment & Planning London Councils.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Computer Ethics.
Computer Legislation The need for computer laws Go to Contents.
@RochRipley UBC VGL October 16, 2013 I’ve Returned from the IP Dystopia.
Copyright / Legal liability Paul Van den Bulck Brussels 6 th of february 2004 Law of : New Technologies Intellectual.
CPTWG MEETING #111 July 23, 2008 Legislative/Litigation Update Jim Burger
Copyright / Legal liability Paul Van den Bulck Brussels 6 th of june 2003 Law of : New Technologies Intellectual.
1 VIDEO SURVEILLANCE (public/private areas) TOMÁŠ MIČO The Office for Personal Data Protection of the Slovak Republic.
CHARTER OF FUNDAMENTAL RIGHTS General overview, history and evolution.
“Commercialization and enforcement of intellectual property rights” - Skopje, April 2009 UNECE ‘Recommendation M’ on the Use of Market Surveillance.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
Seven Expectations of the legal system:
Chapter 4 Review. TEST NEXT CLASS PERIOD Make sure you study the 7 Steps in a civil case and the 9 steps in a criminal/jury trial.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
LEGALESE BLONDE RIAA vs. NAPSTER Daniella Nero University of Hawaii at Manoa AMST 334 Sp-13.
TRADE MARKS: LATEST EU CASE LAW ON ENFORCEMENT By Annick Mottet Haugaard Attorney at law, 2nd Vice President ECTA International Baltic Conference on Intellectual.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Illegal downloading Allison LEROY Clara MANSUY Nabila MENSOURI Jérôme MIHOUBI.
Intellectual Property. Rights to Digital Media You buy a CD.
DG Information Society The EU and Data Retention Data Retention Meeting London, 14 May 2003 Philippe GERARD, DG Information Society The positions.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
The Directive on Enforcement and The Customs Regulation Warsaw May 2006 Martin Ekvad Community Plant Variety Office Head of Legal Affairs.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Sharing Personal Information Programme Wales Accord on the Sharing of Personal Information (WASPI) for organisations involved in the protection, safety,
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
Recording Industry Association of America (RIAA) v. Jammie Thomas Capitol v. Thomas.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Civil Law vs. Criminal Law. Criminal Law Offenses against society as a whole that violate a statute that prohibits some type of activity. In criminal.
DERECHOS DE AUTOR EN LÍNEA. EL MODELO REGULATORIO ESPAÑOL DERECHOS DE AUTOR EN LÍNEA. EL MODELO REGULATORIO ESPAÑOL Copyright online. The Spanish regulatory.
Dr. Victoria Banti-Markouti
By: Justin, Juan, Jian, and Jazlin
Learning Area 1 Information And Communication Technology and Society
Child Online Protection in Egypt’s National ICT Strategy
The activity of Art. 29. Working Party György Halmos
Enforcement of Intellectual Property Rights in the Community Benoît Lory European Commission, DG Internal Market and Services Enforcement of Intellectual.
Privacy Update John L. Wood – Egerton, McAfee, Armistead & Davis, P.C.
Presentation transcript:

FIDIS - Future of Identity in the Information Society Identity in the Context of Civil Law - discussion FIDIS - WP 2 Fontainebleau - 10th December 2004 Wim Schreurs (V.U.B.-L.S.T.S.)

FIDIS - Future of Identity in the Information Society Overview Decisions in Civil Case law E.U. Legislation on Data Retention Relationship & discussion

FIDIS - Future of Identity in the Information Society Case law :  Indicator for future application of law  Not only look to data protection cases  Other concept of (approach to) data protection and privacy in civil cases than in criminal cases?

FIDIS - Future of Identity in the Information Society TestAchat/EMI – SONY et alia  In the field of copyright  Facts : (anti-copying) technology infringing mandatory legislation  France  Belgium :  confusion

FIDIS - Future of Identity in the Information Society TestAchat/EMI – SONY et alia  Inspiring to questions / remarks... Analogy with Identity Management Systems Can you prevent “illegal” technology? Proportionality and consent principle.

FIDIS - Future of Identity in the Information Society R.I.A.A. Vs. Many Others  Interesting link between data protection law and intellectual property law  They both deal with information  Use copyright mechanisms for data protection?

FIDIS - Future of Identity in the Information Society R.I.A.A. Vs. Many Others  Facts : “ R.I.A.A. (a private organisat. representing music industry) searches for illegal content on PC’s, searches for the IPnumbers and forces ISP’s to give personal data (name & address)”  But : R.I.A.A. : Right to search my PC? Software : Right to provide my IP? ISP : Right to provide my identity?

FIDIS - Future of Identity in the Information Society Pessers vs. Lycos (Holland)  Facts : conditional anonimity  Legal Tools for organising de- anonymisation : 5- Steps Test California Bill

FIDIS - Future of Identity in the Information Society 4 Steps test (case law)  Facts : conditional anonimity  Legal Tools for organising de- anonymisation : 5- Steps Test California Bill

FIDIS - Future of Identity in the Information Society California Draft Legislation  Procedure for de-anonymising 1. plaintiff sends suit to de-anonymise to a SP 2. SP notifies the suit to the anonymus + copy 3. Anonymus has reasonable term to defend against this suit. and sends his defence to SP who sends it to judge 4. judge makes a judgement on defence. 5. if demander misuses this procedure, he should pay damages  Assembly Bill (info.sen.ca.gov).info.sen.ca.gov

FIDIS - Future of Identity in the Information Society  Draft Framework Decision of the Council of the European Union dd. april 2004.

IN GENERAL tele- phony sms, ems, mmms Ipn°, sub- sets www, url, http Ftp, Ntp, voip vobb Future comm. Technol ogies traffic dataxxxxxx location dataxxxxxx user dataxxxxxx subscriber dataxxxxxx source of communicationxxxxxx routing of communicationxxxxxx destination of communicationxxxxxx time & date of communicationxxxxxx duration of communicationxxxxxx communication devicexxxxxx location start and throughout duration of the communicationxxxxxx

FIDIS - Future of Identity in the Information Society [© Anonequity.org]