The Case Against eBay Richard Warner. Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that.

Slides:



Advertisements
Similar presentations
Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Trespass to Chattels: eBay and Intel Richard Warner.
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Ethics in a Computing Culture
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
Chapter 15 The Third Component: Powerful Networks.
Social Bookmarking & Research What Delicious can do for you.
Technology for Computer Forensics by Alicia Castro.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
What Is A Web Page? An Introduction to the Internet.
What Is Network ?. A Network is a connected collection of devices and systems, such as computers and servers, which can communicate with each other.
The Hardware Behind the Internet A virtual tour. Pictorial View of the Internet Backbone The “Internet Backbone” refers to the principal data routes between.
Networking LAN (Local Area Network) A network is a collection of computers that communicate with each other through a shared network medium. LANs are.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
ICT at Work Global Communication.
Chapter 1 Introduction to HTML, XHTML, and CSS
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Chapter 17 Citizenship and the Internet. Civic Participation The internet and the World Wide Web help people communicate and collaborate across borders.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
The Case for The Right to Prevent Access Richard Warner.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
What IS the Web? Mrs. Wilson Internet Basics & Beyond.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Internet...? Definition: The Internet is millions of computers around the world connected to each other. Explanation: When you're on the Internet, your.
Lesson 2 — The Internet and the World Wide Web
Internet Major : Mineral Processing Author : Tan jinlong.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Ethical and Social...J.M.Kizza 1 Module 12: New Frontiers for Computer Ethics: Cyberspace Introduction Cyberspace and the Concepts of Telepresence and.
Chapter 6 E-Commerce. Agenda What is E-Commerce? Business to Business Business to Customer Business to employee Infrastructure Problems.
Telecommunications and Networking
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
By Alex Oliver D IGITAL A CCESS Digital access is the ability for people places of the world to access digital technology. People in all societies should.
“ Getting to Know Networks”. What Is a Network? n A network is a collection of computers hooked up together, usually by cables or telephone wires, for.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
9/4/01Mary Price - The Internet1 9/4/01Mary Price - The Internet 2 T h e I n t e r n e t ? I n t e r n a t i o n a l N e t w o r k.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Basic Computer Knowledge. Outline Notes 1 Notes 2 Assessment.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Trespass, Computers, and Networks. Scattered data Collected organized data Benefits at least some consumers The Generic Fact Pattern.
Telecommunications and Networking
TRACY ANN WARD LIBM 6320 DR. RICKMAN A Picture is Worth…? A Case Study of Kelly v. Arriba Soft Corp.
Copyright (c) 2003 by Prentice Hall. All rights reserved. Understanding the Internet CHAPTER ONE How the Internet is Changing the World.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Health Risks and Your Behavior In this PowerPoint, you will Learn About… What risk behavior is. What cumulative risk is. How to avoid health risk behaviors.
Chapter 1 Introduction to HTML, XHTML, and CSS HTML5 & CSS 7 th Edition.
EBay and Intel. eBay v. Bidder’s Edge eBay is an auction web site on which sellers list items for sale, and prospective buyers post bids and track the.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
By: Jordan Hale, McKenzie Kratts, Victoria Lee, and Lakin Burnett.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
A s s i g n m e n t W e e k 7 : T h e I n t e r n e t B Y : P a t r i c k O b i s p o.
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Software Applications for end-users
INTRODUCTION TO INFORMATION TECHNOLOGY Your Digital World
Presentation transcript:

The Case Against eBay Richard Warner

Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that the issue was information. The cases “were really efforts to control the flow of information to or from a site.”  Mark A. Lemley, Place and Cyberspace, 91 Cal. L. Rev. 521, 529 (2003).

Critics of Trespass  The courts saw the issue as one of personal property: Does an Internet system owner have the right to control access to the computer equipment?  As a result, the courts “got the cases wrong, creating a general tort of stunning breadth.”  The critics see this tort as leading to seriously adverse consequences.

Apocalypse Now?  Dan Hunter warns that the “legal propertization of cyberspace... is leading us to a tragedy of the digital anti-commons [a distribution of property rights that imposes such disastrously inefficient restrictions on access].”

The Anticommons  He contends that “[r]ecent laws and decisions are creating millions of splintered rights in cyberspace... Historians will look back on our time and wonder–when we have seen what the Internet could be–how we could have sat and watched the tragedy of the digital anti-commons unfold.” Dan Hunter, Cyberspace As Place, 91 Cal. L. Rev. 439, 444 (2003).

Virtual Versus Physical  The critics’ arguments rest on a distinction between two aspects of the Internet–the physical Internet, and the virtual Internet.  The physical Internet is comprised of servers, routers, fiber optic cables, phone lines, and other related support equipment housed in a variety of structures worldwide.

Two Maps  To contrast the virtual Internet, imagine two maps.  The first depicts the physical Internet.  It plots physical connections among servers, routers, computers, and so on.

The Virtual Internet  The second map does not depict a single wire or machine. It maps the virtual Internet.  On this map, Internet systems are not depicted as physical items but as collections of information linked to each other by millions of hyperlinks.  The map also shows the billions of web browsers that end-users employ to follow links and access information, and it traces out the billions of possible connections among Internet users.

The Virtual Internet  Two points are connected in this second map if it is possible for them to exchange information.  The physical Internet map does not display a single one of these possibilities; it just shows wires and machines.  As the difference in the maps makes plain, the two networks are not the same.

Realization  The relation between the two is one of realization: the virtual Internet is at all times realized entirely in and by the physical Internet.  Given that the intimate realization relation between the two networks, regulation designed for one network inevitably has an impact on the other.

The Danger  The danger is that courts and legislators will fail to appreciate this fact and regulate one network in a way that has an unintended impact on the other.  This is what the critics think happened in the trespass to chattels cases.

Unintended Consequences  The courts focus on the fact that one party sends electronic signals over the physical Internet to the other party’s computers, and they take the fundamental question to be whether the property owner has a right to prevent access to its property.  In recognizing a right to prevent access, they create adverse consequences for the virtual Internet.

Impact on the Virtual Internet  Such consequences concern the critics because it is the virtual Internet that accounts for “the” Internet’s revolutionary impact.  The virtual Internet is a network of possibilities for communication and information exchange, and it is access to possibilities that has so transformed communication.

The Consequences  The growth and vitality of the Internet depend on communication, hyperlinking, and the search-engine index.  These features thrive on implied-permission access.  Recognizing a right to prevent access reduces implied-permission access and hence threatens the growth and vitality of the Internet.

How Great?  The critical question is, how great is the threat? The Critics claim the negative consequences of the impact on no-explicit permission access clearly outweigh the benefits that flow recognizing the right.  Some share Hunter’s apocalyptic vision; others see less serious consequences.

Critics Agree  The Critics nonetheless all agree that the negative impact of the right outweighs any benefit the right creates.  The reason is that they think recognizing the right yields virtually no benefit.  Are they right?

And If They Are...  Should we follow Intel?  We can protect , linking, and searching by holding that these activities qualify as trespasses only when a sufficient impairment or harm is present.  The more we demand in the way of impairment or harm, the greater the protection.