Law Online: An Introduction Richard Warner Chicago-Kent College of Law

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
By the end of this section, you will know and understand the hardware and software involved in making a LAN!
Trespass to Chattels: eBay and Intel Richard Warner.
By: Vihar R. Patel VRP Law Group, 201 E. Ohio Street, Suite 304, Chicago, IL P: , F: , Web:
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Ethical and Social Issues in Information Systems
Chapter 9: Privacy, Crime, and Security
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
The Internet Facilitates Global data communications.
Copyright Law Boston College Law School February 25, 2003 Rights - Reproduction, Adaptation.
Discovering Computers 2010
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Section 3.1 Describe Internet hardware and software Explain Internet protocols Compare intranets, extranets, and the Internet Section 3.2 Identify URL.
The Case for The Right to Prevent Access Richard Warner.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Invitation to Computer Science 5th Edition
EED 502: UNIT A MULTI MEDIA TOUR.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Computer Ethics.
The Internet and the World Wide Web Renee Roland, Dan Waters, Amelia Wright.
Marketing Management Online marketing
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 6 E-Commerce. Agenda What is E-Commerce? Business to Business Business to Customer Business to employee Infrastructure Problems.
CHAPTER 10 Technology Issues.
Chapter 17 E-Commerce and Digital Law
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
The Case Against eBay Richard Warner. Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that.
Privacy and the Market Richard Warner. Three Types of Privacy  Spatial rights define a physical zone of control over intrusions by others.  Decisional.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Lesson 15 : Networks And The Internet
Managing the Information Copyright © Texas Education Agency, All rights reserved.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The Internet as Content Sources of content Types of content Purposes of content Issues with content.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By: Jordan Hale, McKenzie Kratts, Victoria Lee, and Lakin Burnett.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Internet. The Internet and Systems that Use It Internet –A group of computer networks that encircle the entire globe –Began in 1969 Protocol –Language.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Glencoe Introduction to Multimedia Chapter 2 Multimedia Online 1 Internet A huge network that connects computers all over the world. Show Definition.
Marking the Most of the Web’s Resources
Chapter # 1 Overview of Ethics
Chapter 15 Legal & Ethical Issues
Presentation transcript:

Law Online: An Introduction Richard Warner Chicago-Kent College of Law

Cyberspace and Choice  The importance of the Internet: worldwide communication and distribution of text and multimedia works are available to everyone. It would be difficult to overestimate the social, political, and commercial impact.  We must make choices: In cyberspace,“we stand on the edge of an era that demands we make fundamental choices about what life in this space... will be like.” Lawrence Lessig, Code and Other Values, p. 220.

What Is Internet Law?  The Internet differs dramatically from traditional communications networks. The differences have already profoundly affected individuals, businesses and governments.  The law has responded with new rules and the with novel applications of traditional rules. Internet law consists of these rules, their rationales, and consequences.  How does one achieve a useful overview of such a vast and constantly changing subject? It is possible if a unifying theme provides a vantage point from which to survey the rest of the subject.  Such theme exists. It is provided by the question of where and how the law should draw boundaries on the Internet.

Three Basic Boundary Questions  1. What right does an Internet system owner have to prevent access? An Internet system is a web site, Internet-connected computer, or Internet-connected network.  2. What obligation does the owner have to prevent access? Civil? Criminal?  3. What obligation does the owner have to allow access?

Right to Prevent Access  What legal right does An ISP prevent have to prevent access by spammers? A business have to prevent access by a competitor to parts of its web site that are publicly accessible? The owner of a web site have to prevent pop-up ads from appearing over the site? The owner of a computer to prevent cookies, “spyware,” and “adware” programs from being placed on the computer’s hard drive? The owner of a publicly accessible database have to prevent access?

Current Law  Common law: A combination of tort, contract, privacy doctrines that does not provide any comprehensive, consistent treatment of the issues.  Statutes (US and EU): A variety of statutes that do not provide any comprehensive, consistent treatment of the issues.

The Obligation To Prevent Access  Internet systems are attacked 24/7 by hackers seeking unauthorized access; such access causes several billions of dollars of damage. Unauthorized is traceable to two sources: (1) manufacturing defects in software or hardware; (2) failure by system owners to implement adequate security. What legal obligation does a manufacturer have to provide non- defective products? What legal obligation does a system owner have to implement adequate security?  What obligation is there for a system owner to prevent the use of that system to commit defamation or copyright violation.

Current Law  Common law Possible negligence liability for inadequate security, possible products liability for defective software and hardware; one California case filed against Microsoft on an unfair competition theory. The intermediary liability cases.  Statutes A piecemeal and indirect treatment except in the case of intermediary liability, which is addressed in CDA §230.

The Obligation to Allow Access  Internet systems contain a variety of information—some correct, some mistaken— that is potentially relevant to a variety of concerns.  What obligation is there to allow access to Internet systems By employers to employer provided systems; By law enforcement; By private individuals?

Low Cost, No-Explicit-Permission Access  Low-cost access: Anyone with a computer and a modem can communicate by , search the Internet, create and maintain a web site, and cheaply and easily distribute digital materials.  No-explicit-permission access: By connecting to the Internet and making the system publicly accessible, the system owner impliedly consents to access by the general public. No-explicit-permission keeps costs down: no license fees, no transaction costs. This fact is critical to the growth and vitality of the Internet. It plays a key role in linking and searching.

Linking  The Web is a network of hyperlinks.  Links do not, however, serve only to create the Web. They also play a critical navigation role. You locate information by following links. As Maureen O’Rourke notes the “dispersion of data that is the Internet is... largely overcome by the web’s ability to link related information in a manner transparent to the user. This has helped make the Internet into a medium of mass communication and a vast commercial market place.” Maureen A. O’Rourke, Fencing Cyberspace: Drawing Borders in a Virtual World, 82 Minn. L. Rev., 609, 611 (1998

Search Engines  Search engines serve as the Web’s index.  They are “critical to the effective use of the Internet. The Internet has multiple sources of information at the back end (hundreds of millions of Web pages), but only one means of accessing that information at the front end (the consumer’s computer screen)...” From the Amicus Brief in eBay.

Non-Search Engine Searching  There are all sorts of non-search-engine searches. illustrates the point. You can use bots to collect information about any change to any publicly accessible web page; get real time information about competitors’ prices; monitor conversations in chat rooms and so on. It is reasonable to expect non-search-engine searching to increase in importance. The programs meet a need for an automated, individually customized way to bring dispersed information to the user’s desktop.  All of the cases that assert a legal right of an Internet system owner to prevent searching involve non-search-engine searching. Of course there is an issue about exactly what counts as a search engine.

The Key Question  How do you balance the interests served by preventing access against the interests served by allowing access?  We will use property law models to answer this question. Property right systems balance two interests: the interests served by excluding others, and the interests served by allowing access.