The Internet and Constitutional Law Chapter 2 Section 3.

Slides:



Advertisements
Similar presentations
Chapter 15 Legal & Ethical Issues
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Chapter 13.4 Freedom of the Press Government Mr. Biggs.
Ethics in Information Technology, Fourth Edition
Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
Legal and Ethical Issues: Privacy and Security Chapter Five.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
An Introduction to Computer Law Judy Jacobs Miller © 2006.
1 Freedom of Expression Prepared By Joseph Leung.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
Cyberlaw Laws intended to govern computer, E-commerce, and Internet use. Cases involve computers and subject areas such as: Jurisdiction Trademarks Copyrights.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
CIVIL LIBERTIES. THE POLITICS OF CIVIL LIBERTIES Civil liberties: protections the Constitution provides individuals against the abuse of government power.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
LAW OF THE INTERNET. The creation of client-server networks developed within a single company, academic institution or public organization can be seen.
Ethics in Information Technology, Second Edition Chapter 5 Freedom of Expression.
Chapter 17 E-Commerce and Digital Law
Chapter 19 Section 3 Objective: To understand the scope of and the limits on free speech and press.
Copyright and Fair Use What you need to know!. Understanding COPYRIGHT “All tangible, creative works are protected by copyright immediately upon creation.”
Digital Citizenship Created By: Kelli Stinson June 2011.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 25 Product Liability: Warranties and Torts Twomey Jennings Anderson’s.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
Chapter 6 Business Torts and Cyber Considerations.
The Other Expressed Powers Chapter 11 Section 2. Key Terms Copyright Copyright Patent Patent Territory Territory Eminent domain Eminent domain Naturalization.
CONTENTLEARNING OBJECTIVES ORIGIN OF INTERNETDefine Internet and its milestones INTERNET TERMINOLOGYIdentify the key terms associated with Internet INTERNET.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Comprehensive Volume, 18 th Edition Chapter 27: Warranties and Other Product Liability Theories.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 15 Regulation of Advertising McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Chapter Five Civil Liberties. Copyright © Houghton Mifflin Company. All rights reserved.5 | 2 The Politics of Civil Liberties Civil liberties: protections.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Copyright Law & Plagiarism Library 10 – Basic Information Competency.
A Crash Course in Press Law For the High School Press.
Constitutional Rights Chp. 2 Civil Rights – Bill of Rights and other amendments to the Constitution have become a shield for the personal, natural rights.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
HOLT, RINEHART AND WINSTON A MERICAN GOVERNMENT HOLT 1 Fundamental Freedoms Section 1: Freedom and the Bill of Rights Section 2: Freedom of Religion Section.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
LEGAL AGREEMENTS AROUND THE WORLD. International legal systems and liability Property and contracts Resolving legal differences Legal Agreements Around.
Aim: What are the landmark First Amendment cases of the 20 th Century? Do Now: What does the First Amendment protect?
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
The Internet and Constitutional Law
CHAPTER 2: CONSTITUTIONAL RIGHTS
Online Legal and Ethical Issues
Chapter 25 PRODUCT LIABILITY: WARRANTIES AND TORTS
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
Chapter 6.1 Regulating the Internet
A Gift of Fire Third edition Sara Baase
Chapter 15 Legal & Ethical Issues
Presentation transcript:

The Internet and Constitutional Law Chapter 2 Section 3

Cyberlaw: the law that governs the use of computers in e-commerce and the internet. Deals with: Jurisdiction Trademarks Copyrights Contracts Privacy Obscenity Defamation Security of data Crime

Jurisdiction: power of a court to decide a case What’s your verdict? Trademarks: A unique word, mark, symbol, or device that identifies a product of a particular manufacturer or merchant.

Copyright: protects the expression of a creative work, such as the work of an artist, author, or composer. © Contract: Agreement between two parties that creates an obligation

Defamation: False statement that injures one’s character.

Security of Data: Medical Informatics Group Anthem Blue Cross/Blue Shield Target Identity Theft

Start of the Internet Originated in the Department of Defense Wanted to increases the pace of development of defense information during the Cold War. Linked together computers around the country and ultimately around the world. Moved to academia National Science Foundation took over and developed the Internet Business world became interested; however, NSF users refused. Not until 1991 was it agreed to allow the Internet to be used for commercial purposes.

World Wide Web Hypertext: opened the internet for wide spread use. Nonlinear format for the publishing of information that’s used to send , transfers tons of data, and talk in chat rooms. Tim Berners-Lee Developed WWW program in spare time. Vision of open access to information for every user. “There is power in arranging information in an unconstrained, web-like way” Use of Internet places responsibility on the user to verify that the information received is correct. User must sort “fact from fiction.” How is information displayed on a browser?

Legal Issues in Cyberspace Jurisdiction Normally, states have jurisdiction over the citizens in that state. Federal courts have jurisdiction over cases involving citizens from two different states or those cases involving a question of federal law. Should the case be settled in the state where it was filed or the state where the e-business is located?

Two legal considerations involved: The laws of the state in which the case is filed must allow suits against nonresident defendants. Long arm statutes allow for this; however, the standards set in this statute must be met or the case will be thrown out for lack of jurisdiction Would allowing the court to decide the case violate the due process requirements of the Constitution? Jurisdiction over the nonresident defendant is only proper if the defendant has either a “substantial, continuous, and systemic presence” in the state (most e-business lack this) or has a “minimum contacts” within the state. Minimum contact: Simply providing an informative website with no means of doing business does not meet minimum contact. However, providing a website through which business can be conducted does meet minimum contact.

International Jurisdiction Governed by international commercial laws Country may only exercise jurisdiction over activities with a substantial effect on or in that country. Pre e-commerce Rule seems to be abandoned in recent cases. Judgments ruled on in foreign courts are entered into the domestic courts of the U.S. for enforcement through various treaties.

Internet Related Constitutional Issues Freedom of Speech Closely guarded right. Very reluctant to curtail this right. Obscenity Roth v. United States Does not have the protection of freedom of speech. Freedom of speech was meant to protect the freely expressed ideas and open exchange that would allow necessary political and social change. All ideas having even the slightest redeeming social importance---unorthodox ideas, controversial ideas, even ideas hateful to the prevailing climate of opinion—have the full protection of the guaranties, unless excludable because they encroach upon [interfere with] the limited area of more important interests. But implicit in the history of the First Amendment is the rejection of obscenity as utterly without redeeming social importance.

Miller v California Is the material “utterly without redeeming social value.” Toughened standards on what is considered to be obscene. Materials would be considered by the standards of the community affected. Internet: Which community standards should be used? The sender is held to the standards of the community of the recipient.

Communications Decency Act Main purpose was to control the transmittal of obscene material through the Internet Declared Unconstitutional. “Indecent” was considered too broad of a term Child Online Protection Act Required commercial sites to use high tech methods to restrict access to their sites if it contained material harmful to children. Declared unconstitutional due to ambiguous terminology of determining what was considered to be “harmful to children”.

The Right to Privacy Online “Based on reasonable expectations as to whether his or her actions, communications, beliefs, or other personal attributes deserve protection from those who would improperly use them.” Interpersonal communication on social media websites are considered a gold mine for marketers, compilers of commercial databases, and identity thieves. Two red flags: Birth date: through the automated reminders on social media SSN: Identify city and state of birth—first three numbers Birth date: apply the formula that the government used to calculate the remaining 6 numbers

Spammers: Practice of sending unrequested bulk s to hundreds of thousands of potential customers. CAN-SPAM law: overseen by the FTC. Regularly broken Use of ‘cookies’ Packet of information containing the internet address and other personal information about a website visitor. This information is then sold without user’s knowledge or permission.