LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.

Slides:



Advertisements
Similar presentations
Obscenity Obscenity Defamation Defamation Hate Speech Hate Speech Boundaries of Free Speech.
Advertisements

Obscenity – is anything that treats sex or nudity in an offensive or lewd manner, violates recognized standards of decency, and lacks serious literary,
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Ethics in Information Technology, Fourth Edition
Miller vs. California By tyler bundies. What freedom was uestioned? Is obscenity protected by the first amendment? Does the first amendment give you the.
Freedom of Speech. Purpose for Freedom of Speech: To guarantee to each person a right of Free expression, in the Spoken and the Written word, and by all.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
An Introduction to Computer Law Judy Jacobs Miller © 2006.
1 Freedom of Expression Prepared By Joseph Leung.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Regulating speech How the Net changes attitudes and assumptions, and creates new societal tensions 1 and unintended consequences March 10, 2011Harvard.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Cyberlaw Laws intended to govern computer, E-commerce, and Internet use. Cases involve computers and subject areas such as: Jurisdiction Trademarks Copyrights.
Chapter 5 Freedom of Expression
Unit 2-1 Business Law. History of the Law What is the basis of law?
Ioannis Iglezakis Domain Names. The Domain Name System A domain name is an electronic address of a computer connected to the Internet. The actual address.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Ethics in Information Technology
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Class Discussion Notes MKT April 10, 2001.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 24 Intellectual Property.
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
MEDIA LAW Obscenity – Pornography and Censorship.
Media Law: Understanding Freedom of Expression Chapter Outline  History  Today’s Media Law  Controversies.
MILLER VS CALIFORNIA By Justin Lacks. THE ISSUE Marvin Miller worked for a company that dealt with "adult" material In an attempt to advertise their product,
6/2/2016 Crimes Against Public Decency, Morality, and the Peace Copyright, 2000 Charles L. Feer.
Freedom of Speech. 1 st Amendment The essential, core purpose of the 1 st Amendment is self-governance. It enables people to obtain information from.
New York Times v. Sullivan (1963) By: Carmen Vaca.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
The Internet and Constitutional Law Chapter 2 Section 3.
Freedom of Speech Computers in the World.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Confidential and proprietary US Proposed Whois Legislation Fraudulent Online Identity Sanctions Act (“FOISA”)
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
1 Trademark Infringement and Dilution Steve Baron March 6, 2003.
Constitutional Rights Chp. 2 Civil Rights – Bill of Rights and other amendments to the Constitution have become a shield for the personal, natural rights.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
1 ST AMENDMENT; FREE SPEECH AND FREEDOM OF THE PRESS ELIZABETH MANWILL MIA MAY RAMI KHALAF MATT MARTY.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 19: Civil Liberties: First Amendment Freedoms Section 3.
Chapter 9: Internet Law, Social Media, and Privacy
CHAPTER 5 FREEDOM OF EXPRESSION.
Freedom of Expression.
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Copyright Addendum Copyright © Jeffrey Pittman.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
The Internet and Constitutional Law
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Learning Area 1 Information And Communication Technology and Society
What is Obscenity?.
Free Speech and Free Press
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor

Roth v. United States Eloquently worded decision wherein the U.S. Supreme Court stripped away First Amendment protections from obscene material (1957)

Miller v. California Standards toughened with three-part test to be used to determine whether or not material can be considered obscene as adjudged by affected community (1973)

Miller v. California cont. Standards ineffective for Internet and case law began to fill in the gaps; current case law holds the sender to standards of the recipient’s community Local standards apply in determining if material has literary, artistic, political or socially redeeming value as a whole—as a result, standards vary greatly

Lanham Act of 1976 Provides for registration and protection of trademarks and copyrights.

Trademark Dilution Act of 1996 Attempts to protect holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill.

Computer Fraud and Abuse Act Often-amended act that pioneered the treatment of computer-related crimes as unique offenses in the U.S. Code.

Communications Decency Act AKA Telecommunications Act of 1996—Makes it criminal to knowingly transport obscene material through the interactive computers or interstate of foreign commerce for sale or distribution. Also gives protection from defamation suits to Internet service providers.

Child Online Protection Act of 1998 Makes it a crime for site operators to fail to use proper technology and methodology to prevent minors from accessing “harmful” material.

Fraudulent Online Identity Sanctions Act of 2004 Increased potential prison sentences by up to seven years for someone who provided “material and misleading false contact information to a domain name registrar, domain name registry, or other domain name registration authority.”