Presentation is loading. Please wait.

Presentation is loading. Please wait.

Staying Out of Prison in the Information Economy.

Similar presentations


Presentation on theme: "Staying Out of Prison in the Information Economy."— Presentation transcript:

1 Staying Out of Prison in the Information Economy

2 Lecture Caveats I am not a lawyer and do not have any formal legal training This lecture is made up of my observations of the legal system to make you aware of important issues concentrating on an information technology workplace Cardinal Rule: Be aware of the law, but always consult an attorney if/when you become involved with it.

3 Law Caveats Some people read the text of the law and think they know it. Things are never so easy. If you have questions ask a lawyer. Others ignore the law relying on corporate lawyers in case something goes wrong. This is not a good idea. As in any other system, catching problems in the design phase is always better than in the debugging phase.

4 Talk Overview Life for Lawyers Vs. Life for Engineers Patents, copyright, trademarks, trade secrets reviewed Defamation ISP Liability Privacy Jurisdiction Issues

5 Life for Computer Professionals Binary –Problem solutions either work or not. Little room for gray areas. Physical and mathematical laws ultimate authority when disputes arise Guiding Philosophy - “Tell me what you need and I will create a system with appropriate trade-offs at least cost to solve your problem.”

6 Life for Lawyers Gray –Effort and intent often matter as much as results Supreme court ultimate authority when disputes arise Guiding Philosophy - “Laws are passed based on how society should run - even if enforcement and legal interpretation issues have yet to be nailed down.”

7 When Worlds Collide... Legal community always behind the technology curve Lawyers and politicians typically have poor technical backgrounds As a result, analogies often made between new technological paradigms and old world systems - some more easily defended than others. Different interpretations would result in different laws

8 Patents Embodiment of a specific methodology Competing products must use different method for achieving same task to avoid payments Definite lifespan beyond which patent information freely available for use by the public

9 Copyright Specific work Automatically held when work is created, but easier to defend if it is registered Definite lifetime beyond which the work is freely available to the public

10 Trademark Specific name or phrase Generic terms cannot be trademarked Trademarks can be lost if they are not defended –Lost trademarks: aspirin, kleenex –Held Trademarks: Coke, Pepsi

11 Trade Secrets Does not expire - as long as it is kept secret Competitors may not use secrets obtained through extraordinary means Example: Walled chemical plant layout learned through helicopter use

12 Defamation Publishing damaging statements you cannot prove about others The publisher and author are both liable Slander is a less serious, but similar, crime where damaging statements that cannot be proven are made in a public arena

13 Bally Total Fitness Vs. Faber A “Bally Sucks” web site was created by Faber complaining about Bally fitness centers The trademarked Bally seal was placed on the site overlaid with the words “Sucks” Bally sued Faber making claims of trademark infringement, dilution, and unfair competition.

14 Bally Case Decision No trademark infringement - little possibility of confusion No dilution - the defendant did not sell a competing product and did not convey confusion about the author’s identity No dilution (lessening ability of the plaintiff’s mark to identify its goods and services) since defendant was not marketing a competing product Incidentally - no slander, negative opinions protected under the first amendment

15 ISP Liability What is an Internet Service Provider Like? –Phone Company: Route information flows between individuals –Newspaper: Package content for distribution in a public forum Answer determines ISP’s legal liability The rules have been in a constant state of flux in recent years

16 Ancient History (~Decade Ago) Defamatory posting on Prodigy (Stratton Oakmont Vs. Prodigy Services 1995) –Prodigy a large ISP –Claimed to be “family friendly”. Prodigy advertised that internal newsgroups monitored for bad/inappropriate language –Role of a publisher - hence, Prodigy like a newspaper –CompuServe did not monitor users activity - like a telephone company (Cubby Inc. Vs. CompuServe Inc. in 1991)

17 Modern Era Communications Decency Act ISP may monitor user activity (according to policy) If statement to the effect that ISP does not take responsibility for user traffic in place then no ISP liability, BUT –Area for complaints must be available –Complaint response must happen in a timely fashion

18 DMCA Digital Millennium Copyright Act –If a copyright infringement is claimed a web site must be taken down (however tenuous the claim may be) –Web site can only be reinstated after an appeals process.

19 Near Future?... European Computer Crime Treaty may be created by the end of this year ISP’s may be required to monitor user traffic with a 40 day data-log. ISP’s not explicitly exempt from liability Hacker/Security Tools Illegal Citizens must provide passwords for data seized by police

20 Privacy in the Workplace Test for employers/employees - “Do you have a reasonable expectation of privacy?” A case can be made that private e-mail on business machines still private, but this is not the law Work-related material on business machines is definitely not private

21 Privacy in E-mail Legally, e-mail is like a postal letter –Expectation of privacy in transit –Mail loses its special protected status once it leaves the letter carrier's grasp For e-mail, –Expectation of privacy while signal travels over Internet –E-mail loses its protected status at the mail server whether you have read it or not

22 Spam and Address Spoofing Matthew Seidl v. Greentree Mortgage Co. (1998) Greentree hired third party to send mass e-mail to potential customers (spam) Return address spoofed to read nobody@localhost.com (an actual address) Over 7,000 complaints sent to nobody resulting in denial of service for 3 days Libel case dismissed since third party was a contractor. Likely that third party would, in fact, be vulnerable to a lawsuit.

23 Business E-mail Electronic Communications Privacy Act (1986) says all business communication belongs to that business Deleting e-mail can be ruled spoliation (intentionally destroying company records) Archive worthless if it cannot be indexed effectively (in effect, saving everything can be equivalent to saving nothing)

24 What about Privacy at Home? A lot of public information is considered private. An increasing amount of public information available on the Internet –Reverse phone lookups –Campaign Contributions –Housing prices –(Thwarted) Driver’s license information and photographs

25 Data Collection Data collection has few boundaries in U.S. Check privacy policy (can change!!) EU Safe Harbor agreement may change things in the future (TRUSTe web site privacy seal program)

26 Jurisdiction “The Internet has no boundaries” Is that really true? If you break a law in Finland, but you were on the Internet in the United States, what happens to you? What if you are in California and you break a law in Minnesota?

27 E-Commerce Big Questions Did you sell an illegal item to a resident of community X? Did you try to stop the flow of illegal sales into X? An easy example of where this might come up is found in the on-line pornography boom.

28 Obscene or Offensive? Indecent speech and offensive speech protected under the 1st Amendment Obscene speech is not But what is obscene speech?

29 Miller Test for Obscenity (1) Whether “the average person applying contemporary community standards”, would find that the work, taken as a whole, appeals primarily to prurient interest. (2) Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by applicable state law. (3) Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.

30 Federal Court System 94 US District Courts (89 in the 50 states) 13 Judicial Circuits, each with a court of appeals Supreme Court ultimate appellate court Jurisdiction can be a determining factor in case outcomes

31 US V. Thomas (1994) Mr. And Mrs. Thomas ran a pornographic BBS in California State officer paid a membership fee and downloaded pornography in Tennessee Couple tried in Federal court in Tennessee and lost their case

32 International Jurisdiction Extradition over civil suits unlikely Big Question #1: Do you have assets in the country in question? Big Question #2: Will you ever try to enter country X?

33 Godfrey Vs. Dolenga Dolenga was a Cornell Biochemistry Master’s student from British Columbia Godfrey, a nuclear physicist from London, made anti-Canadian remarks in a newsgroup Dolenga responded by flaming Godfrey Godfrey notified Cornell of the offensive remarks, but they were not removed (First Amendment) Godfrey filed defamation suits against Dolenga and Cornell in Britain (one of at least seven such cases )

34 Dolenga Did Not Defend Himself... Dolenga was found guilty by default in English court BUT - Dolenga does not have assets in England and it is unlikely that American courts will enforce the British judgement.

35 Cornell Did Defend Itself Cornell has assets in England (the Cornell abroad program) The suit was for roughly 80,000 pounds. The University could have settled, but chose to take the case to court The suit was brought to a successful conclusion (for Cornell) Lessons to be taken away from this...

36 Conclusions... The law is constantly changing and never as simple as it seems You should try to be familiar with the law to protect yourself (corporate lawyers are like a fire department, not like a seeing eye dog) Even so, you DO need the help of someone with formal training when dealing with legal issues


Download ppt "Staying Out of Prison in the Information Economy."

Similar presentations


Ads by Google