Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National.

Similar presentations


Presentation on theme: "An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National."— Presentation transcript:

1 An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National Conference on Law and Higher Education

2 Agenda A Brief Overview of the First 500 Years of Internet Law Computer Use Policies: Do You Really Even Need One? Liability for Computer Misconduct: What You Don’t Know Probably Won’t Hurt You Meta-Geography and Cyberjurisdiction Privacy in Cyberspace (“Stalking 101”) Questions (and Maybe Even Some Answers)

3 A Brief Overview of the First 500 Years of Internet Law In the beginning was the word....

4 What is the Internet? A bulletin board A printing press A library A bookstore A television set and a television station A telephone, with lots of party lines and unlimited conference calling A post office...

5 What is the Internet? A medium of communication

6 And that means that... Everyone with Internet access is potentially an international publisher and broadcaster –Including your five-year-old This has some fairly significant legal implications –The same laws that apply to the New York Times, NBC, and NPR apply to Internet users –Including your five-year-old

7 Three Key Misconceptions Cyberspace is a separate legal jurisdiction –In fact, conduct that is illegal or a violation of policy in the “offline” world is just as illegal or a violation of policy when it occurs online Free access = free speech = unfettered speech –In fact, even public institutions may limit the use of their computer resources to business-related purposes If it’s technically possible, it’s legal –In fact, the technology has some legal implications, but it does not define the outer limits of the law

8 One Key Point Internet law (and policy) existed long before the Internet: –The law of libel –The law of privacy –The law of copyright –Criminal law –Your sexual harassment policy, code of student conduct, workplace rules –...

9 And Two Key Implications Internet-specific rules aren’t necessary and may create problems –Except when there are unique issues that aren’t already covered by generally applicable laws and policies Education is critical

10 New Whines and Old Battles It isn’t always immediately clear (surprise!) how the law applies to new situations For example, the law of libel developed long before there were Internet service providers So, are ISPs liable for the libels that occur on their systems?

11 The Law of the Horse “This case requires the law to add another paragraph to the ‘rules of the road’ for the ‘information superhighway’ and cyberspace. It is yet another testimony to the resiliency and flexibility of the case-by- case incremental development concept we inherited from the Common Law, which emphasizes adherence to [precedent]. As our superior court noted in United States v. Maxwell, new technologies present new challenges, but they are met by adapting existing legal concepts to them.” United States v. Monroe (A.F.C.C.A. 1999)

12 Key Dates in the Development of the Law of ISP Liability 1889 -- Fogg v. Boston & Lowell RR. Co. 1933 -- Layne v. The Tribune Co. 1952 -- Hellar v. Bianco 1973 -- Anderson v. New York Telephone 1986 -- Spence v. Flynt

13 Who is responsible? Publishers –Create content and hold it forth as their own –Directly liable for the libels they disseminate Distributors –Don’t create, but choose to, and actively do, distribute –Liable only if they “knew or should have known” that what they are distributing is libelous –No duty to prescreen Conduits –Operate a system by which other people communicate –No liability for libel, regardless of knowledge

14 Key Dates in the Development of the Law of ISP Liability 1991 -- Cubby v. CompuServe 1995 -- Stratton Oakmont v. Prodigy 1996 -- The Communications Decency Act 1997 -- Zeran v. America Online 1999 -- Lunney v. Prodigy

15 Whose law applies? Subject matter jurisdiction –Jurisdiction over the case Type of case Amount in dispute Personal jurisdiction –Jurisdiction over the parties Originally a matter of pure geography...

16 Judicial Geography

17 Internet Geography

18 Where do you want to be sued today?

19 A Really Big Shoe “[D]ue process requires only that in order to subject a defendant to a judgment in personam, if he be not present within the territory of the forum, he have certain minimum contacts with it such that the maintenance of the suit does not offend ‘traditional notions of fair play and substantial justice.’” International Shoe Co. v. Washington (U.S. 1945)

20 And Another “ We find that Sullivan, as the producer and master of ceremonies of ‘The Ed Sullivan Show,’ entered Arizona by producing the play entitled ‘A Case of Libel’ in New York City.... [T] he telecast of the show... in Arizona [was] voluntary, purposeful, reasonably foreseeable and calculated to have effect in Arizona....” Pegler v. Sullivan (Ariz. Ct. App. 1967)

21 Zippo Dee Doo Dah “[T]he likelihood that personal jurisdiction can be constitutionally exercised is directly proportionate to the nature and quality of commercial activity that an entity conducts over the Internet. This sliding scale is consistent with well developed personal jurisdiction principles.” Zippo Mfg. Co. v. Zippo Dot Com, Inc. (W.D. Pa. 1997)

22 Zippo’s Three Ways “If a defendant enters into contracts with residents of a foreign jurisdiction that involved the knowing and repeated transmission of computer files over the Internet, personal jurisdiction is proper.” “A passive Web site that does little more than make information available to those who are interested in it is not grounds for the exercise [of] personal jurisdiction.” “The middle ground is occupied by interactive Web sites where a user can exchange information with the host computer. In these cases, the exercise of jurisdiction is determined by examining the level of interactivity and commercial nature of the exchange of information that occurs on the Web site.”

23 International Jurisdiction Within the U.S., the law usually doesn’t vary much from state to state But the Internet doesn’t stop at national borders, either “In the information age, the whole planet is just a click away. So, unfortunately, are all the lawyers.” -- University Business “In cyberspace, the First Amendment is just a local ordinance.” -- variously attributed

24 The Key to Handling Online Privacy Issues Successfully Ignore the law

25 I know what you did last summer AnyWho –http://www.anywho.com Lucas County Property Records –http://www.co.lucas.oh.us/Real_Estate DejaNews –http://www.dejanews.com Privacy.net –http://www.privacy.net/analyze Caches, History Files, Log Files and more

26 What is Privacy? “The right to be left alone -- the most comprehensive of rights, and the right most valued by a free people.” Justice Louis Brandeis Olmstead v. U.S. (1928)

27 The Legal Basis for Privacy: A Patchwork Quilt U.S. and State Constitutions –But no explicit reference in U.S. Constitution –Fourth Amendment (and State versions) Statutory Privacy –Electronic Communications Privacy Act (and State versions) –But also FERPA, State open records laws, and discovery rules –And much, much more The Common Law of Privacy

28 One Slight Problem: No One Understands This Stuff The Fifth Circuit on the Electronic Communications Privacy Act: –“[A] statute... which is famous (if not infamous) for its lack of clarity” -- Steve Jackson Games, Inc. v. United States Secret Service The Ninth Circuit on the Fifth Circuit: –“[T]he Fifth Circuit... might have put the matter too mildly.” -- U.S. v. Smith

29 The Fourth Amendment in Cyberspace Who owns the system? Who has access to the system? How does the system work? How is the system used? Is the system password-protected? What policies apply to the system? What is the ordinary practice?

30 Law Enforcement Access Under ECPA Voluntary or at government request? Obtained inadvertently or intentionally? In transmission or in storage? –In storage more than 180 days? Contents or log files? With consent of user or without? With notice to user or without?

31 Untangling the Privacy Mess Ignore the law Establish -- and follow -- a policy –Decide what expectations are reasonable –Obtain consent, explicitly or implicitly Options: –No privacy –Total privacy –Somewhere in between

32 Finally: Top 6 ½ Tips for Success 1. Forget about computers 1.5. Even in your use policy 2. Treat pornography as you would the Bible 3. Don’t (or do) get personal 4. Even publics should be private to some degree 5. Don’t go looking for trouble 6. Teach your children well


Download ppt "An Introduction to Internet Law (Psst: There’s no such thing!) Steven J. McDonald Associate Legal Counsel The Ohio State University 21st Annual National."

Similar presentations


Ads by Google