Presentation is loading. Please wait.

Presentation is loading. Please wait.

P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”

Similar presentations


Presentation on theme: "P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”"— Presentation transcript:

1 P2P NETWORKS Legal Risks

2 Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”

3 P2P Capabilities Instant messaging Image transfers during sessions Voice /Video Chat Game requests File transfers File Sharing Ability to Change Ports Application sharing Whiteboard Remote assistance Webcam Message Logging

4 P2P Vendors AIM MSN Yahoo KaZaA Morpheus Trillain Grokster Napster Gnutella eDonkey WinMX

5 Plethora of P2P Risks P2P software vulnerabilities –May lead to hacker exploits Infected Files –Viruses –Trojan Horses –Other malware

6 Plethora of P2P Risks (cont’d) Misconfigured File Sharing –May expose more than intended Unencrypted Communications –Unauthorized disclosure Social Engineering –Give up sensitive information

7 Plethora of P2P Risks (cont’d) File transfers reveal IP addresses –File or image transfer –Voice chat –Remote assistance sessions –Application Sharing Identity Theft –Clear text –Hijack sessions –Impersonate legitimate use

8 Plethora of P2P Risks (cont’d) Message logging –Session recorded to file –Fertile hunting ground Social engineering Sensitive data

9 Plethora of P2P Risks (cont’d) Stealth activity –Ability to change TCP/IP ports on the fly –Blocking ports may not work –May require IDS to detect activity Aggessive applications –Can cripple bandwidth –Can force increased infrastructure costs

10 P2P Risks Legal Risks Trade secret violations Unlawful file content –Pornography –Criminality Copyright infringement –MP3 files –Photos –Plagiarized research or papers

11 How Can They Sue Us? Let me count the ways…

12 Litigation Focus Major Claims –Invasion of privacy –Criminal Prosecution –Copyright infringement

13 Invasion of Privacy Failure to inform users of monitoring Misuse of information obtained

14 Criminal Prosecution Certain file content prohibited –Child pornography images –Possession a crime –Both federal and state laws –Much variability in state laws

15 Copyright Infringement Major source of litigation activity –“perfect copies” issue Increased protection under federal law –Digital Millenium Copyright Act Digital works more strongly protected Where or where has “fair use” gone?

16 Plaintiffs Motion picture industry Trade associations –RIAA –Business software alliance Individual Artists

17 Defendants You Your students Grokster

18 Is P2P Sharing of Copyrighted Files Illegal? Yes

19 MGM v. Grokster 125 S. Ct. 2764 –June 27, 2005 FindLaw.com

20 Methods of Protection Policies and procedures Audit and Review Electronic Monitoring Intrusion Detection Systems User education and training Sanctions


Download ppt "P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”"

Similar presentations


Ads by Google