And what to do about it … Tracy Mitrano. World-Historical Phenomenon The introduction of the Internet represents the tipping point for economic, social,

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
Freedom of Speech (Part 3)
What Every CIO Needs to Know About Law and Policy Tracy Mitrano NWACC Introduction to Internet Law.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
Net Neutrality1. Definition Net Neutrality can be broadly defined as the policy of Internet Service Provider’s (ISP’s) and Telecom Carriers treating all.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
CURRENT LAWS, FUTURE LEGISLATION, AND PRIVACY ABUSES GROUP Internet Privacy and Security Legislation.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
What you talk 'in bout?. Net Neutrality prevents Internet providers from blocking, speeding up or slowing down Web content based on its source, ownership.
Network Neutrality 4/21/20111Harvard Bits. 4/21/2011Harvard Bits2.
What you talk 'in bout?. For instance, AT&T decided to get into the Radio business in They used the station WEAF and its affiliates as an experimental.
Class 7 Internet Privacy Law Your Digital Afterlife.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
Copyright in the Digital Age October 14, 2004 FEDLINK Membership Meeting Carrie Russell, Copyright Specialist ALA Office for Information Technology Policy.
Copyright Tracy Mitrano NWACC Workshop. Principle Questions What is copyright? Why is it important? What is the law in a nutshell? What have technology,
The Internet, World Wide Web, and Computer Communication.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crimes.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 18 - The Fourth Amendment and National Security.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer Legislation The need for computer laws Go to Contents.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Unit 3 Lesson 5 Technology Transfer and Patents. Big Idea Patents are catalysts of new technologies and businesses and they stimulate economic development.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CHAPTER 3 INTERNATIONAL LAW DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Overview of Network Neutrality Kyle D. Dixon Senior Fellow & Director, Federal Institute for Regulatory Law & Economics The Progress & Freedom Foundation.
Chapter 18 - The Fourth Amendment and National Security.
Government of Brazil Ministry of Justice Department of Consumer Protection and Defense Consumer Protection and Defense in Electronic Commerce Eliane Moreira.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
The U.S. Securities and Exchange Commission (SEC).
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 4: Laws, Regulations, and Compliance
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Chapter 9: Internet Law, Social Media, and Privacy
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Ethical, Social, and Political Issues in E-commerce
The E-Rate Program CIPA Update Fall 2011 Applicant Trainings.
E-Commerce: Regulatory, Ethical, and Social Environments
Essentials of the legal environment today, 5e
Essentials of the legal environment today, 5e
Electronic Surveillance, Post 9/11
Presentation transcript:

And what to do about it … Tracy Mitrano

World-Historical Phenomenon The introduction of the Internet represents the tipping point for economic, social, political, cultural and ideological transformation. Global Information Economy

Dynamic interaction among four principal factors: Technology Law Market Social Norms

 Copyright  Computer Fraud and Abuse Act  Electronic Communications Privacy Act  Consumer Privacy Law  Communications Law

 Definition: holder has rights to copy, distribute, display and perform …  Scope: original work in a tangible medium  Terms:  Individual: 70 years + life, corporation 95 years  Damages  Span from least impactful at $750 to $250,000 per infringement

 Duke  Thomas  BU  Settlement Letters  HEOA  iTunes and Netflix  Disparity of the law remains the same

1. Limit Scope 2. Limit Terms 3. Re-imagine Registration 4. Differentiate between personal and profitable infringement in damages 5. Create Orphan Works 6. Codify transformative into fair use exceptions 7. End I.S.P. discrimination 8. Add substantive law to DMCA for content owners 9. Expand licensing for users 10. Recognize distinctions between developed and developing countries in copyright treaties

 Definition: no breaking electronically into “protected computers”  i.e. don’t hack a computer connected to a networked system  Purpose  Provide criminal penalties for breaking into banking and financial transactions managed through networked systems  Used for all form of security violations of and on devices connected to the Internet

 Robert Morris  Bradley/Chelsea Manning  Aaron Schwartz  (Probably) Edward Snowden

 Distinguish financial fraud from security incident  Identify the type and degree of security violation  Map punishment to the nature of the crime  Intent  Purpose  Effect  Create explicit exceptions for innovation and research

 Olmstead 1928  No 4 th Amendment for telephone  Katz 1967  4 th Amendment for telephone  Omnibus Safe Streets and Crime Control Act 1968  Applying Katz, makes a distinction between metadata and content for telephony  Electronic Communications Privacy Act 1986  Adds “data networking” i.e. Internet, but does not distinguish between the technology per 4 th A.

If the central concept of this law is to map 4 th Amendment jurisprudence to electronic communications, including the Internet, the current version of this law fails to meet that goal. Telephony and Internet technologies have different “metadata,” i.e. tracking information. The use of Internet Protocol addresses, which sometimes links to web pages, can offer content for less than probable cause, the legal standard.

 Exacerbated this problem because it lowered even more the legal showing by which law enforcement could collect metadata: a letter filed with a clerk.  True for both regular Title III, criminal courts, and for the FISA (Foreign Intelligence Surveillance Act) “secret” Court.  Partially explains why section 215 of FISA is so controversial  Section 215 used to obtain “billing” records

 Under these laws, is it illegal for the National Security Agency (NSA) to collect all telephone metadata?  Untested by the courts, but not on its face a clear violation given the “war on terrorism” that at least since World Trade Center and September 11 events involves domestic surveillance

 Under these laws, including FISA, which is an ex parte proceeding, is it illegal for the NSA to request of Internet companies the content of postings and communications … the Prism Program?  “In sum, a significant purpose of the electronic surveillance must be to obtain intelligence in the United States on foreign powers (such as enemy agents or spies) or individuals connected to international terrorist groups. To use FISA, the government must show probable cause that the ‘target of the surveillance is a foreign power or agent of a foreign power.’”

 Revise the ECPA to map technology to the 4 th Amendment  Especially important with Voice over IP!  Revise FISA for same jurisprudence  The standard by which it is triggered for NSA letters ▪ “reasonable suspicion” “significant persons”  Network effect among correspondents ▪ How many degrees of separation?

 Will revision of the foundational legislation (ECPA, FISA), plus legal “privacy” specialists oversight (Obama proposal)balance out the immunity provided to communications companies?  What about technological oversight?  Are “secret,” ex parte courts commensurate with a democratic polity?

 Facebook  Pushing out personal information without notice to users ▪ Beacon Program ▪ Tremendous user pushback  Switching up privacy settings without notice ▪ At sometime great personal consequence to users ▪ “I had a great day! I did not feel like killing one of my students!”

Fined Facebook for “deceptive practices” and has placed them on notice that going forward they MUST as a matter of the settlement provide notice to users of setting changes or any new business configuration that would push information about users out from “private” to “public” settings …

 Pre-exists the settlement with Facebook, and still is in existence  Requires a transactional website to include a privacy policy  But it does not require any particular substance to the policy  For example, the privacy policy could say: ▪ “We will sell your personally identifiable information to the highest bidder!”

 Moreover, the ruling allows the entity hosting the site to change the privacy policy at any time  So long as their practices are in compliance with the policy posted at that time  Altogether, this rules leaves the user with more uncertainty and may undermine the very core concept that the F.T.C. is designed to protect for consumer: “deceptive trade practices.”

 Their “privacy policy” is no longer even called a privacy policy but points instead to a data use policy  Which essentially says that Facebook will do whatever it wants with your data, but it will, per the F.T.C. agreement, provide notice before changing privacy settings or pushing out personal information ▪ But it won’t tell you when you are a subject of a study!!!

 Google Street View  Information gathering generally, without notice, and without recourse ▪ German sanctions  Picking up extra information from open WiFi ▪ “Engineer Doe” … Marius Milner  F.T.C. ▪ “Nothing wrong” but obstructed justice  “Right to be forgotten:  European concept, in effect since this summer  Must request …  Cannot circumvent by going to google.com IF your IP address is the European Union.

 Privacy Policies  Differed over a range of applications confusing users … and leading to possible “deceptive practices” ▪ Never mind that there was a more significant difference between this consumer range and enterprise applications!  Small sanction, $25K, and promise to harmonize the policies

 Current case in the Federal District Court  Question: does data mining violate ECPA?  Raises the question of new technologies and the relationship to both surveillance and consumer privacy law  Has revealed that Google did NOT turn off the data mining function on enterprise accounts  A case, and a judge, Koh, to watch!

 Arose originally out of telephony and radio technologies  Congress passes communication law; the Federal Communications Commission oversees regulations  Significant for the Internet, beginning with its categorical definition  Is it an information service? A utility?

 For governance  F.C.C. v. Comcast and F.C.C. v. Verizon ▪ Both cases declared that under the current communications law and definition of the Internet, the F.C.C. did not have the authority to impose restrictions or sanctions on telecommunication providers practices of bandwidth shaping  Consequently, the Commission has issued a proposal through administrative law to correct this problem.

 Fast Track  Requires an understanding of the architecture of the Internet … which engineers and computer scientists now call “2.0”  May, or may not, affect consumers use or speeds  Net Neutrality  Exists as a principle, but not a rule  The proposal includes it, and should address consumers concerns about “Fast Track” and need for clear “net neutrality” or “open Internet” rules.

The Internet, not merely as a “technology” but as a world historical phenomenon, has greatly disrupted intellectual property, network security, privacy and communications law. Everyday this challenge plays out in our global political economy in time-honored ways: through the economic, social and political machinations of nation-states, corporations and the world’s “winners and losers.”

The opportunity in this period of extraordinary disruption and change is that it provides us with the chance to ask foundational questions about governance and social relations, to rethink our identity as a democratic republic in a complex global environment whose players do not share those values. As we address international Internet governance we can revisit our own principles. In revising domestic law, we have an opportunity to weave in fairness and justice into our pursuit for ordered liberty.