Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend.

Slides:



Advertisements
Similar presentations
Media, Communications and the Internet The Regulatory Framework by John Corker.
Advertisements

Freedom of Speech (Part 3)
Da State. Da State and Economic Functions Enforces law Provides services Arbitration (outside courts) Coordination Policy as Innovation.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Ethics, Privacy and Information Security
Legal and Ethical Issues: Privacy and Security Chapter Five.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
1 Freedom of Expression Prepared By Joseph Leung.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
3 Ethics and Privacy.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Media, Communications and the Internet The Regulatory Framework by John Corker.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 5 Freedom of Expression
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Teaching the Ethics of Information and Information Technology Emily Miller-Francisco Southern Oregon University Online Northwest January 21, 2005 
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law for the Entrepreneur and Manager
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Internet regulation National limits of Internet Content.
1 The Information Commons and the Future of Innovation, Scholarship & Creativity Gigi B. Sohn President Public Knowledge
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer Legislation The need for computer laws Go to Contents.
Ch3 Freedom of Speech The US Constitution.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Media Literacy: Australian context & framework Nerida O’Loughlin General Manager, Outputs Division International Media Literacy Research Forum May 15 th,
Introducing the ITAA Top Ten Public Policy Issues List.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
Net Neutrality An ethical examination of the internet’s ownership
Chapter 9: Internet Law, Social Media, and Privacy
Fundamentals of business law, 10e
Chapter 10 Cyberlaw, Social Media, and Privacy
Freedom of Expression.
A Gift of Fire Third edition Sara Baase
E-Commerce: Regulatory, Ethical, and Social Environments
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Essentials of the legal environment today, 5e
Presentation transcript:

Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend Themselves to Term Papers

Different Arenas for Different Issues Congress Executive Agencies (FCC) State Government Local Government The Courts International Regulatory “Regimes” Corporate Self-Regulation Private Citizen Action Computer Scientists Writing Code

Must ISPs be common carriers – Brand X Must local telephone companies be common carriers? for everything? (USTA v. FCC) What is fair competition between telecoms and cable etc.? Incentives for convergence (digital spectrum uses) Should cable companies be forced to open pipes to any ISPs? Should communities be allowed to require this as condition of service? (Now they aren’t: cable modem service = information service, not “communication service”) What rules should regulate commercial use of Internet? (CAN-SPAM Act e.g.) What regulatory framework should be used for VoIP communications? Should states be permitted to tax e-commerce? How should government allocate rights to the broadcast spectrum – priorities and process? MARKET REGULATION

Intellectual Property Is file-sharing technology inherently illegal? – Grokster case What is “fair use”? (Digital Media Consumers Rights Act HR1201) Should Google’s digital library fall under “fair use” protections? Is it appropriate to require electronics firms to build protections into hardware (e.g. “broadcast flag” regimes)? What role for compulsory licensing (e.g. ASCAP, etc.)? Can the Internet protect the cultural heritage? – “orphaned” works? Can the Internet enhance cultural heritage because of the “long tail”? Should the U.S. endorse the World Intellectual Property Organization treaty That would extend more rights to broadcasters? Who owns player-created materials produced under licenses from on-line-multiplayer-game makers?

Equality and Access digital divide: individuals extent of and trends in digital divide Universal broadband – federal initiative (no taxes, right of way, power lines spectrum for wireless) (Pres Bush: goal by 2007) HR144, 146; S14, should cities be allowed to provide wireless? should feds pay for broadband in remote communities – E-rate program? digital divide: communities – the schools and libraries program digital divide: countries – north/south divide

Security spyware, identity theft, spam, phishing – what can government do (HR29, HR744,S687 re spyware) use of the Internet by terrorists to coordinate activities vulnerability to cyber attacks of critical infrastructure (denial of service attacks – 13 root DSN servers at base of system) vulnerability of network reliant systems: banking, transportation, electrical power should government restrict encryption technologies?

Privacy What info should government be allowed to demand (and with what legal requirements) from ISPs & libraries? (current debate re: “sunset” provisions of Patriot Act due to expire at end of 2005) what data should the government be permitted to aggregate and store about us, and how should they be allowed to use it? what is the appropriate role of data-mining in national security (Carnivore etc) corporate surveillance of consumers corporate surveillance of employees – should they be required to warn employees what should entities that hold information be required to do to preserve its integrity, and what penalties should be exacted on those that fail? (HR 1069, HR1080, HR1263, S500) what should government require of system (e.g. P3P software so that users can automatically match preferences to policies of websites) should government regulate spyware? (HR29, HR744, S687) ISPS – should ISPS be permitted to intercept and read subscribers’ messages for Business purposes? (U.S. v. Councilman Aug – on appeal they can’t)

Freedom of Expression Should government be permitted to prosecute web sites that don’t remove “offensive” content? (Utah HB 260) Should government be permitted to compel ISPs to block web sites if the technology would lead to ancillary censorship of innocent sites How should government act to protect children from pornography? Violence? Internet addiction? Is it appropriate to hold ISPs accountable for content, or should they be classified as “common carriers” (information service v. communications service) Should libraries be required by government to have filters on computers, and to block websites with “obscene” material – what if filters also block ok material? How should the law balance trademark and intellectual property rights against free expression rights?

Transborder Issues Role of international standards orgs (e.g. domain name system) and U.S. role in them (ICANN – Internet Corporation for Assigned Names and Numbers – 1998) – should these be private or intergovernmental? Should “cybersquatting” and “cyberpiracy” continue to be illegal? Liability of ISPs under diverse national laws Should U.S. e-commerce companies have to comply with EU privacy safeguards?

Issues Related to Blogging Defamation Trade Secrets Employee blogs Intellectual property Ethics Good manners

E-Government its relation to street-level government should government use open-source and, if so, how? Should government sites be accessible from all browsers? What information should governments have to post on-line?