Privacy and Technology in the 21 st Century The Intersection of Privacy Protection and the Enforcement of Law and Intellectual Property and Consumer Rights.

Slides:



Advertisements
Similar presentations
Whois Task Force GNSO Public Forum Wellington March 28, 2006.
Advertisements

Update on Whois TF March 25, Objectives of the Task Force 1)Define the purpose of the Whois service. [complete] 2)Define the purpose of the Registered.
CcTLD Meetings Rome 2004 WHOIS & Data Privacy Jean-Christophe Vignes Registry Liaison Manager.
Intellectual Property Presentation Web Professionals ICC Jonathan LA Phillips Shay Kepple Phillips, Ltd. 456 Fulton St., Ste. 255 Peoria, Illinois.
WiredSafety and the DMCA Subpoena March 17, 2003
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Through 2008 Season Barry Bonds 762 Home Runs Roger Clemens 354 Wins Alex Rodriguez 553 Home Runs.
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
By: Vihar R. Patel VRP Law Group, 201 E. Ohio Street, Suite 304, Chicago, IL P: , F: , Web:
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Copyright © 2004 Pearson Education, Inc. Slide 1-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Doc.: IEEE /024 Submission January 2001 Jim Carlo, Texas InstrumentsSlide 1 Patents and IEEE 802 Stds IEEE 802 Chair’s Viewpoint Jim Carlo General.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Intellectual Property Boston College Law School February 1, 2007 Copyright – Digital Issues.
Intellectual Property Boston College Law School February 4, 2008 Copyright – Digital Issues.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
The Internet and the Law WeeSan Lee
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Text #ICANN51. Text #ICANN51 15 October 2014 At-large policy round table Holly Raiche Panel 1: Privacy and Proxy 1000 – 1045 Hrs.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
PBL 2: The Digital Dilemma ITED 8100 Spring 2004 Sandra Campagnone Sharon Strefling Sandra Washington.
Electronic Use Policies.   Social Media  Internet.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Copyright and Fair Use For Genealogists, Authors, Lecturers, and Hobbyists Using TMG  database © 2013 Catherine K. Wilson All Rights Reserved. For RUG.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
GNSO Public Forum Dr Bruce Tonkin Chair, GNSO Council Lisbon, 29 March 2007.
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
IRTP Part D PDP WG Items for Review. Items for Review Policy Development Process WG Charter GNSO WG Guidelines.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Industrial Design Marco Marzano de Marinis SMEs Division.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Policy Perspective on the File Sharing Issues Charles E Phelps Provost University of Rochester.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
GAC SESSION 9: Privacy and Proxy (P/P) Services Accreditation Issues.
Concerns of Noncommercial Users Constituency Privacy Conference November 29, 2005 Kathryn A. Kleiman, Esq. Internet Law and Policy Specialist, McLeod,
Chapter 9: Internet Law, Social Media, and Privacy
Fundamentals of business law, 10e
Ethical, Social, and Political Issues in E-commerce
A Gift of Fire Third edition Sara Baase
Computers and the Internet
Essentials of the legal environment today, 5e
EE DNS FORUM / UADOM Domain name dispute resolution: challenges and alternatives Kateryna Oliinyk Head of Arzinger IP practice, Patent and Trademark Attorney.
What does that have to do with me?
Presentation transcript:

Privacy and Technology in the 21 st Century The Intersection of Privacy Protection and the Enforcement of Law and Intellectual Property and Consumer Rights An Overview of Current Events in Privacy Protections (or not) in Online Searches and Social Networking Sites

Kia Ora Philip J. Greene InternetNZ Senior Research Fellow in Cyberlaw Victoria University School of Law Wellington, New Zealand

What is WHOIS?? Contact and related information concerning a domain name registration, namely: Name of Registrar Name of Registrant, including address, phone number and Creation Date Expiration Date Administrative, Technical and Billing Contact info

From InterNIC web site’s FAQs: Will my name and contact information be publicly available? Information about who is responsible for domain names is publicly available to allow rapid resolution of technical problems and to permit enforcement of consumer protection, trademark, and other laws. The registrar will make this information available to the public on a "Whois" site. It is however possible to register a domain in the name of a third party, as long as they agree to accept responsibility -- ask your registrar for further details.

Why Open Access to WHOIS?? 1.Intellectual property owners need speedy and inexpensive access to domain and Web site owners 2.Law enforcement officials also need access, if web site offers/abets illegal content and/or activity, is a source of spyware, viruses, phishing, etc. 3.Consumers often use WHOIS for contact and identity purposes (to register a complaint; to investigate possible phishing; selection of a vendor, etc.)

TradeMe.Co.Nz

Don’t Tread On Me?

WHOIS to the Rescue

What WHOIS Offers

Matter of First Impression?

Got a Secret?

Prove Your Qualifications to Teach New Zealand Qualifications Authority Web site, found at NZQA.GOVT.NZ

Prove Your Qualifications

Or NOT!

Or Not

What’s a Gripe Site?

Why NOT Open Access to WHOIS? 1.Invasion of privacy - registrant might not want identity revealed 2.Exposes addresses to spam, phishing, virus and other attacks 3.Is said to violate European Union’s 2002 Directive on privacy and electronic communications, as well as other national privacy/data rights laws.

What is Status of WHOIS? ICANN has just issued its Final Outcomes Report on the WHOIS Working Group 2007, please see: report-final-1-9.pdf Grist for mill, discussion at next ICANN Meeting, Los Angeles, 31 October 2007

Scope of ICANN’s 2007 Review The WHOIS Working Group Outcomes Report (Report) was prepared in response to the GNSO Resolution of 28 March 2007, which created a WHOIS Working Group (WG) to examine three issues and to make recommendations concerning how current policies may be improved to address these issues: #1. to examine the roles, responsibilities, and requirements of the operational point of contact (OPOC), and what happens if they are not fulfilled; #2. to examine how legitimate interests will access unpublished registration data; #3. to examine whether publication of registration contact information should be based on the type of registered name holder (legal vs. natural persons) or the Registrant’s use of a domain name.

Could it be….. Just What IS a Natural Person?

Differentiating Between Natural and Legal Persons From ICANN Report: Working definition: a natural person is a real living individual. a legal person is a company, business, partnership, non-profit entity, association etc.

Other Possible ICANN Options? The Special Circumstances Proposal Special Circumstances model, also known as the Netherlands Model, because the rules are similar to those governing the.nl top-level domain: "It allows individuals who demonstrate the existence of special circumstances to substitute contact details of the registrar for the data that would otherwise appear in published Whois." In other words, it allows some people to use the OPoC model if they qualify.

The Special Circumstances Proposal So who qualifies? According to the ICANN report: “The proposal envisages that full contact data of individuals would be held back from publication in the Whois only when this "would jeopardize a concrete and real interest in their personal safety or security that cannot be protected other than by suppressing that public access." This would seem to indicate that the vast majority of contact information would be published in the Whois, and that means of access to unpublished data would rarely be required.”

Intellectual Property v. Privacy, Pt. II - P2P File Sharing Litigation Recording industry battles use of peer-to- peer (P2P) file-swapping software, such as Napster, KaZaa, LimeWire, Grokster, et al. Copyright infringement. Recording Industry Association of America (RIAA) initiated a two-pronged attack. Phase One, RIAA brought suit against these software providers to shut them down.

RIAA v. Verizon, Pt. I Phase Two, RIAA commenced the filing of law suits against the actual users doing the file-sharing (2002). Only IP address of user’s computer known. RIAA relied on streamlined subpoena process of the Digital Millennium Copyright Act to compel disclosure of users’ identities.

RIAA v. Verizon, Pt. I Verizon, an ISP, challenged RIAA’s practices. In two decisions, issued in early 2003, the U.S. District Court for the District of Columbia, ruled in favour of the RIAA, approving of the use of DMCA subpoena process to compel disclosure. See, 240 F. Supp. 2d 24 and 257 F. Supp. 2d 244.

RIAA Wins!

RIAA v. Verizon, Part II Verizon appealed - U.S. Court of Appeals for D.C. reversed the District Court decision, ruled in favour of Verizon. RIAA could no longer use streamlined subpoena process. Verizon not hosting the content, only an access provider. As such, Verizon and other ISPs were protected by the Safe Harbour provisions of DMCA § 512(c). RIAA must use DMCA’s Notice and Takedown provisions in tandem with subpoena process. See: Recording Indus. Ass'n of Am., Inc. v. Verizon Internet Servs., 351 F.3d 1229, 1236 (D.C. Cir. 2003).

Verizon Prevails

What About in Europe?

Part III – Privacy Issues and Online Behavioural Advertising, or Don’t Google Your Old Girlfriend!!

AutoDelete?

Microsoft/Ask.com Promise Search Privacy Reforms

U.S. Government Role?

Is This Enough? A Good Start?

Or Just More Paralysis By Analysis?

Thank you again, Kia Ora!

Philip J. Greene InternetNZ Senior Research Fellow in Cyberlaw Victoria University School of Law Wellington, NZ