Intermediary responsibility and safe harbors – why they matter.

Slides:



Advertisements
Similar presentations
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
Advertisements

U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Intermediary Liability & Gatekeeping Protecting Platforms for Freedom of Expression These slides were compiled by CDT in December They may be freely.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
1 AFCEA Europe. 2 Agenda  Current and future use of COTS in the Battlespace  Adaptations and Challenges  Questions/Discussion.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
Filtering Managing Unwanted Mail. Managing unwanted spam mail : Server Side Filtering Spam filtering at Monash comes in two forms. Server Side.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
The Right to Food Safety Role of Civil Society in Promoting Food Safety Sam K. Watasa Executive Director Uganda Consumers Protection Association Uganda.
Date of Presentation Guidelines for Industry on Child Online Protection © UNICEF/NYHQ /OLIVIER ASSELIN.
SOCIAL MEDIA MARKETING PLAN For each slide, copy as many times as needed to fully explain your circumstances.
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
WHAT TECHNICAL SUPPORT DO SCHOOLS NEED ? Richard Galvin Director, European School Mol, Belgium
ISO and Consumers CI Congress sub-plenary 6c - How can ISO be used by consumer groups? Jens Henriksson Swedish Consumer Expert.
Christopher Boam Counsel for Internet & Global Ecommerce MCI, Inc., International Affairs on behalf of WITSA The World Information Technology and Services.
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Are Your Equipped to Fight Against Cyber Sharks of Internet to Protect your Kids?
BUSINESS B1 Information Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Digital Millennium Copyright Act (“DMCA”). Common MLS Issue Listing Agent uploads infringing photo –Examples All members republish photo on IDX sites.
Promoting the Internet Economy G ARY H ORLICK J ONATHAN B AND.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer-Assisted Communication
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Driving Traffic It is not enough to promote your site when it is first launched. You also need to actively promote your site on a long term basis.
Marketing in The Current Landscape Not clear where to put marketing dollars Digital marketing seems to provide results, but we’re not sure which.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. Defined in Universal Declaration of Human Rights.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
4 th ACTION Meeting with a Marketing Manager As a matter of fact there is not an accurate definition of I.M. In brief, the I.M includes un contractual.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Jeopardy: Digital Citizenship Please use presentation mode!
Parenting 2.0 Raising Responsible Digital Citizens.
United Nations Regional Seminar on Census Data Dissemination and Spatial Analysis for Arabic Speaking Countries, Amman, Jordan May 2011 Identification.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
© INYATHELO1 Effective Online Strategies for the Advancement Operation by Jannie Smith.
Secui.com Goh, Kyeongwon Secui.com Goh, Kyeongwon GRID Security Infrastructure
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Components of wireless LAN & Its connection to the Internet
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Advantages and disadvantages of TechMed using web 2.0 technologies. What is Web 2.0? Web 2.0 describes World Wide Web sites that use technology beyond.
Parenting 2.0 Raising Responsible Digital Citizens.
Contributions to Archives Infrastructure Bradley Westbrook AT Project Manager.
A Network Security -Firewall Bruce Turin.
COMMUNICATIONS LAW COMM 407. COURTS and PUBLIC POLICY There is rarely an important policy that would not be affected by the courts From trains, NFL stadiums,
Monitoring Employees on Networks
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.
Laws and Rules That Govern Internet Safety Ashley Martin.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
E- Safety Victoria Community School 9 th July 2015.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
E-Safety Parent Talk Helping to keep your children safe online.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
 Privacy as a legal concept Warren & Brandies., Harv.L.R., Vol 4 (1890) The right to be let alone.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Why Civil Society should lobby and protect our right to use the Internet ISPA Internet Week, Thursday 12 September The Association for Progressive Communications.
The Big Interview Samara Deese EDU 650 Dr. Reason December 8, 2014.
Top 5 Open Source Firewall Software for Linux User
Agenda 09:00 – 09:30 Coffee and gipfeli 09:30 – 09:35 Welcome
Presentation transcript:

Intermediary responsibility and safe harbors – why they matter

What is an “intermediary”?

Intermediaries are key enablers of the Internet’s success

The Internet depends on clear safe harbors for intermediaries

Existing safe harbors have been crucial to the Internet’s success Communications Decency Act Section 230 “Intermediaries should not be required to monitor user-generated content and should not be subject to extrajudicial content takedown rules which fail to provide sufficient protection for freedom of expression” – UN’s Joint Declaration of Freedom of Expression on the Internet

Safe harbors need to be broad, clear and practical

Intermediary responsibility and addressing misuse of the Internet

Attacking problems at the ends of the network Eg: Client side filtering tools

Safe harbors enable market solutions Eg: YouTube’s Content ID

Safe harbors enable market solutions Eg: Community guidelines and flagging tools

Safe harbors enable market solutions Eg: Spam

Pursue the most proportional response

Leave room for adaptation

Thank you