Do we need a tort of cyber-trespass? Steve Hedley SLS Cyberlaw 8/9/2005.

Slides:



Advertisements
Similar presentations
A Litigators View of the Law on Message Abuse A Presentation to the Messaging Anti-Abuse Working Group Summit May 18, 2004 Jon Praed Internet Law Group.
Advertisements

Domestic Laws governing activity within a country Based on a Constitution Includes Statute and Case Law International Deals with relations between nations.
MEDICAL MALPRACTICE/NEGLIGENCE IN UGANDA. CURRENT TRENDS AND SOLUTIONS
Lecturer: Miljen Matijašević Session 2,
Trespass to Chattels: eBay and Intel Richard Warner.
Legal relations. Legal relation - definition Legal relation – relation between subjects based on legal facts included in legal norms, subjects have rights.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
March 18, 2015 Law of Tort. Tort = a civil wrong A harmful action or inaction that causes harm or damage to another person DUTY OF CARE BREACH TORT.
Criminal and Civil Liability
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Chapter 3 Tort Law.
Police Powers in Great Britain
Chapter 1 Introduction to Law and Legal Reasoning
Group Community: A World Without Borders Kimberly Carter David Dobin Tim Hammond Chris Rushing.
Police and the Law 1 1 Police and the Constitution 10.1 Chapter 10 Police and the Law Chapter 10 Police and the Law.
Civil law CHAPTER 11- QUESTIONS #1, 3-5 ON P. 361.
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 6, 25 Nov 2014.
Data Protection Act. Lesson Objectives To understand the data protection act.
E – Commerce and the Applicable Law Rules Judge Ehab Maher Elsonbaty Judge of South Sinai Court in Egypt and Visiting Scholar in the Institution for computer.
Why Legal Studies? To become a more effective citizen:  recognising and managing your rights and responsibilities  being aware of the and how they impact.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Legal and Ethical Practices Law- rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority Criminal.
‘Winlus Courts’: The Island Courts of Vanuatu. Vanuatu lingua franca: Bislama Kastom = ‘custom’, conceptually flexible, but implying tradition: oppositional.
Divisions of Canadian Law Substantive and Procedural Law.
Legal Considerations Sports Med 2.
Exploring Business © 2009 FlatWorld Knowledge 16-1 The Legal and Regulatory Environment of Business.
Class Discussion Notes MKT April 10, 2001.
Fundamentals of Law (BL502) Review Australian Legal History, The Nature of the Law, Parliamentary Process. The Australian Legal System and Statutory Interpretation.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
2 TORT Means“Wrong” 3 TORT A violation of a duty imposed by civil law.
Areas of Law. Getting Started Definitions Using the internet find a definition for the following:  Civil Law  Codification  Common law  Concurrent.
B.A BUSINESS STUDIES BUS361 BUSINESS LAW. Lecture 2 The Court Structure.
Differences Between Criminal Cases and Civil Disputes
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #2 Legal Aspects of Security Security Supervision and Management Theory and.
Types of Law. Criminal Law Deal with crimes and the maintaining of law and order – Prosecutors: Bring cases against suspected criminals.
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
Environment law. UNITED NATIONS CONFERENCE ON HUMAN ENVIRONMENT STOCKHOLM1970 Legal position in India Common law-TORTS-covers all civil wrongs other than.
Types of Law. Sources of Law Constitution (Constitutional Law) –Legal framework outlining the operation of the government Statute Law –Law created by.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
What is Law?? By Maleeka Brennan. Some laws are are organized as the foundation laws of government Others are organized according to the areas they regulate.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 1 The Legal Environment
Types of Laws Objective: Explain how constitutional, statutory, case and administrative laws are created. Explain how to resolve conflicts between constitutional,
Three Pillars of the Copyright System Any efficient copyright system must include: 1) appropriate legislation 2) management mechanisms 3) enforcement.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
What is Law and why do we need it? What is the difference between Civil and Criminal Law? What is the Standard of Proof?
AS Law An Introduction. AS Law What is Law? It is difficult to give a short simple answer to this question. There is no generally agreed definition. A.
A-level Law Induction.
by John Bagby and F. William McCarty
Professional Engineering Practice
Year 10/11 Subject Selection – VCE Legal Studies.
Branches of the Law 10PEF Legal Studies.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Unit 3 Branches of Law.
“Private Injuries v. Public Offenses”
INTRODUCTION TO THE LEGAL SYSTEM
Branches of Law.
Norms and Values. Norms and Values Social Norms Expectations for behavior that members of a group are expected to follow Some people may be unaware.
Year 10/11 Subject Selection – VCE Legal Studies.
Rules and Laws An introduction.
Learning about the law This diagram shows a simplification of the hierarchy of courts in England and Wales Supreme Court Civil and criminal cases Court.
Human Rights Due Diligence as a mechanism for prevention and enhancing access to justice Claudia Saller European Coalition for Corporate Justice Access.
Please complete the AS Law Student Questionnaire
Media Law.
Branches of law Unit 3.
SQE FLK Draft Blueprint
Theory: The Nature of Law
Chapter 11: Law, Ethics, and Professionalism in Health Care
Presentation transcript:

Do we need a tort of cyber-trespass? Steve Hedley SLS Cyberlaw 8/9/2005

2 “tort of cyber-trespass” ???? A method of regulating online interactions which: a. is a general legal norm b. was and is developed by the courts c. is based on civil liability d. recognises online computing systems as property

3 Does it matter which tort? o Trespass to land? ... to chattels? ... to (another’s part of) the net? o Cyber-nuisance? o Wilkinson v. Downton ? o Breach of contract?

4 What have “trespassers” done? o Theft of data  (but not necessarily in breach of copyright) o Sent spam  (or stolen data to assist in spam) o Placed undue strain on servers o Created deep links

5 But what is “damage”? o Any use of another’s server constitutes actionable trespass (eBay, Inc v Bidder’s Edge, Inc) -vs- o Nothing short of (???physical) damage will do (Intel Corp v Hamidi )

6 “Thou shalt not trespass” - Pro o Cybertrespass should be forbidden for the same reasons that ordinary trespass is forbidden o The greater right (to shut a server down) implies the lesser (to control what others do there)

7 “Thou shalt not trespass” - Con o Much suspicion of analogies with property o Does the greater really imply the lesser? o Don’t websurfers have rights too?

8 Legal foundations of “cybertrespass”? 1. Browsewrap contract 2. Confidentiality 3. Ownership of the address 4. Copyright 5. Database right 6. Privacy

9 7. Criminal trespass (But cf the “mission creep” of this offence away from trespass: especiallyR v Bow Street Magistrates’ Court and Allison ex parte USA [2000] 2 AC 216) Legal foundations of “cybertrespass”?

10 “tort of cyber-trespass” ???? A method of regulating online interactions which: a. is a general legal norm b. was and is developed by the courts c. is based on civil liability d. recognises online computing systems as property

11 a. is a general legal norm o With so many specific rules, what is generality for ? o The technology is still developing... o... and the courts are always several steps behind it

12 b. was and is developed by the courts o The EU has already covered most of the field o It is not even clear that national Parliaments have a role here... o... much less the courts

13 c. is based on civil liability o The EU assumes that state police and prosecutors are the major movers here o Are individual claimants capable of taking on a more dynamic role?

14 d. recognises online computing systems as property o The current tendency is against o To what problem is this the solution? o The current problems are not about establishing norms but about enforcing them

15 Conclusion o Institutional differences between the US and the EU o A brave initial reaction to the problems posed by the Internet, but its time has past o Thanks but no thanks

Do we need a tort of cyber-trespass? Steve Hedley SLS Cyberlaw 8/9/2005