SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Cyberlaw and Information
             Intermediaries
                                         Eddan Katz
                               International Affairs Director
                               Electronic Frontier Foundation




Wednesday, December 29, 2010                                    1
Cyberlaw

                   Intellectual Property
                   Telecommunications
                   Media Law
                   Cybercrime
                   Internet Jurisdiction

Wednesday, December 29, 2010               2
Netizen Rights

                   Freedom of Expression
                   Due Process
                   Privacy
                   Transparency
                   Consumer Protection

Wednesday, December 29, 2010               3
Access to Knowledge
                   Innovation
                           Open Infrastructure
                           Collaborative Production
                   Development
                           Economic Growth
                           Individual Autonomy
Wednesday, December 29, 2010                          4
Regulating Behavior

                           developing strategies to use human or institutional
                           intermediaries
                           indirectly regulate individual behavior by changing the
                           technology itself



Wednesday, December 29, 2010                                                         5
Traditional Gatekeeper Role

                   Whistleblower
                   Bouncer
                   Chaperone



Wednesday, December 29, 2010                    6
Types of Information Intermediaries

                   Hosting Providers

                   Internet Service Providers   Search Engines

                   Domain Name Registrars       Participative Web Platforms

                   Financial Intermediaries     Virtual Worlds

                   Auction Platforms and        Distributed Computing
                   eCommerce actors             Social Networks



Wednesday, December 29, 2010                                                  7
Immunity from Liability

                   Communications Decency Act §230 (1996)
                           No provider or user of an interactive computer service shall be treated as the publisher
                           or speaker of any information provided by another information content provider.

                                1. The defendant must be a "provider or user" of an "interactive computer
                                service."

                                2. The cause of action asserted by the plaintiff must "treat" the defendant "as the
                                publisher or speaker" of the harmful information at issue.

                                3. The information must be "provided by another information content provider,"
                                i.e., the defendant must not be the "information content provider" of the harmful
                                information at issue.
Wednesday, December 29, 2010                                                                                          8
Copyright Safe Harbor

                   Digital Millennium Copyright Act §512 (1998)
                           Transitory Digital Network Communications
                           System Cacheing
                           Information Residing on Systems
                           Information Location Tools

Wednesday, December 29, 2010                                           9
Notice & Takedown Procedure

                   Infringement Allegation Notice
                           The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]

                           The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an
                           "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)
                           (3)].

                           Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].

                           A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials
                           complained of [512(c)(3)(A)(v)].

                           A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is
                           authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].


Wednesday, December 29, 2010                                                                                                                10
Counter-Notice & Putback Proecdure

                   Counter-Notice Requirements
                           The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]

                           Identification of the material and its location before removal [512(g)(3)(B)]

                           A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)
                           (3)(C)]

                           Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)
                           (D)]

                   Putback
                           [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service
                           provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

Wednesday, December 29, 2010                                                                                                               11
Trademark Infringement

                   Lanham Act 32(2)
                           (B) Where the infringement or violation complained of is contained in or is part of paid advertising matter in a
                           newspaper, magazine, or other similar periodical or in an electronic communication as defined in section 2510
                           (12) of title 18, United States Code, the remedies of the owner of the right infringed or person bringing the
                           action under section 43(a) [15 USC 1125(a)] as against the publisher or distributor of such newspaper,
                           magazine, or other similar periodical or electronic communication shall be limited to an injunction against the
                           presentation of such advertising matter in future issues of such newspapers, magazines, or other similar
                           periodicals or in future transmissions of such electronic communications. The limitations of this subparagraph
                           shall apply only to innocent infringers and innocent violators.




Wednesday, December 29, 2010                                                                                                             12
Netizen Rights (redux)

                   Freedom of Expression
                   Due Process
                   Privacy
                   Transparency
                   Consumer Protection

Wednesday, December 29, 2010               13
Freedom of Expression

                   Freedom of Speech
                   Right to Read
                   Chilling Effects
                   Democratic Culture
                   Anonymity

Wednesday, December 29, 2010              14
Due Process

                   Notice of Procedure
                   Specificity of Claims
                   Right to Appeal
                   Redress for Abuse/Misuse of Law


Wednesday, December 29, 2010                         15
Privacy
                   Notice/Disclosure/Collection Limitation
                           Mandatory Disclosure of Personal Data
                   Choice/Consent
                   Access
                   Security/Integrity
                   Enforcement/Redress
Wednesday, December 29, 2010                                       16
Transparency

                   Arbitrary Application of Law
                   Conflicts of Interest
                   Accountability
                   Accuracy


Wednesday, December 29, 2010                      17
Consumer Protection

                   Anti-Competitive Behavior
                   False Advertising
                   Contracts of Adhesion/Terms of Service
                   Unconscionable Terms


Wednesday, December 29, 2010                                18
Open Innovation
                   End-to-End Principle

                   Interoperability           Freedom to Tinker

                   Creative Destruction       Distributed Responsibility

                   Level Playing Field        Self-Organizing Community

                   Collaborative Production   Reputation Economies

                   Modularity                 Correctability

                   Granularity

Wednesday, December 29, 2010                                               19
Domestic Economic Growth

                   Translation
                   Adaptability to Local Customs
                   Network Effects
                   Open Standards
                   Skill Development

Wednesday, December 29, 2010                       20
Thank you.
                  Eddan Katz
                         eddan@eff.org
                  Danny O’Brien
                         danny@eff.org



Wednesday, December 29, 2010             21

Mais conteúdo relacionado

Destaque

Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslidesEddan Katz
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTAEddan Katz
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Eddan Katz
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Eddan Katz
 

Destaque (7)

Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslides
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTA
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 
A2krussia
A2krussiaA2krussia
A2krussia
 
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
Leveraging the INDECT Project: An Activist Strategy to Implement Privacy Ethi...
 
A2k rit
A2k ritA2k rit
A2k rit
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009
 

Semelhante a Thainetizennetwork slides day1

Cyberlaw and Information Intermediaries
Cyberlaw and Information IntermediariesCyberlaw and Information Intermediaries
Cyberlaw and Information IntermediariesSarinee Achavanuntakul
 
Eddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddan Katz
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the lawSu Little
 
Chapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxChapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxTekle12
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace CommtInternet Law Center
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Assignment 1
Assignment 1Assignment 1
Assignment 1NWAce
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 
Assignment 1
Assignment 1Assignment 1
Assignment 1NWAce
 
Policing Piracy 2011
Policing Piracy 2011Policing Piracy 2011
Policing Piracy 2011Rob Jewitt
 
cyber security seminar session-3.pptx
cyber security seminar session-3.pptxcyber security seminar session-3.pptx
cyber security seminar session-3.pptxVijay Rathod
 

Semelhante a Thainetizennetwork slides day1 (20)

Cyberlaw and Information Intermediaries
Cyberlaw and Information IntermediariesCyberlaw and Information Intermediaries
Cyberlaw and Information Intermediaries
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Human Resource Information System
Human Resource Information SystemHuman Resource Information System
Human Resource Information System
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Eddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdataEddankatz publicvoice globalflowsofdata
Eddankatz publicvoice globalflowsofdata
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
Chapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptxChapter 6emerging technology - EMTE.pptx
Chapter 6emerging technology - EMTE.pptx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law  Cal Bar Cyberspace CommtEssentials Of Cyberspace Law  Cal Bar Cyberspace Commt
Essentials Of Cyberspace Law Cal Bar Cyberspace Commt
 
Chapter 6 - EMTE.pptx
Chapter 6 - EMTE.pptxChapter 6 - EMTE.pptx
Chapter 6 - EMTE.pptx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Piracy
PiracyPiracy
Piracy
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Policing Piracy 2011
Policing Piracy 2011Policing Piracy 2011
Policing Piracy 2011
 
cyber security seminar session-3.pptx
cyber security seminar session-3.pptxcyber security seminar session-3.pptx
cyber security seminar session-3.pptx
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 

Thainetizennetwork slides day1

  • 1. Cyberlaw and Information Intermediaries Eddan Katz International Affairs Director Electronic Frontier Foundation Wednesday, December 29, 2010 1
  • 2. Cyberlaw Intellectual Property Telecommunications Media Law Cybercrime Internet Jurisdiction Wednesday, December 29, 2010 2
  • 3. Netizen Rights Freedom of Expression Due Process Privacy Transparency Consumer Protection Wednesday, December 29, 2010 3
  • 4. Access to Knowledge Innovation Open Infrastructure Collaborative Production Development Economic Growth Individual Autonomy Wednesday, December 29, 2010 4
  • 5. Regulating Behavior developing strategies to use human or institutional intermediaries indirectly regulate individual behavior by changing the technology itself Wednesday, December 29, 2010 5
  • 6. Traditional Gatekeeper Role Whistleblower Bouncer Chaperone Wednesday, December 29, 2010 6
  • 7. Types of Information Intermediaries Hosting Providers Internet Service Providers Search Engines Domain Name Registrars Participative Web Platforms Financial Intermediaries Virtual Worlds Auction Platforms and Distributed Computing eCommerce actors Social Networks Wednesday, December 29, 2010 7
  • 8. Immunity from Liability Communications Decency Act §230 (1996) No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. 1. The defendant must be a "provider or user" of an "interactive computer service." 2. The cause of action asserted by the plaintiff must "treat" the defendant "as the publisher or speaker" of the harmful information at issue. 3. The information must be "provided by another information content provider," i.e., the defendant must not be the "information content provider" of the harmful information at issue. Wednesday, December 29, 2010 8
  • 9. Copyright Safe Harbor Digital Millennium Copyright Act §512 (1998) Transitory Digital Network Communications System Cacheing Information Residing on Systems Information Location Tools Wednesday, December 29, 2010 9
  • 10. Notice & Takedown Procedure Infringement Allegation Notice The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)] The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d) (3)]. Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)]. A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)]. A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)]. Wednesday, December 29, 2010 10
  • 11. Counter-Notice & Putback Proecdure Counter-Notice Requirements The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)] Identification of the material and its location before removal [512(g)(3)(B)] A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g) (3)(C)] Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3) (D)] Putback [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)] Wednesday, December 29, 2010 11
  • 12. Trademark Infringement Lanham Act 32(2) (B) Where the infringement or violation complained of is contained in or is part of paid advertising matter in a newspaper, magazine, or other similar periodical or in an electronic communication as defined in section 2510 (12) of title 18, United States Code, the remedies of the owner of the right infringed or person bringing the action under section 43(a) [15 USC 1125(a)] as against the publisher or distributor of such newspaper, magazine, or other similar periodical or electronic communication shall be limited to an injunction against the presentation of such advertising matter in future issues of such newspapers, magazines, or other similar periodicals or in future transmissions of such electronic communications. The limitations of this subparagraph shall apply only to innocent infringers and innocent violators. Wednesday, December 29, 2010 12
  • 13. Netizen Rights (redux) Freedom of Expression Due Process Privacy Transparency Consumer Protection Wednesday, December 29, 2010 13
  • 14. Freedom of Expression Freedom of Speech Right to Read Chilling Effects Democratic Culture Anonymity Wednesday, December 29, 2010 14
  • 15. Due Process Notice of Procedure Specificity of Claims Right to Appeal Redress for Abuse/Misuse of Law Wednesday, December 29, 2010 15
  • 16. Privacy Notice/Disclosure/Collection Limitation Mandatory Disclosure of Personal Data Choice/Consent Access Security/Integrity Enforcement/Redress Wednesday, December 29, 2010 16
  • 17. Transparency Arbitrary Application of Law Conflicts of Interest Accountability Accuracy Wednesday, December 29, 2010 17
  • 18. Consumer Protection Anti-Competitive Behavior False Advertising Contracts of Adhesion/Terms of Service Unconscionable Terms Wednesday, December 29, 2010 18
  • 19. Open Innovation End-to-End Principle Interoperability Freedom to Tinker Creative Destruction Distributed Responsibility Level Playing Field Self-Organizing Community Collaborative Production Reputation Economies Modularity Correctability Granularity Wednesday, December 29, 2010 19
  • 20. Domestic Economic Growth Translation Adaptability to Local Customs Network Effects Open Standards Skill Development Wednesday, December 29, 2010 20
  • 21. Thank you. Eddan Katz eddan@eff.org Danny O’Brien danny@eff.org Wednesday, December 29, 2010 21