SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Th
Re–venge porn, n. - A form of cyber-
rape thatinvolves the distribution of
sexually explicit photos and/or videos
of an individual (either real or
photoshopped) on the Internet without
permission. Revenge porn, sometimes
called involuntary porn, is usually posted
by a scorned ex-lover or friend, in order
to seek revenge after a relationship has
gone sour.
EndRevengePorn.com
THE VICTIMS
PART 1
But what these people don’t realize is a
victim of Revenge Porn, I am victimized
every time someone types my name into the
computer. The crime scene is right before
everyone’s eyes, played out again and
again, and, ironically, I am treated as if I am
the one who has committed the crime. I am
victimized very time someone tells me that
it’s my fault because I consented to the
taking of the photos.
Rebekah Wells
WomenAgainstRevengePorn.com
Hollie Toups
ArmyofShe.com
I felt my life was over. I feared I would never
be able to pursue my career in Criminal
Justice, and more importantly I was
terrified. Someone was single-handedly
destroying my life with the click of a button
from behind a computer screen.
Together we can make a difference, because we
may be bent, but we will never be broken. . .
.We’ve all been living in the shadows. Where I
was ashamed before, now I can feel proud that
we can help people.
NOTE: ArmyofShe.com;
Dozens of Women Join ‘Revenge Porn’ Class Action Lawsuit Against Texxxan.com. ABC Nightline;
GoDaddy.com Among Defendants in Revenge Porn Lawsuit; Houston Chronicle
EndRHollie Toups
ArmyofShe.com
evengePorn.com
Stand up for what you feel is right. It’s not OK that people are
doing this and exploiting you, just because you trusted
somebody and because you shared intimate photographs in an
intimate relationship. That’s not the problem here. The problem
is that somebody is using this against you and trying to drive you to
suicide. They’re ruining our lives. That’s not OK.
I’m coming out because I’m tired of hiding . . . I hope that I’ll set an
example and show this is how you overcome this: by coming
forward. You’re not exposing yourself—you’re already exposed
on the internet. Instead, you’re exposing what is happening to
you. Everybody’s going to see me naked, and everybody’s going to
see me do things I never wanted anybody to see except the person
I was with. But if it’s in the name of the cause and to change the
laws about this, then I’m happy to do it. We’re all naked underneath
our clothes.
Holly Jacobs
EndRevengePorn.com
NOTES: A Victim Speaks: Standing Up to a Revenge
Porn Tormentor,
BetaBeat; Revenge porn’ victim fights back: ‘I was
terrified, Today Show
PART 2
THE PORNOGRAPHERS
I really don’t give a fuck. Why should I
care? It’s not my life. It’s literally just a
business. It’s stupid not to monetize it.
People threaten me with lawsuits every
day, which is funny, because it fuels
the site.
–Hunter Moore, Founder of Is Anyone
Up
These are not victims. These are
people that have decided to publicly
transmit their own information.
I call it entertainment. We don’t want
anyone shamed or hurt we just want
the pictures there for entertainment
purposes and business.
Craig Brittain, Founder of Is Anybody
Down
NOTES: The Battle Over Revenge Porn: Can Hunter Moore the Webs Vilest Entrepreneur Be Stopped, BetaBeat Hunter Moore,
Founder of Anyone Up, Says New Website Will be Scariest on the Internet, Huffington Post Is Anybody Down?, Wikipedia
PART 3
THE WARRIORS
This is a form of cyber human
trafficking, or as it has been termed
“cyber rape,” because they take photos
of women for the purpose of
dehumanizing them, for the purpose of
degrading them, and they go even
further.
John S. Morgan
John S. Morgan Law Firm
Lead Counsel in Toups v. GoDaddy.com (Tex. Dist. Ct.)
Note: Dozens of Women Join ‘Revenge Porn’ Class Action Lawsuit Against Texxxan.com. ABC Nightline
I want to hurt isanybodydown.com.
I want to hurt them bad.
Who’s with me?
Marc Randazza
Randazza Legal Group
Lead Attorney in UGotPosted (S.D.Cal.)
Note: Let’s Fuck Up David Blade Attorney at Law and IsAnybodyDown.com. Who’s With me?, Legal Satyricon
To future employers who might be squeamish about what may
or may not be online about these ladies, remember that the
strongest steel is forged in the hottest fire. These women are
just discovering their potential. General Patton once said the true
measurement of success is not how high one climbs, but how high
one bounces after hitting the bottom. By this measurement, Ms.
Toups and Wells are practically Rockefellers.
As to the bigger debate, existing case law has limited the scope of
website immunity under the Communications Decency Act where
the site operator was potentially liable if it participated or facilitated
illegal conduct. I believe the revenge porn sites should be held
liable, but this would not extend to registrars or hosts such as
GoDaddy absent some scienter on their part.Bennet Kelley
Internet Law Center
Victims Attorney
PART 4
LEGISLATORS
People who post or text pictures that
are meant to be private as a way to
seek revenge are reprehensible. Right
now, there is no tool for law enforcement
to protect the victims. Too many have
had their lives upended because of an
action of another that they trusted. This is
a common sense bill that clamps down
on those who exploit intimacy and
trust for revenge or personal gain.California State Senator
Anthony Cannella
Author of California Revenge Porn Law
Senator Cannella Strikes Back at Cyber Revenge
PART 5
COMMENTATORS
What does it say about society that
websites where angry men shame
their ex-lovers are thriving? The
purpose of revenge porn isn’t to allow
regular guys the opportunity to see
some naked girls-next-door; it’s
explicitly purposed to shame,
humiliate and destroy the lives and
reputations of young women.
Note: Revenge Porn Degrades Women,The Guardian
Blanket immunity for revenge porn operators is incompatible
with congressional purpose. Section 230 celebrates the Internet
as a “forum for a true diversity of political discourse, unique
opportunities for political development, and myriad avenues for
intellectual activity” for the “benefit of all Americans.” But revenge
porn sites and other cyber cesspools threaten the universality of the
Internet’s benefits by encouraging cyber harassment that silences
women and minorities, narrows the range of political discourse, and
stifles intellectual activity.
Congress ought to consider passing laws that criminalize the
operation of sites designed to facilitate the posting of nude
photographs without subjects’ consent, along the lines of state
invasion of privacy laws. . . The Senate Judiciary Committee
recently approved a bill that makes it a crime to make an
online app whose primary use is to facilitate cyber
stalking. The next important step is to criminalize sites doing
the same.
Danielle Citron,
University of Maryland School of Law
Note: Revenge Porn and the Uphill Battle to Sue Site Operators, Concurring Opinions;
Revenge Porn Site Operators and Federal Criminal Liability; Concurring Opinions
Every time a distasteful content website flares up in the
media, the pro-regulation crowd agitates for amendments
to 47 USC 230. . . . First, we are already seeing troubling
efforts to exploit the existing exceptions to Section 230,
such as trademark lawsuits against consumer review
websites and plaintiffs abusing copyright to create a “right
to forget.” Adding another exception will just create
more possibilities for mischief.
Still, for individuals who would prefer not to be a
revenge porn victim or otherwise have intimate
depictions of themselves publicly disclosed, the
advice will be simple: don’t take nude photos or
videos.
Eric Goldman,
Santa Clara High Tech Law Institute
Note: What Should We Do About Revenge Porn Sites LIke Texxxan.com, Forbes
The first thing that strikes me about Prof. Goldman’s discussion of revenge porn
(and this is true of many discussions of the issue) is the failure to note its
gendered dimensions. . . . The second interesting omission in Prof.
Goldman’s article is any mention of the harm revenge porn causes. The
victims of these acts have lost jobs, been forced to change schools,
change their names, and have been subjected to real-life stalking and
harassment because of the actions of those who posted and distributed
their images. Some victims have committed suicide. The sexually explicit
images of them have been sent to their parents, their children, their classmates,
their employers; they have been used to blackmail, stalk, and threaten their
subjects. This is not merely “distasteful,” and it most certainly is not like having
a colleague look up the price of your home.
Given these omissions, perhaps it is not surprising that Prof. Goldman
concludes with the recommendation that he does. The wording is telling: “for
individuals who would prefer not to be a revenge porn victim…” According to
Prof. Goldman, one can simply “prefer” not to do be a victim of forced sexual
exposure. But I wonder if Prof. Goldman, or anyone else offering similar
advice, has considered the fact that women and men are not equally at
risk for either becoming the target of revenge porn or of suffering the
negative consequences of it.
Mary Anne Franks
University of Miami School of Law
Note: Why We Need a Federal Criminal Law Response to Revenge Porn, Concurring Opinions; Why We Need a Federal Criminal
Law Response to Revenge Porn, Concurring Opinions Concurring Opinions
ABOUT
US
Bennet Kelley
• Founder of the Internet Law Center in
Santa Monica, California
• Past Co-Chair California Bar
Cyberspace Committee
• Part of US Delegation of Internet
Experts to meet with Leading Chinese
“Netizens”
• Part of US Delegation for US-China
Legal Exchange on E-Commerce
• Host of Cyber Law and Business
Report on WebmasterRadio.fm
• Publisher of award-winning
Cyber Report
r
InternetLawCenter.net CyberLawRadio.com
@InternetLawCent @CyberLawRadio
Ilccyberreport.com Cyberlawradio.wordpress.com
100 Wilshire Blvd, Suite 940, Santa Monica, CA 90401
(310) 452-0401/ bkelley@internetlawcenter.net

Mais conteúdo relacionado

Mais procurados

Harassment
HarassmentHarassment
Harassmentxuxa8
 
2015 Employee presentation
2015 Employee presentation2015 Employee presentation
2015 Employee presentationJesse Nichols
 
Kegler Brown's 2015 Managing Labor + Employee Relations Seminar
Kegler Brown's 2015 Managing Labor + Employee Relations SeminarKegler Brown's 2015 Managing Labor + Employee Relations Seminar
Kegler Brown's 2015 Managing Labor + Employee Relations SeminarKegler Brown Hill + Ritter
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipErica Reid
 
sexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by parameshsexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by parameshParameswar Rao
 
Day 15 | Misogyny online | Freedom of expression & violence
Day 15 | Misogyny online | Freedom of expression & violenceDay 15 | Misogyny online | Freedom of expression & violence
Day 15 | Misogyny online | Freedom of expression & violencetakebackthetech
 
Boston federal charges lawyer
Boston federal charges lawyerBoston federal charges lawyer
Boston federal charges lawyerAbbey Edinburgh
 
Sexual Harassment at Workplace - Pilot Survey Report
Sexual Harassment at Workplace - Pilot Survey ReportSexual Harassment at Workplace - Pilot Survey Report
Sexual Harassment at Workplace - Pilot Survey ReportAzaadi
 
SEXUAL HARASSMENT AT WORKPLACE
SEXUAL HARASSMENT  AT WORKPLACESEXUAL HARASSMENT  AT WORKPLACE
SEXUAL HARASSMENT AT WORKPLACEOJO SUNDAY
 
Plans of ideas choosing genre
Plans of ideas   choosing genrePlans of ideas   choosing genre
Plans of ideas choosing genrejuhelmiah
 
Phanees Murthy sexual harrasment case
Phanees Murthy sexual harrasment casePhanees Murthy sexual harrasment case
Phanees Murthy sexual harrasment caseAshwani Kumar
 

Mais procurados (18)

Harassment
HarassmentHarassment
Harassment
 
Who's right is it anyway
Who's right is it anywayWho's right is it anyway
Who's right is it anyway
 
2015 Employee presentation
2015 Employee presentation2015 Employee presentation
2015 Employee presentation
 
Kegler Brown's 2015 Managing Labor + Employee Relations Seminar
Kegler Brown's 2015 Managing Labor + Employee Relations SeminarKegler Brown's 2015 Managing Labor + Employee Relations Seminar
Kegler Brown's 2015 Managing Labor + Employee Relations Seminar
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
sexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by parameshsexual harassment at work place ppt by paramesh
sexual harassment at work place ppt by paramesh
 
Day 15 | Misogyny online | Freedom of expression & violence
Day 15 | Misogyny online | Freedom of expression & violenceDay 15 | Misogyny online | Freedom of expression & violence
Day 15 | Misogyny online | Freedom of expression & violence
 
Boston federal charges lawyer
Boston federal charges lawyerBoston federal charges lawyer
Boston federal charges lawyer
 
Houston Wks Presentation 110209 Abbrev Kim (3)
Houston Wks Presentation 110209 Abbrev Kim (3)Houston Wks Presentation 110209 Abbrev Kim (3)
Houston Wks Presentation 110209 Abbrev Kim (3)
 
Sexual Harassment at Workplace - Pilot Survey Report
Sexual Harassment at Workplace - Pilot Survey ReportSexual Harassment at Workplace - Pilot Survey Report
Sexual Harassment at Workplace - Pilot Survey Report
 
18 Film
18 Film18 Film
18 Film
 
SEXUAL HARASSMENT AT WORKPLACE
SEXUAL HARASSMENT  AT WORKPLACESEXUAL HARASSMENT  AT WORKPLACE
SEXUAL HARASSMENT AT WORKPLACE
 
Plans of ideas choosing genre
Plans of ideas   choosing genrePlans of ideas   choosing genre
Plans of ideas choosing genre
 
Mind map hooligan film
Mind map   hooligan filmMind map   hooligan film
Mind map hooligan film
 
Phanees Murthy sexual harrasment case
Phanees Murthy sexual harrasment casePhanees Murthy sexual harrasment case
Phanees Murthy sexual harrasment case
 
broken windows policing
broken windows policingbroken windows policing
broken windows policing
 
Privacy Law
Privacy LawPrivacy Law
Privacy Law
 
Anti-Sexual Harassment case studies
Anti-Sexual Harassment case studiesAnti-Sexual Harassment case studies
Anti-Sexual Harassment case studies
 

Destaque

How Pornography Affects Developing Brains - Dr. Jennifer Brown
How Pornography Affects Developing Brains - Dr. Jennifer BrownHow Pornography Affects Developing Brains - Dr. Jennifer Brown
How Pornography Affects Developing Brains - Dr. Jennifer Brownucap4utah
 
ADOLESCENT HEALTH RISK BEHAVIOR
ADOLESCENT HEALTH RISK BEHAVIORADOLESCENT HEALTH RISK BEHAVIOR
ADOLESCENT HEALTH RISK BEHAVIORmariano2008
 
Sex Addiction - The Secret Obsession
Sex Addiction - The Secret ObsessionSex Addiction - The Secret Obsession
Sex Addiction - The Secret ObsessionSACAP
 
Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Tricode (part of Dept)
 
Adolescent education & awareness
Adolescent education & awarenessAdolescent education & awareness
Adolescent education & awarenessAvinash Bhondwe
 
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...Andrea Kuszewski
 
Adolescent problems and class room managment Management Concepts - Manu Melw...
Adolescent problems and class room managment  Management Concepts - Manu Melw...Adolescent problems and class room managment  Management Concepts - Manu Melw...
Adolescent problems and class room managment Management Concepts - Manu Melw...manumelwinjoy
 
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex LifeReality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Lifeleadingedgehealth
 
An "Internet Pornography Addict" Walks Into A Clinic...
An "Internet Pornography Addict" Walks Into A Clinic...An "Internet Pornography Addict" Walks Into A Clinic...
An "Internet Pornography Addict" Walks Into A Clinic...Robert Beshara
 
Sex Addiction
Sex AddictionSex Addiction
Sex Addictionjaymundy6
 
Cybersex Addiction
Cybersex AddictionCybersex Addiction
Cybersex Addictioncybersexadd1
 
Sex addiction
Sex addictionSex addiction
Sex addictionpatico27
 
Adolescent Body Image
Adolescent Body ImageAdolescent Body Image
Adolescent Body ImageMcCarty
 
Adolescent behavioral problem
Adolescent behavioral problemAdolescent behavioral problem
Adolescent behavioral problemImran Subho
 
Management of adolescent pcosfinal
Management of adolescent pcosfinalManagement of adolescent pcosfinal
Management of adolescent pcosfinalNARENDRA MALHOTRA
 

Destaque (20)

How Pornography Affects Developing Brains - Dr. Jennifer Brown
How Pornography Affects Developing Brains - Dr. Jennifer BrownHow Pornography Affects Developing Brains - Dr. Jennifer Brown
How Pornography Affects Developing Brains - Dr. Jennifer Brown
 
ADOLESCENT HEALTH RISK BEHAVIOR
ADOLESCENT HEALTH RISK BEHAVIORADOLESCENT HEALTH RISK BEHAVIOR
ADOLESCENT HEALTH RISK BEHAVIOR
 
Sex Addiction - The Secret Obsession
Sex Addiction - The Secret ObsessionSex Addiction - The Secret Obsession
Sex Addiction - The Secret Obsession
 
Porn, the leading influencer of Technology
Porn, the leading influencer of Technology Porn, the leading influencer of Technology
Porn, the leading influencer of Technology
 
Adolescent education & awareness
Adolescent education & awarenessAdolescent education & awareness
Adolescent education & awareness
 
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...
Looking For Love in All the Wrong Places: The Science and Psychology of Porn ...
 
Adolescent problems and class room managment Management Concepts - Manu Melw...
Adolescent problems and class room managment  Management Concepts - Manu Melw...Adolescent problems and class room managment  Management Concepts - Manu Melw...
Adolescent problems and class room managment Management Concepts - Manu Melw...
 
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex LifeReality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
Reality Vs Fantasy: 10 Ways Porn Can Ruin Your Sex Life
 
An "Internet Pornography Addict" Walks Into A Clinic...
An "Internet Pornography Addict" Walks Into A Clinic...An "Internet Pornography Addict" Walks Into A Clinic...
An "Internet Pornography Addict" Walks Into A Clinic...
 
Sex Addiction
Sex AddictionSex Addiction
Sex Addiction
 
Nutrition and Adolescence
Nutrition and AdolescenceNutrition and Adolescence
Nutrition and Adolescence
 
Cybersex Addiction
Cybersex AddictionCybersex Addiction
Cybersex Addiction
 
Sex addiction
Sex addictionSex addiction
Sex addiction
 
Think Big, Dream Big
Think  Big, Dream BigThink  Big, Dream Big
Think Big, Dream Big
 
Adolescent Body Image
Adolescent Body ImageAdolescent Body Image
Adolescent Body Image
 
Adolescent behavioral problem
Adolescent behavioral problemAdolescent behavioral problem
Adolescent behavioral problem
 
Management of adolescent pcosfinal
Management of adolescent pcosfinalManagement of adolescent pcosfinal
Management of adolescent pcosfinal
 
Dreams and Goals
Dreams and GoalsDreams and Goals
Dreams and Goals
 
"I Have A Dream"
"I Have A Dream""I Have A Dream"
"I Have A Dream"
 
5 Stages of Pornography Addiction
5 Stages of Pornography Addiction5 Stages of Pornography Addiction
5 Stages of Pornography Addiction
 

Mais de Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Mais de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Thoughts on Revenge Porn

  • 1. Th
  • 2.
  • 3. Re–venge porn, n. - A form of cyber- rape thatinvolves the distribution of sexually explicit photos and/or videos of an individual (either real or photoshopped) on the Internet without permission. Revenge porn, sometimes called involuntary porn, is usually posted by a scorned ex-lover or friend, in order to seek revenge after a relationship has gone sour. EndRevengePorn.com
  • 5. But what these people don’t realize is a victim of Revenge Porn, I am victimized every time someone types my name into the computer. The crime scene is right before everyone’s eyes, played out again and again, and, ironically, I am treated as if I am the one who has committed the crime. I am victimized very time someone tells me that it’s my fault because I consented to the taking of the photos. Rebekah Wells WomenAgainstRevengePorn.com
  • 6. Hollie Toups ArmyofShe.com I felt my life was over. I feared I would never be able to pursue my career in Criminal Justice, and more importantly I was terrified. Someone was single-handedly destroying my life with the click of a button from behind a computer screen. Together we can make a difference, because we may be bent, but we will never be broken. . . .We’ve all been living in the shadows. Where I was ashamed before, now I can feel proud that we can help people. NOTE: ArmyofShe.com; Dozens of Women Join ‘Revenge Porn’ Class Action Lawsuit Against Texxxan.com. ABC Nightline; GoDaddy.com Among Defendants in Revenge Porn Lawsuit; Houston Chronicle EndRHollie Toups ArmyofShe.com evengePorn.com
  • 7. Stand up for what you feel is right. It’s not OK that people are doing this and exploiting you, just because you trusted somebody and because you shared intimate photographs in an intimate relationship. That’s not the problem here. The problem is that somebody is using this against you and trying to drive you to suicide. They’re ruining our lives. That’s not OK. I’m coming out because I’m tired of hiding . . . I hope that I’ll set an example and show this is how you overcome this: by coming forward. You’re not exposing yourself—you’re already exposed on the internet. Instead, you’re exposing what is happening to you. Everybody’s going to see me naked, and everybody’s going to see me do things I never wanted anybody to see except the person I was with. But if it’s in the name of the cause and to change the laws about this, then I’m happy to do it. We’re all naked underneath our clothes. Holly Jacobs EndRevengePorn.com NOTES: A Victim Speaks: Standing Up to a Revenge Porn Tormentor, BetaBeat; Revenge porn’ victim fights back: ‘I was terrified, Today Show
  • 9. I really don’t give a fuck. Why should I care? It’s not my life. It’s literally just a business. It’s stupid not to monetize it. People threaten me with lawsuits every day, which is funny, because it fuels the site. –Hunter Moore, Founder of Is Anyone Up These are not victims. These are people that have decided to publicly transmit their own information. I call it entertainment. We don’t want anyone shamed or hurt we just want the pictures there for entertainment purposes and business. Craig Brittain, Founder of Is Anybody Down NOTES: The Battle Over Revenge Porn: Can Hunter Moore the Webs Vilest Entrepreneur Be Stopped, BetaBeat Hunter Moore, Founder of Anyone Up, Says New Website Will be Scariest on the Internet, Huffington Post Is Anybody Down?, Wikipedia
  • 11. This is a form of cyber human trafficking, or as it has been termed “cyber rape,” because they take photos of women for the purpose of dehumanizing them, for the purpose of degrading them, and they go even further. John S. Morgan John S. Morgan Law Firm Lead Counsel in Toups v. GoDaddy.com (Tex. Dist. Ct.) Note: Dozens of Women Join ‘Revenge Porn’ Class Action Lawsuit Against Texxxan.com. ABC Nightline
  • 12. I want to hurt isanybodydown.com. I want to hurt them bad. Who’s with me? Marc Randazza
Randazza Legal Group Lead Attorney in UGotPosted (S.D.Cal.) Note: Let’s Fuck Up David Blade Attorney at Law and IsAnybodyDown.com. Who’s With me?, Legal Satyricon
  • 13. To future employers who might be squeamish about what may or may not be online about these ladies, remember that the strongest steel is forged in the hottest fire. These women are just discovering their potential. General Patton once said the true measurement of success is not how high one climbs, but how high one bounces after hitting the bottom. By this measurement, Ms. Toups and Wells are practically Rockefellers. As to the bigger debate, existing case law has limited the scope of website immunity under the Communications Decency Act where the site operator was potentially liable if it participated or facilitated illegal conduct. I believe the revenge porn sites should be held liable, but this would not extend to registrars or hosts such as GoDaddy absent some scienter on their part.Bennet Kelley Internet Law Center Victims Attorney
  • 15. People who post or text pictures that are meant to be private as a way to seek revenge are reprehensible. Right now, there is no tool for law enforcement to protect the victims. Too many have had their lives upended because of an action of another that they trusted. This is a common sense bill that clamps down on those who exploit intimacy and trust for revenge or personal gain.California State Senator Anthony Cannella Author of California Revenge Porn Law Senator Cannella Strikes Back at Cyber Revenge
  • 17. What does it say about society that websites where angry men shame their ex-lovers are thriving? The purpose of revenge porn isn’t to allow regular guys the opportunity to see some naked girls-next-door; it’s explicitly purposed to shame, humiliate and destroy the lives and reputations of young women. Note: Revenge Porn Degrades Women,The Guardian
  • 18. Blanket immunity for revenge porn operators is incompatible with congressional purpose. Section 230 celebrates the Internet as a “forum for a true diversity of political discourse, unique opportunities for political development, and myriad avenues for intellectual activity” for the “benefit of all Americans.” But revenge porn sites and other cyber cesspools threaten the universality of the Internet’s benefits by encouraging cyber harassment that silences women and minorities, narrows the range of political discourse, and stifles intellectual activity. Congress ought to consider passing laws that criminalize the operation of sites designed to facilitate the posting of nude photographs without subjects’ consent, along the lines of state invasion of privacy laws. . . The Senate Judiciary Committee recently approved a bill that makes it a crime to make an online app whose primary use is to facilitate cyber stalking. The next important step is to criminalize sites doing the same. Danielle Citron, University of Maryland School of Law Note: Revenge Porn and the Uphill Battle to Sue Site Operators, Concurring Opinions; Revenge Porn Site Operators and Federal Criminal Liability; Concurring Opinions
  • 19. Every time a distasteful content website flares up in the media, the pro-regulation crowd agitates for amendments to 47 USC 230. . . . First, we are already seeing troubling efforts to exploit the existing exceptions to Section 230, such as trademark lawsuits against consumer review websites and plaintiffs abusing copyright to create a “right to forget.” Adding another exception will just create more possibilities for mischief. Still, for individuals who would prefer not to be a revenge porn victim or otherwise have intimate depictions of themselves publicly disclosed, the advice will be simple: don’t take nude photos or videos. Eric Goldman, Santa Clara High Tech Law Institute Note: What Should We Do About Revenge Porn Sites LIke Texxxan.com, Forbes
  • 20. The first thing that strikes me about Prof. Goldman’s discussion of revenge porn (and this is true of many discussions of the issue) is the failure to note its gendered dimensions. . . . The second interesting omission in Prof. Goldman’s article is any mention of the harm revenge porn causes. The victims of these acts have lost jobs, been forced to change schools, change their names, and have been subjected to real-life stalking and harassment because of the actions of those who posted and distributed their images. Some victims have committed suicide. The sexually explicit images of them have been sent to their parents, their children, their classmates, their employers; they have been used to blackmail, stalk, and threaten their subjects. This is not merely “distasteful,” and it most certainly is not like having a colleague look up the price of your home. Given these omissions, perhaps it is not surprising that Prof. Goldman concludes with the recommendation that he does. The wording is telling: “for individuals who would prefer not to be a revenge porn victim…” According to Prof. Goldman, one can simply “prefer” not to do be a victim of forced sexual exposure. But I wonder if Prof. Goldman, or anyone else offering similar advice, has considered the fact that women and men are not equally at risk for either becoming the target of revenge porn or of suffering the negative consequences of it. Mary Anne Franks University of Miami School of Law Note: Why We Need a Federal Criminal Law Response to Revenge Porn, Concurring Opinions; Why We Need a Federal Criminal Law Response to Revenge Porn, Concurring Opinions Concurring Opinions
  • 22. Bennet Kelley • Founder of the Internet Law Center in Santa Monica, California • Past Co-Chair California Bar Cyberspace Committee • Part of US Delegation of Internet Experts to meet with Leading Chinese “Netizens” • Part of US Delegation for US-China Legal Exchange on E-Commerce • Host of Cyber Law and Business Report on WebmasterRadio.fm • Publisher of award-winning Cyber Report r
  • 23. InternetLawCenter.net CyberLawRadio.com @InternetLawCent @CyberLawRadio Ilccyberreport.com Cyberlawradio.wordpress.com 100 Wilshire Blvd, Suite 940, Santa Monica, CA 90401 (310) 452-0401/ bkelley@internetlawcenter.net