SlideShare a Scribd company logo
1 of 15
Download to read offline
Ethical	
  and	
  Privacy	
  
Challenges	
  in	
  Internet	
  
Policy	
  
Q&A	
  with	
  Chris	
  Kelly	
  
Some	
  
Thoughts	
  on	
  
the	
  Internet	
  
The	
  Internet	
  is	
  merely	
  a	
  
reflection	
  of	
  who	
  we	
  are	
  as	
  a	
  
society;	
  and	
  thus	
  is	
  a	
  tool	
  for	
  
good	
  and	
  for	
  bad	
  and	
  a	
  source	
  
of	
  great	
  volumes	
  of	
  
information	
  and	
  disinformation	
  
alike.	
  
	
  
-­‐-­‐Abraham	
  Lincoln	
  
Privacy	
  
Ethics	
  1:	
  
Ensure	
  Faith	
  in	
  
Business	
  
–  "One	
  of	
  the	
  most	
  important	
  
lessons	
  we	
  can	
  learn	
  from	
  an	
  
examination	
  of	
  economic	
  life	
  
is	
  that	
  a	
  nation’s	
  well	
  being	
  as	
  
well	
  as	
  its	
  ability	
  to	
  compete,	
  
is	
  conditioned	
  by	
  a	
  single,	
  
pervasive	
  cultural	
  
characteristic:	
  the	
  level	
  of	
  
trust	
  inherent	
  in	
  the	
  society."	
  	
  
Ethics	
  2	
  
Protect	
  Others	
  
From	
  Harm	
  
Ethics	
  3	
  
Law	
  as	
  a	
  
Normative	
  
Statement	
  of	
  
Values	
  
About	
  
CHRIS	
  KELLY	
  
Chris	
  Kelly	
  is	
  the	
  founder	
  of	
  
Kelly	
  Investments	
  and	
  part	
  
owner	
  of	
  the	
  Sacramento	
  
Kings.	
  	
  He	
  served	
  in	
  the	
  Clinton	
  
Administration	
  before	
  going	
  on	
  
to	
  become	
  Facebook’s	
  Chief	
  
Privacy	
  Officer	
  and	
  Director	
  of	
  
Global	
  Policy.	
  	
  He	
  was	
  a	
  
candidate	
  for	
  California	
  
Attorney	
  General	
  in	
  2010	
  and	
  
led	
  the	
  fight	
  for	
  California’s	
  
Proposition	
  35	
  fighting	
  sex	
  
trafficking.	
  
BENNET	
  KELLEY	
  
Bennet	
  Kelley	
  is	
  the	
  founder	
  of	
  
the	
  Internet	
  Law	
  Center	
  in	
  
Santa	
  Monica	
  and	
  host	
  of	
  
Cyber	
  Law	
  and	
  Business	
  
Report.	
  	
  
Ethical	
  and	
  Privacy	
  
Challenges	
  in	
  Internet	
  
Policy	
  
Appendix	
  
Bennet	
  Kelley	
  	
  
“Honest”	
  Abe	
  
2.0	
  
–  ABA	
  Model	
  Rule	
  4.1(a)	
  
"In	
  the	
  course	
  of	
  representing	
  a	
  client	
  a	
  lawyer	
  shall	
  not	
  knowingly:	
  (a)	
  
make	
  a	
  false	
  statement	
  of	
  material	
  fact	
  or	
  law	
  to	
  a	
  third	
  person.	
  .	
  .”	
  	
  
–  ABA	
  Model	
  Rule	
  8.4(c)	
  	
  
Prohibits	
  “conduct	
  involving	
  dishonesty,	
  fraud,	
  deceit	
  or	
  
misrepresentation.”	
  	
  	
  
–  California	
  Business	
  &	
  Professions	
  Code	
  Section	
  6106	
  	
  
	
  “The	
  commission	
  of	
  any	
  act	
  involving	
  moral	
  turpitude,	
  dishonesty	
  or	
  
corruption,	
  whether	
  the	
  act	
  is	
  committed	
  in	
  the	
  course	
  of	
  his	
  relations	
  
as	
  an	
  attorney	
  or	
  otherwise,	
  and	
  whether	
  the	
  act	
  is	
  a	
  felony	
  or	
  
misdemeanor	
  or	
  not,	
  constitutes	
  a	
  cause	
  for	
  disbarment	
  or	
  
suspension.”	
  
–  Vega	
  v.	
  Jones,	
  Day,	
  Reavis	
  &	
  Pogue	
  
	
  121	
  Cal.App.4th	
  282,	
  291-­‐294	
  (2004).	
  
A	
  lawyer	
  may	
  not	
  knowingly	
  make	
  false	
  statements	
  of	
  material	
  fact	
  to	
  
a	
  third	
  party.	
  	
  
SDCBA	
  Legal	
  
Ethics	
  Opinion	
  
2011-­‐2	
  	
  
(Adopted	
  by	
  the	
  San	
  Diego	
  County	
  Bar	
  
Legal	
  Ethics	
  Committee	
  May	
  24,	
  2011.)	
  	
  
FACTUAL	
  SCENARIO	
  
–  Attorney	
  is	
  representing	
  Client,	
  a	
  plaintiff	
  former	
  employee	
  in	
  a	
  wrongful	
  discharge	
  
action.	
  While	
  the	
  matter	
  is	
  in	
  its	
  early	
  stages,	
  Attorney	
  has	
  by	
  now	
  received	
  former	
  
employer’s	
  answer	
  to	
  the	
  complaint	
  and	
  therefore	
  knows	
  that	
  the	
  former	
  employer	
  is	
  
represented	
  by	
  counsel	
  and	
  who	
  that	
  counsel	
  is.	
  	
  Attorney	
  obtained	
  from	
  Client	
  a	
  list	
  of	
  
all	
  of	
  Client’s	
  former	
  employer’s	
  employees.	
  	
  Attorney	
  sends	
  out	
  a	
  “friending”1	
  request	
  
to	
  two	
  high-­‐ranking	
  company	
  employees	
  whom	
  Client	
  has	
  identified	
  as	
  being	
  
dissatisfied	
  with	
  the	
  employer	
  and	
  therefore	
  likely	
  to	
  make	
  disparaging	
  comments	
  
about	
  the	
  employer	
  on	
  their	
  social	
  media	
  page.	
  	
  The	
  friend	
  request	
  gives	
  only	
  Attorney’s	
  
name.	
  	
  Attorney	
  is	
  concerned	
  that	
  those	
  employees,	
  out	
  of	
  concern	
  for	
  their	
  jobs,	
  may	
  
not	
  be	
  as	
  forthcoming	
  with	
  their	
  opinions	
  in	
  depositions	
  and	
  intends	
  to	
  use	
  any	
  relevant	
  
information	
  he	
  obtains	
  from	
  these	
  social	
  media	
  sites	
  to	
  advance	
  the	
  interests	
  of	
  Client	
  
in	
  the	
  litigation.	
  	
  
QUESTION	
  PRESENTED	
  
–  Has	
  Attorney	
  violated	
  his	
  ethical	
  obligations	
  under	
  the	
  California	
  Rules	
  of	
  Professional	
  
Conduct,	
  the	
  State	
  Bar	
  Act,	
  or	
  case	
  law	
  addressing	
  the	
  ethical	
  obligations	
  of	
  attorneys?	
  
SDCBA	
  Legal	
  
Ethics	
  Opinion	
  
2011-­‐2	
  	
  
(Adopted	
  by	
  the	
  San	
  Diego	
  County	
  Bar	
  
Legal	
  Ethics	
  Committee	
  May	
  24,	
  2011.)	
  	
  
–  Rule	
  2-­‐100(A)	
  
“While	
  representing	
  a	
  client,	
  a	
  member	
  shall	
  not	
  communicate	
  directly	
  or	
  indirectly	
  
about	
  the	
  subject	
  of	
  the	
  representation	
  with	
  a	
  party	
  the	
  member	
  knows	
  to	
  be	
  
represented	
  by	
  another	
  lawyer	
  in	
  the	
  matter,	
  unless	
  the	
  member	
  has	
  the	
  consent	
  of	
  the	
  
other	
  lawyer.”	
  	
  
–  Contact	
  Violates	
  Rule	
  2-­‐100(A)	
  
“But	
  to	
  obtain	
  access	
  to	
  restricted	
  information	
  on	
  a	
  Facebook	
  page,	
  the	
  attorney	
  must	
  
make	
  a	
  request	
  to	
  a	
  represented	
  party	
  outside	
  of	
  the	
  actual	
  or	
  virtual	
  presence	
  of	
  
defense	
  counsel.	
  And	
  for	
  purposes	
  of	
  Rule	
  2-­‐100,	
  that	
  motivated	
  communication	
  with	
  
the	
  represented	
  party	
  makes	
  all	
  the	
  difference.”	
  
–  Contact	
  Also	
  Constitutes	
  Deception	
  
“But	
  is	
  it	
  impermissible	
  deception	
  to	
  seek	
  to	
  friend	
  a	
  witness	
  without	
  disclosing	
  the	
  
purpose	
  of	
  the	
  friend	
  request,	
  even	
  if	
  the	
  witness	
  is	
  not	
  a	
  represented	
  party	
  and	
  thus,	
  as	
  
set	
  forth	
  above,	
  subject	
  to	
  the	
  prohibition	
  on	
  ex	
  parte	
  contact?	
  We	
  believe	
  that	
  it	
  is.”	
  
NSA	
  &	
  Privacy	
  
While	
  the	
  scope	
  of	
  and/or	
  legality	
  of	
  methods	
  used	
  as	
  part	
  of	
  the	
  
NSA	
  surveillance	
  programs	
  are	
  still	
  being	
  determined	
  and	
  we	
  offer	
  
no	
  opinion	
  on	
  this	
  point.	
  	
  	
  
	
  
In	
  general,	
  attorneys	
  must	
  be	
  mindful	
  of	
  the	
  following	
  with	
  respect	
  
to	
  advising	
  potential	
  violations	
  of	
  the	
  law:	
  
–  Rule	
  3-­‐210	
  
A	
  member	
  shall	
  not	
  advise	
  the	
  violation	
  of	
  any	
  law,	
  rule,	
  or	
  ruling	
  
of	
  a	
  tribunal	
  unless	
  the	
  member	
  believes	
  in	
  good	
  faith	
  that	
  such	
  
law,	
  rule,	
  or	
  ruling	
  is	
  invalid.	
  A	
  member	
  may	
  take	
  appropriate	
  steps	
  
in	
  good	
  faith	
  to	
  test	
  the	
  validity	
  of	
  any	
  law,	
  rule,	
  or	
  ruling	
  of	
  a	
  
tribunal.	
  
–  Penal	
  Code	
  §31	
  	
  
Persons	
  who	
  "aid	
  and	
  abet	
  .	
  .	
  .	
  [or]	
  have	
  advised	
  or	
  encouraged"	
  a	
  
crime	
  are	
  punishable	
  as	
  principals.	
  
HUMAN	
  
TRAFFICKING	
  
STATISTICS	
  
–  Human	
  trafficking	
  exists	
  all	
  over	
  the	
  United	
  States,	
  but	
  California	
  is	
  California	
  is	
  a	
  
hot	
  spot	
  for	
  domestic	
  and	
  international	
  human	
  trafficking	
  because	
  of	
  its	
  large	
  
population,	
  international	
  borders,	
  large	
  economy,	
  extensive	
  ports,	
  and	
  
metropolitan	
  regions.	
  
–  The	
  average	
  entry	
  age	
  of	
  American	
  minors	
  into	
  the	
  sex	
  trade	
  is	
  12-­‐14	
  years	
  old.	
  	
  
–  Many	
  victims	
  are	
  runaway	
  girls	
  who	
  have	
  already	
  suffered	
  sexual	
  abuse	
  as	
  children.	
  
–  California	
  harbors	
  3	
  of	
  FBI’s	
  13	
  highest	
  child	
  sex	
  trafficking	
  areas	
  in	
  the	
  nation:	
  Los	
  
Angeles,	
  San	
  Francisco,	
  and	
  San	
  Diego.	
  	
  
–  Foreign	
  nationals	
  are	
  also	
  brought	
  into	
  the	
  U.S.	
  as	
  slaves	
  for	
  labor	
  or	
  commercial	
  
sex	
  through	
  force	
  or	
  fraud.	
  	
  
–  The	
  prevalence	
  and	
  anonymity	
  of	
  the	
  internet	
  has	
  fueled	
  the	
  rapid	
  growth	
  of	
  sex	
  
trafficking,	
  making	
  the	
  trade	
  of	
  women	
  and	
  children	
  easier	
  than	
  ever	
  before.	
  
–  REFERENCES	
  
The	
  National	
  Report	
  on	
  Domestic	
  Minor	
  Sex	
  Trafficking:	
  America’s	
  Prostituted	
  Children,	
  Shared	
  Hope	
  International,	
  May	
  2009.	
  
	
  
The	
  Federal	
  Bureau	
  of	
  Investigation’s	
  Efforts	
  to	
  Combat	
  Crimes	
  Against	
  Children,	
  Audit	
  Report	
  09-­‐08,	
  January	
  2009.	
  
	
  
Trafficking	
  in	
  Persons	
  Report,	
  U.S.	
  Department	
  of	
  State,	
  June	
  2011.	
  
	
  
	
  
PROP	
  35	
  
(CASE	
  Act)	
  
Summary	
  
CALIFORNIANS	
  AGAINST	
  SEXUAL	
  EXPLOITATION	
  ACT	
  ("CASE	
  ACT”)	
  
–  Increase	
  prison	
  terms	
  for	
  human	
  traffickers	
  
–  Increase	
  fines	
  for	
  human	
  traffickers,	
  up	
  to	
  $1.5M	
  to	
  fund	
  victim	
  services	
  
–  Remove	
  the	
  need	
  to	
  prove	
  force	
  to	
  prosecute	
  sex	
  trafficking	
  of	
  a	
  minor	
  
–  Mandate	
  human	
  trafficking	
  training	
  for	
  law	
  enforcement	
  
–  Make	
  sex	
  traffickers	
  register	
  as	
  sex	
  offenders	
  
–  Require	
  that	
  all	
  sex	
  offenders	
  to	
  disclose	
  internet	
  accounts	
  
–  Prohibits	
  use	
  of	
  sexual	
  history	
  to	
  impeach	
  or	
  prove	
  criminal	
  liability	
  of	
  trafficked	
  
victims	
  
Doe	
  v.	
  Harris	
  
Case	
  No.	
  3:12-­‐cv-­‐05713-­‐THE	
  
(N.D.	
  Cal.)	
  
	
  
Case	
  Nos.	
  13-­‐15263,	
  13-­‐15267	
  
(9th	
  Cir.)	
  
–  Challenge	
  to	
  requirement	
  that	
  sex	
  offenders	
  provide	
  their	
  ISPs	
  and	
  
“internet	
  identifier”	
  which	
  is	
  defined	
  as	
  an	
  “electronic	
  mail	
  
address,	
  user	
  name,	
  screen	
  name,	
  or	
  similar	
  identifier	
  used	
  for	
  the	
  
purpose	
  of	
  Internet	
  forum	
  discussions,	
  Internet	
  chat	
  room	
  
discussions,	
  instant	
  messaging,	
  social	
  networking,	
  or	
  similar	
  
Internet	
  communication.”	
  	
  
–  Jan	
  13,	
  2013	
  -­‐	
  Judge	
  Henderson	
  granted	
  a	
  preliminary	
  injunction:	
  
“On	
  the	
  current	
  record,	
  the	
  Court	
  concludes	
  that	
  Plaintiffs	
  are	
  
likely	
  to	
  establish	
  that	
  the	
  challenged	
  provisions,	
  when	
  combined	
  
with	
  the	
  lack	
  of	
  protections	
  on	
  the	
  information’s	
  disclosure	
  and	
  
the	
  serious	
  penalty	
  registrants	
  face	
  if	
  they	
  fail	
  to	
  comply	
  with	
  the	
  
reporting	
  requirements,	
  create	
  too	
  great	
  a	
  chilling	
  effect	
  to	
  pass	
  
constitutional	
  muster.	
  While	
  the	
  government	
  may	
  be	
  able	
  to	
  
demonstrate	
  narrow	
  tailoring	
  in	
  subsequent	
  proceedings,	
  it	
  has	
  
not	
  done	
  so	
  here.	
  Accordingly,	
  the	
  Court	
  concludes	
  that	
  Plaintiffs	
  
are	
  likely	
  to	
  succeed	
  on	
  their	
  First	
  Amendment	
  free	
  speech	
  claim.”	
  
–  	
  Sept	
  10,	
  2013	
  –	
  Argued	
  before	
  9th	
  Circuit.	
  
	
  

More Related Content

What's hot

Pro Bono All-Stars Infographic
Pro Bono All-Stars Infographic Pro Bono All-Stars Infographic
Pro Bono All-Stars Infographic LLMInfo
 
Myths And Misconceptions About Workplace Bullying Josh Bornstein
Myths And Misconceptions About Workplace Bullying Josh BornsteinMyths And Misconceptions About Workplace Bullying Josh Bornstein
Myths And Misconceptions About Workplace Bullying Josh BornsteinMaurice Blackburn Lawyers
 
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesKanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesraspyyouth3234
 
081715_health_law_regional_cle_brochure.authcheckdam
081715_health_law_regional_cle_brochure.authcheckdam081715_health_law_regional_cle_brochure.authcheckdam
081715_health_law_regional_cle_brochure.authcheckdamWendy Weiss
 
forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceChaitanya Limbachiya
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from othersAdam Quirk
 
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Business Development Institute
 
Holly BEnson for Attorney General of FLorida/REPUBLICAN
Holly BEnson for Attorney General of FLorida/REPUBLICANHolly BEnson for Attorney General of FLorida/REPUBLICAN
Holly BEnson for Attorney General of FLorida/REPUBLICANjenkan04
 
Former employee fires back after being sued by Community Health Alliance
Former employee fires back after being sued by Community Health AllianceFormer employee fires back after being sued by Community Health Alliance
Former employee fires back after being sued by Community Health AllianceThis Is Reno
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Community Health Alliance in Reno sues former employee (original complaint)
Community Health Alliance in Reno sues former employee (original complaint)Community Health Alliance in Reno sues former employee (original complaint)
Community Health Alliance in Reno sues former employee (original complaint)This Is Reno
 
Business crime
Business crimeBusiness crime
Business crimeArdha
 
National Origin Employment Discrimination in Florida
National Origin Employment Discrimination in FloridaNational Origin Employment Discrimination in Florida
National Origin Employment Discrimination in FloridaRichard Celler
 

What's hot (20)

Pro Bono All-Stars Infographic
Pro Bono All-Stars Infographic Pro Bono All-Stars Infographic
Pro Bono All-Stars Infographic
 
Victimsoflaw net attynews
Victimsoflaw net attynewsVictimsoflaw net attynews
Victimsoflaw net attynews
 
Myths And Misconceptions About Workplace Bullying Josh Bornstein
Myths And Misconceptions About Workplace Bullying Josh BornsteinMyths And Misconceptions About Workplace Bullying Josh Bornstein
Myths And Misconceptions About Workplace Bullying Josh Bornstein
 
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesKanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
 
081715_health_law_regional_cle_brochure.authcheckdam
081715_health_law_regional_cle_brochure.authcheckdam081715_health_law_regional_cle_brochure.authcheckdam
081715_health_law_regional_cle_brochure.authcheckdam
 
Types of deviances
Types of deviancesTypes of deviances
Types of deviances
 
forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice deviance
 
What makes white collar crimes different from others
What makes white collar crimes different from othersWhat makes white collar crimes different from others
What makes white collar crimes different from others
 
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
 
Holly BEnson for Attorney General of FLorida/REPUBLICAN
Holly BEnson for Attorney General of FLorida/REPUBLICANHolly BEnson for Attorney General of FLorida/REPUBLICAN
Holly BEnson for Attorney General of FLorida/REPUBLICAN
 
Corruption.docx
Corruption.docxCorruption.docx
Corruption.docx
 
Former employee fires back after being sued by Community Health Alliance
Former employee fires back after being sued by Community Health AllianceFormer employee fires back after being sued by Community Health Alliance
Former employee fires back after being sued by Community Health Alliance
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Judicial Misconduct Complaint against Clay County Judge Roberts
Judicial Misconduct Complaint against Clay County Judge RobertsJudicial Misconduct Complaint against Clay County Judge Roberts
Judicial Misconduct Complaint against Clay County Judge Roberts
 
Manuscript
ManuscriptManuscript
Manuscript
 
Community Health Alliance in Reno sues former employee (original complaint)
Community Health Alliance in Reno sues former employee (original complaint)Community Health Alliance in Reno sues former employee (original complaint)
Community Health Alliance in Reno sues former employee (original complaint)
 
cops-w0791-pub
cops-w0791-pubcops-w0791-pub
cops-w0791-pub
 
Business crime
Business crimeBusiness crime
Business crime
 
White collar crimes
White collar crimesWhite collar crimes
White collar crimes
 
National Origin Employment Discrimination in Florida
National Origin Employment Discrimination in FloridaNational Origin Employment Discrimination in Florida
National Origin Employment Discrimination in Florida
 

Viewers also liked

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...RSD Relating Systems Thinking and Design
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 

Viewers also liked (16)

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Form, Meaning and Design
Form, Meaning and DesignForm, Meaning and Design
Form, Meaning and Design
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 

Similar to Ethical and Privacy Challenges in Internet Policy

Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017Downey Law Group LLC
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethicsssalkin
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition- Mark - Fullbright
 
Ethical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media SandboxEthical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media SandboxInternet Law Center
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Banishment or facilitated reentry a human rights perspective
Banishment or facilitated reentry a human rights perspectiveBanishment or facilitated reentry a human rights perspective
Banishment or facilitated reentry a human rights perspectivesoissues
 
Background checks employer beware!
Background checks employer beware!Background checks employer beware!
Background checks employer beware!Janette Levey Frisch
 
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docx
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docxWeek 8 Discussion Pursuing Criminal Syndicates  Please respond.docx
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docxphilipnelson29183
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
Children in conflict with the law-1
Children in conflict with the law-1Children in conflict with the law-1
Children in conflict with the law-1sally ngugi
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Redline Version Of Slides 20110706
Redline Version Of Slides 20110706Redline Version Of Slides 20110706
Redline Version Of Slides 20110706oasthook
 
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01 habitualfatherl91
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group LLC
 
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014Jason Coombs
 

Similar to Ethical and Privacy Challenges in Internet Policy (20)

Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethics
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Ethical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media SandboxEthical Issues of Playing in the Social Media Sandbox
Ethical Issues of Playing in the Social Media Sandbox
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Banishment or facilitated reentry a human rights perspective
Banishment or facilitated reentry a human rights perspectiveBanishment or facilitated reentry a human rights perspective
Banishment or facilitated reentry a human rights perspective
 
Background checks employer beware!
Background checks employer beware!Background checks employer beware!
Background checks employer beware!
 
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for AllHawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
Hawaii - Mayor Mitch Roth - Freedom, Equality, and Justice for All
 
Externship.pptx
Externship.pptxExternship.pptx
Externship.pptx
 
Legal Ethics and Social Media
Legal Ethics and Social MediaLegal Ethics and Social Media
Legal Ethics and Social Media
 
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docx
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docxWeek 8 Discussion Pursuing Criminal Syndicates  Please respond.docx
Week 8 Discussion Pursuing Criminal Syndicates  Please respond.docx
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Why choose ESS?
Why choose ESS?Why choose ESS?
Why choose ESS?
 
Children in conflict with the law-1
Children in conflict with the law-1Children in conflict with the law-1
Children in conflict with the law-1
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Security id 2014
Security id 2014Security id 2014
Security id 2014
 
Redline Version Of Slides 20110706
Redline Version Of Slides 20110706Redline Version Of Slides 20110706
Redline Version Of Slides 20110706
 
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01
Risk Assessment Of Social Networking Utilize V3.01
 
Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017Downey Law Group - Legal Ethics and Innovations - May 2017
Downey Law Group - Legal Ethics and Innovations - May 2017
 
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014
JOBS Act Rulemaking Comments on SEC File Number S7-11-13 Dated August 13, 2014
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Recently uploaded

如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 

Recently uploaded (20)

如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 

Ethical and Privacy Challenges in Internet Policy

  • 1. Ethical  and  Privacy   Challenges  in  Internet   Policy   Q&A  with  Chris  Kelly  
  • 2. Some   Thoughts  on   the  Internet   The  Internet  is  merely  a   reflection  of  who  we  are  as  a   society;  and  thus  is  a  tool  for   good  and  for  bad  and  a  source   of  great  volumes  of   information  and  disinformation   alike.     -­‐-­‐Abraham  Lincoln  
  • 4. Ethics  1:   Ensure  Faith  in   Business   –  "One  of  the  most  important   lessons  we  can  learn  from  an   examination  of  economic  life   is  that  a  nation’s  well  being  as   well  as  its  ability  to  compete,   is  conditioned  by  a  single,   pervasive  cultural   characteristic:  the  level  of   trust  inherent  in  the  society."    
  • 5. Ethics  2   Protect  Others   From  Harm  
  • 6. Ethics  3   Law  as  a   Normative   Statement  of   Values  
  • 7. About   CHRIS  KELLY   Chris  Kelly  is  the  founder  of   Kelly  Investments  and  part   owner  of  the  Sacramento   Kings.    He  served  in  the  Clinton   Administration  before  going  on   to  become  Facebook’s  Chief   Privacy  Officer  and  Director  of   Global  Policy.    He  was  a   candidate  for  California   Attorney  General  in  2010  and   led  the  fight  for  California’s   Proposition  35  fighting  sex   trafficking.   BENNET  KELLEY   Bennet  Kelley  is  the  founder  of   the  Internet  Law  Center  in   Santa  Monica  and  host  of   Cyber  Law  and  Business   Report.    
  • 8. Ethical  and  Privacy   Challenges  in  Internet   Policy   Appendix   Bennet  Kelley    
  • 9. “Honest”  Abe   2.0   –  ABA  Model  Rule  4.1(a)   "In  the  course  of  representing  a  client  a  lawyer  shall  not  knowingly:  (a)   make  a  false  statement  of  material  fact  or  law  to  a  third  person.  .  .”     –  ABA  Model  Rule  8.4(c)     Prohibits  “conduct  involving  dishonesty,  fraud,  deceit  or   misrepresentation.”       –  California  Business  &  Professions  Code  Section  6106      “The  commission  of  any  act  involving  moral  turpitude,  dishonesty  or   corruption,  whether  the  act  is  committed  in  the  course  of  his  relations   as  an  attorney  or  otherwise,  and  whether  the  act  is  a  felony  or   misdemeanor  or  not,  constitutes  a  cause  for  disbarment  or   suspension.”   –  Vega  v.  Jones,  Day,  Reavis  &  Pogue    121  Cal.App.4th  282,  291-­‐294  (2004).   A  lawyer  may  not  knowingly  make  false  statements  of  material  fact  to   a  third  party.    
  • 10. SDCBA  Legal   Ethics  Opinion   2011-­‐2     (Adopted  by  the  San  Diego  County  Bar   Legal  Ethics  Committee  May  24,  2011.)     FACTUAL  SCENARIO   –  Attorney  is  representing  Client,  a  plaintiff  former  employee  in  a  wrongful  discharge   action.  While  the  matter  is  in  its  early  stages,  Attorney  has  by  now  received  former   employer’s  answer  to  the  complaint  and  therefore  knows  that  the  former  employer  is   represented  by  counsel  and  who  that  counsel  is.    Attorney  obtained  from  Client  a  list  of   all  of  Client’s  former  employer’s  employees.    Attorney  sends  out  a  “friending”1  request   to  two  high-­‐ranking  company  employees  whom  Client  has  identified  as  being   dissatisfied  with  the  employer  and  therefore  likely  to  make  disparaging  comments   about  the  employer  on  their  social  media  page.    The  friend  request  gives  only  Attorney’s   name.    Attorney  is  concerned  that  those  employees,  out  of  concern  for  their  jobs,  may   not  be  as  forthcoming  with  their  opinions  in  depositions  and  intends  to  use  any  relevant   information  he  obtains  from  these  social  media  sites  to  advance  the  interests  of  Client   in  the  litigation.     QUESTION  PRESENTED   –  Has  Attorney  violated  his  ethical  obligations  under  the  California  Rules  of  Professional   Conduct,  the  State  Bar  Act,  or  case  law  addressing  the  ethical  obligations  of  attorneys?  
  • 11. SDCBA  Legal   Ethics  Opinion   2011-­‐2     (Adopted  by  the  San  Diego  County  Bar   Legal  Ethics  Committee  May  24,  2011.)     –  Rule  2-­‐100(A)   “While  representing  a  client,  a  member  shall  not  communicate  directly  or  indirectly   about  the  subject  of  the  representation  with  a  party  the  member  knows  to  be   represented  by  another  lawyer  in  the  matter,  unless  the  member  has  the  consent  of  the   other  lawyer.”     –  Contact  Violates  Rule  2-­‐100(A)   “But  to  obtain  access  to  restricted  information  on  a  Facebook  page,  the  attorney  must   make  a  request  to  a  represented  party  outside  of  the  actual  or  virtual  presence  of   defense  counsel.  And  for  purposes  of  Rule  2-­‐100,  that  motivated  communication  with   the  represented  party  makes  all  the  difference.”   –  Contact  Also  Constitutes  Deception   “But  is  it  impermissible  deception  to  seek  to  friend  a  witness  without  disclosing  the   purpose  of  the  friend  request,  even  if  the  witness  is  not  a  represented  party  and  thus,  as   set  forth  above,  subject  to  the  prohibition  on  ex  parte  contact?  We  believe  that  it  is.”  
  • 12. NSA  &  Privacy   While  the  scope  of  and/or  legality  of  methods  used  as  part  of  the   NSA  surveillance  programs  are  still  being  determined  and  we  offer   no  opinion  on  this  point.         In  general,  attorneys  must  be  mindful  of  the  following  with  respect   to  advising  potential  violations  of  the  law:   –  Rule  3-­‐210   A  member  shall  not  advise  the  violation  of  any  law,  rule,  or  ruling   of  a  tribunal  unless  the  member  believes  in  good  faith  that  such   law,  rule,  or  ruling  is  invalid.  A  member  may  take  appropriate  steps   in  good  faith  to  test  the  validity  of  any  law,  rule,  or  ruling  of  a   tribunal.   –  Penal  Code  §31     Persons  who  "aid  and  abet  .  .  .  [or]  have  advised  or  encouraged"  a   crime  are  punishable  as  principals.  
  • 13. HUMAN   TRAFFICKING   STATISTICS   –  Human  trafficking  exists  all  over  the  United  States,  but  California  is  California  is  a   hot  spot  for  domestic  and  international  human  trafficking  because  of  its  large   population,  international  borders,  large  economy,  extensive  ports,  and   metropolitan  regions.   –  The  average  entry  age  of  American  minors  into  the  sex  trade  is  12-­‐14  years  old.     –  Many  victims  are  runaway  girls  who  have  already  suffered  sexual  abuse  as  children.   –  California  harbors  3  of  FBI’s  13  highest  child  sex  trafficking  areas  in  the  nation:  Los   Angeles,  San  Francisco,  and  San  Diego.     –  Foreign  nationals  are  also  brought  into  the  U.S.  as  slaves  for  labor  or  commercial   sex  through  force  or  fraud.     –  The  prevalence  and  anonymity  of  the  internet  has  fueled  the  rapid  growth  of  sex   trafficking,  making  the  trade  of  women  and  children  easier  than  ever  before.   –  REFERENCES   The  National  Report  on  Domestic  Minor  Sex  Trafficking:  America’s  Prostituted  Children,  Shared  Hope  International,  May  2009.     The  Federal  Bureau  of  Investigation’s  Efforts  to  Combat  Crimes  Against  Children,  Audit  Report  09-­‐08,  January  2009.     Trafficking  in  Persons  Report,  U.S.  Department  of  State,  June  2011.      
  • 14. PROP  35   (CASE  Act)   Summary   CALIFORNIANS  AGAINST  SEXUAL  EXPLOITATION  ACT  ("CASE  ACT”)   –  Increase  prison  terms  for  human  traffickers   –  Increase  fines  for  human  traffickers,  up  to  $1.5M  to  fund  victim  services   –  Remove  the  need  to  prove  force  to  prosecute  sex  trafficking  of  a  minor   –  Mandate  human  trafficking  training  for  law  enforcement   –  Make  sex  traffickers  register  as  sex  offenders   –  Require  that  all  sex  offenders  to  disclose  internet  accounts   –  Prohibits  use  of  sexual  history  to  impeach  or  prove  criminal  liability  of  trafficked   victims  
  • 15. Doe  v.  Harris   Case  No.  3:12-­‐cv-­‐05713-­‐THE   (N.D.  Cal.)     Case  Nos.  13-­‐15263,  13-­‐15267   (9th  Cir.)   –  Challenge  to  requirement  that  sex  offenders  provide  their  ISPs  and   “internet  identifier”  which  is  defined  as  an  “electronic  mail   address,  user  name,  screen  name,  or  similar  identifier  used  for  the   purpose  of  Internet  forum  discussions,  Internet  chat  room   discussions,  instant  messaging,  social  networking,  or  similar   Internet  communication.”     –  Jan  13,  2013  -­‐  Judge  Henderson  granted  a  preliminary  injunction:   “On  the  current  record,  the  Court  concludes  that  Plaintiffs  are   likely  to  establish  that  the  challenged  provisions,  when  combined   with  the  lack  of  protections  on  the  information’s  disclosure  and   the  serious  penalty  registrants  face  if  they  fail  to  comply  with  the   reporting  requirements,  create  too  great  a  chilling  effect  to  pass   constitutional  muster.  While  the  government  may  be  able  to   demonstrate  narrow  tailoring  in  subsequent  proceedings,  it  has   not  done  so  here.  Accordingly,  the  Court  concludes  that  Plaintiffs   are  likely  to  succeed  on  their  First  Amendment  free  speech  claim.”   –   Sept  10,  2013  –  Argued  before  9th  Circuit.