Your SlideShare is downloading. ×
0
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Evolution of US Approaches to Internet Regulation

638

Published on

Presentation at InterNews conference on effect of New Media and Internet Policies and an Emerging China.

Presentation at InterNews conference on effect of New Media and Internet Policies and an Emerging China.

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
638
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Regulation of the the InternetThe Evolution of the United States’Approach to the Newest Frontier Your Logo
  • 2. Barry James, The International Herald Tribune, August 5, 1996.Frontier Population: 36 Million (1996)
  • 3. .
  • 4. The New Frontier
  • 5. INTERNET USER
  • 6. IDENTITY THEFT: Identity Theft and Assumption Deterrence Act . 18 U.S.C. § 1028 (1998); California Anti-1 Phishing Act of 2005, California Business & Professions Code §229482 VIRUSES & MALWARE: Computer Fraud and Abuse Act, 18 U.S.C. §1030 (1986) .3 IP INFRINGEMENT: Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. §512(1998); Anti-cyber- squatting Consumer Protection Act. 15 U.S.C. §1125(d) )(1999). PRIVACY & SPYWARE: Electronic Communications Privacy Act of 1986, 18 U.S.C.§2510; California4 Consumer Protection Against Computer Spyware Act, Business & Professions Code § 22947 (2004) SPAM: Controlling the Assault of Non-Solicited Pornography And Marketing (“CAN-SPAM”) Act of 2003, 155 U.S.C. § 7701.6 CHILDREN: Childrens Online Privacy Protection Act of 1998 (COPPA) 15 U.S.C.§6501.
  • 7. Example: Spam solution. Technology – partial solution2000-2000-2003 Spamgrows as a threat eco-to eco-system self- No meaningful self-regulation. Congress: spam is Constitutionally protected commercial speech – regulate it, do not ban it.
  • 8. Rob McKenna Attorney General - State of Washington (2008)Frontier Population: 1,463,632,361 (June 2008) 2 Billion (2010)
  • 9. VICTIMS 1.2 MM (2006) PERPETRATOR 72.5% women 63.3% men44% 18-30 yrs old (where known) Half have no prior relationship with victimDURATIONAvg. – 2 Years
  • 10. Violence Against Women Act Amendments (18 USC § 2261A )State Cyber Stalking-Harassment/-Bullying LawsState Defamation StatutesState Cyber Stalking-Harassment-Bullying LawsComputer Fraud and Abuse ActTrespass, Fraud, Defamation. Invasion of Privacy and Infliction ofEmotional Distress
  • 11. Criminal DefamationState level Red – States with criminal defamation laws and prosecutions Yellow – States with law on books but no recent prosecutions
  • 12. Notes from Meeting with my Lawyer People we People we CANT sue CAN sueThe website Loon.ey@tick.comThe ISP (whoever that is)Mean people How much am I paying this guy?
  • 13. The Models Strike Back In that the Internet provides a virtually unlimited, inexpensive, and almost immediate means of communication with tens, if not hundreds, of millions of people, the dangers of its misuse cannot be ignored. . . . Those who suffer damages as a result of tortious or other actionable communications on the Internet should be able to seek appropriate redress by preventing the wrongdoers from hiding behind an illusory shield of purported First Amendment rights.
  • 14. Standard for Unmasking Bloggers
  • 15. Two Things You Need to Know
  • 16. It’s Really Simple (not) SPYWARE PRIVACY DATA SECURITY POLICIES USE OF CONSUMER DATA INFORMATION COLLECTION
  • 17. By placing an order . . . . Should We wish to exercise thisoption, you agree to surrender your immortalsoul, and any claim you may have on it,within 5 (five) working days of receivingwritten notification from gamesation.co.uk orone of its duly authorised minions.
  • 18. Prediction: APRIL 1, 2011 Prediction: APRIL 1, 2012Las Vegas, Nevada Las Vegas, Nevada
  • 19. Bennet KelleyInternet Law Center100 Wilshire Blvd, Suite 950Santa Monica, CA 90401bkelley@internetlawcenter.netwww.internetlawcenter.nett

×