From Soup to Nuts: Copyright, Social Networking and Electronic Surveillance Tracy Mitrano Cornell University
Copyright: Let’s Review The law and technology are out of sync with current business models and social norms Google Library Project and the fair use question Viacom Sues YouTube/Google for 1 billion Peer to peer technologies, including web based products such as BitTorrent 85% of allegedly copyright protected material transmitted over commodity networks
Because the protocols are free, who controls the pipes and content controls the Internet
Higher Education: Academic Delivery American Association of Publishers pre-litigation letter to Cornell University Two letters from the provost to all faculty advising them of compliance 70% less use of e-Reserve Materials If it is behind authentication, does that make it okay? Cornell Electronic Course Content Copyright Guidelines http://www.copyright.cornell.edu/policy/Copyright_Guidelines.pdf
Fair use checklist and faculty sign-off with input into course management systems.
Berkman Center White Paper The Digital Learning Challenge: Obstacles to Educational Uses of Copyright Material in the Digital Age
Recording Industry Association of American (RIAA) Digital Millennium Copyright Act Notices To forward or not to forward, that is the question… On the basis of what law rests compliance? http://www.cit.cornell.edu/policy/memos/riaa.html Intellectual Property and Free Speech
What’s going on… Waitin’ on the new business model “We designed the CD to last 10 years…” Carey Sherman, President of the RIAA, 2003 In the meantime, have the means become the end?
Taking a page out of patent law’s playbook, has intellectual property become the business model instead of the product in the entertainment arena?
Why is Higher Education in the Bull’s Eye of the Target? Object lesson for commercial ISPs? Bruised by Verizon v. RIAA, gearing up for another session? Who among US Congress will defend us? Because they are looking for the deep pocket? What does “knowledge” mean in DMCA? Because we actually care about our students and missions?
Citizenship, appropriate use and code of conduct
Social Networking Technologies: Let’s Begin
… for formal communications.”
The Choices Are: My undergraduate student, 22 years old. My son, Nikko, 15 years old. The Chronicle of Higher Education.
A vice president of EDUCAUSE.
Who among us … … has a page on Facebook? … uses some form of social networking technology for their work?
… has forbidden their son or daughter to use one?
Web 2.0 http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html http://en.wikipedia.org/wiki/Web_2
Pew Internet and American Life Project 55% of online teens have created a personal profile online, and 55% have used social networking sites like MySpace or Facebook. 66% of teens who have created a profile say that their profile is not visible to all internet users. They limit access to their profiles.
48% of teens visit social networking websites daily or more often; 26% visit once a day, 22% visit several times a day.
January 2007 Report: 91% of all social networking teens say they use the sites to stay in touch with friends they see frequently, while 82% use the sites to stay in touch with friends they rarely see in person. 72% of all social networking teens use the sites to make plans with friends; 49% use the sites to make new friends.
Older boys who use social networking sites (ages 15-17) are more likely than girls of the same age to say that they use social networking sites to make new friends (60% vs. 46%).
And now narcissism? Self-esteem movement + technology = Ignoring the needs of others?
According to Jean M. Twenge, “Why Today’s Young Americans are More Confident, Assertive, Entitled -- and More Miserable Than Ever Before”
Countered by William Strauss… Of “Millennials Rising” fame, would suggests that Twenge’s characterizations are “harsh, unfair and unsupported by data…”
Anyone remember Christopher Lasch and the “Culture of Narcissism” in the 1970’s?
If there is really nothing too new under the sun…
What is interesting is how technology influences human development studies, including now debates about the relative *narcissism* of every adolescent generation.
What is all the fuss about? Criminals push the technological envelope Private concerns hire high profile *security* officers N.B. Some confusion over/between physical and technological security Bush-Gonzalez-F.B.I. focus Communications On-line Protection Act 1996 Communications Decency Act Provisions about pornography overruled
Child Online Protection Privacy Act: in effect, parental permission for any personally identifiable information of persons under 13 years of age
Early Press Remember the Columbia University student arrested after on-line sexual fantasy date turns bad? Eventually overturned and now he is suing NYC for false arrest…
Poor judgment on the part of the girl date?
What is it about a computer that lowers inhibitions? Absence of physical social cues that consciously and unconsciously keep behavior in check. Deeply personal relationship with computers, not unlike an analyst-analyzand relationship, allows for unimpeded expression.
Human-computer interaction for impulsive and/or innovative people generates additional excitement and encouragement for expression.
Reason to make the technology illegal? Would render all social networking technologies illegal Passed by entire House 2006! Died at the end of the session, but, notwithstanding grandstanding politics, a window into the mindset of Congress on the relationship of technology to social order.
“ This guy voted against a bill to stop pedophilia!!”
Dawning of Facebook Original technological settings to .edu domain Early press reports of debauched and crude behavior; Illegal activity with respect to underage drinking and illegal drugs; Libelous, defamatory or uncivil discourse
“ Tracy, what are you going to do about Facebook?”
Thoughts on Facebook Cornell University 2006 Physical safety and personal privacy “ Like to be available, but not announced!” “ Didn’t like people looking at me when I wasn’t there!” Different expectations for a new generation but not none at all?
Hillary’s story…marketing for whom?
Thoughts on Facebook Cornell University 2006 .edu includes more than your fraternity brothers! New friends and communities: networking is both social and technological New business model based on privacy settings In response to push announcements about changes on an individual’s page in Fall 2006 Have to be a friend or join a group or community How many degrees of separation now?
Law … Communications Decency Act Section 230: I.S.P. Immunity Is Facebook/MySpace an I.S.P. or a higher layer application? Disney.com and the Cubby…Prodigy…section 230 line of cases Individual liability still pertains for privacy torts: Invasion of privacy, misappropriate of likeness, intrusion of seclusion…
If you can find the defendant (with a deep pocket)!
… and Policy Prohibit social networking technologies? Select groups and higher standards Speech codes, free speech and citizenship University of Southern California Education for appropriate, if not propitious use? Institutional transparency?
Admissions, Judicial Administration, Student Life, Campus Police?
The Time is Now! Cisco buys the source code of a little-known social networking site in order to create an out-of-the-box product for its customers. To what use for higher education? Cool tool for Alumni and Development Replace course management systems? Electronic mail communications RIAA letters, poster in Facebook at CU
Go to where the students are, user-friendly environment
To What Use Libraries? Means to share and build information Like Wikipedia or Citizendium but less as a single static repository and more as a way to get birds of feather to share engagement in ideas and topics United with teaching and learning in colleges and universities
By-pass course management systems, go to where students go, generate learning sites for more collaborative, peer to peer exchanges
Electronic Surveillance: Let’s Review Electronic Communications Privacy Act of 1986 (ECPA) “ Wiretapping Act” that collapsed telephony and data networking technologies Always had a content/conversational detail component aligned with Fourth Amendment Jurisprudence Content: probably cause of criminal activity + judicial supervision Conversational detail: easy access with a subpoena
Different technologies offer different content
When Last We Visited the USA Patriot Act… Passed October 2001 and renewed in 2006 Including “sunset” provisions that amended both ECPA and the Foreign Intelligence Surveillance Act FISA: separate court system, ex parte motions, originally passed in 1978 but under current circumstances assumed new meaning
That allowed for easy access to conversational detail
ECPA and FISA Amended The standard for content of communications remains the same under both Title III and FISA Courts: Probable cause of criminal or terrorist activity respectively Patriot Act lowered the bar to access for conversation detail
File a paper with a clerk in the FBI
No Wonder! Saturday New York Times, March 10, 2006 “FBI Head Admits Mistakes in Use of Security Act”
Talking about Patriot Act, and the use of “administrative letters” generic phrase for conversational detail requests
What’s the Problem? “Mueller conceded that the bureau had improperly used the USA Patriot Act to obtain information about people and businesses.” No central clearing house, database or repository for these requests No oversight for appropriate use
Confusion over content/detail = content
Consequently… Inaccurate reporting to Congress No one really knows how many letters have been issued Or where the records are of either the requests or the responses
Or what has been done with the responses in either criminal or terrorist investigations
Fundamental Principles That is not what our forefathers intended to be the case with the powers of a government, particularly federal government, and suggests a diminution of intended counter-balance to the Constitution:
The Bill of Rights, due process and government accountability.
Libraries can be proud of a long tradition of providing information and offering knowledge to the public domain as a fundamental component of our constitutional rights and citizenship obligations as members of this democratic republic …
Libraries have embraced new technologies -- as well as the opportunity that those new technologies suggest for learning and pursuit of wisdom … while being mindful of the legal and political challenges that underpin these technologies given their particular tracking and surveillance capabilities.
You were the first …
To grasp the significance of amendments to the 1976 copyright law and help us understand the consequences of these legal constraints on teaching and learning, research and free speech.
You were the one…
To lead the charge against the USA-Patriot Act for its impact civil liberties by:
You are still charged …
With charting the direction for the constituents of colleges and universities to find meaningful access to information and, like Virgil guiding Dante, guiding us all through the pathways by which we continue to pursue our missions of teaching, learning and outreach.
Back to the Future
Integrate traditional values of libraries and the seminal role that they play in our democratic republican society with the age old missions of higher education in these interesting times that require us to balance law, technology, market forces and social norms in the name of an ethical ordered liberty.