SlideShare a Scribd company logo
1 of 9
LAW AND CYBER CRIME
Professor Brian Bartlett
Lamont Joey Lum
October 12, 2016
What is Cyber Crime
 Attacks on computer systems especially company or governments.
 Cyber-bullying.
 Email spam and phishing.
 Identity theft.
 Prohibited offensive and illegal content.
 Online child sexual abuse material.
 Online trading scams.
So what? Why don’t we just prevent the cyber attacks?
Current Issues Surrounding Cyber Law
 4th Amendment Search and Seizure
 Data mining; sensitive and private information?
 FISA courts and EO12333
 14th Amendment (jurisdiction)
 Patriot Act
 Apple and CALEA
 4th Amendment Search and Seizure
 Courts have routinely ruled in favor of accused instead of law enforcement
 The question is always “HOW” did law enforcement get the intel
 Courts will be inundated with cases requiring clarifications until strong
precedents are set
 Data Mining and “Dog Sniffing”
 Data mining is any piece of information that companies or governments collect
on users
 Many times used by retailers to predict shopping habits etc
 Strict guidelines however for law enforcement use
 (Rodriguez v. United States, 2015).
 FISA courts, EO12333
 FISA (Foreign Intelligence Surveillance Act of 1978
 Collection efforts must go one of 11 pre-defined FISA courts
 All US Citizen information is heavily scrutinized even after collection
 EO12333 signed by President Reagan in 1981
Expanded collection efforts for known criminal or foreign surveillance activities
Implemented long before modern computing
Relevance to modern usage is routinely challenged
 14th Amendment (due process & jurisdiction)
 Continuing challenges of ownership/jurisdiction
 Especially difficult across international boundaries
 Jurisdiction expanded during Patriot Act
 Apple and CALEA
 Following a known terrorist attack DOJ “demanded” Apple amend security
policies
11 other requests thus far
 All Writs Act of 1789 which allowed federal courts to issue “writs” for aid
 United States v. New York Telephone Co (dialed number recognition, or dnr)
Arguably data mining and not as sensitive
 CALEA Communications Assistance for Law Enforcement Act
Implemented to force communication companies to implement “built in” surveillance
opportunities
Typically applied to AT&T or Verizon type providers who provided service, rather than
manufactures
 The Modern Christian
Must follow man’s and natural law but above all, follow God’s
commandments
Must hold themselves accountable as God will hold us accountable
Must be a witness to the world
Let’s get thinking: Suppose you owned Apple… Do your obligations to your
customers for data privacy outweigh that of catching a terrorist? Is this an ethical or
moral dilemma? What do you think?

More Related Content

What's hot

Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Mneill34
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012Vivastream
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
 
Cyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewCyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewInternet Law Center
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...ForgeRock
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Internet Law Center
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 

What's hot (20)

Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Sopa and pipa
Sopa and pipaSopa and pipa
Sopa and pipa
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Ppt by
Ppt by Ppt by
Ppt by
 
Cyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewCyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in Review
 
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 

Viewers also liked

Saeed Fadl CV
Saeed Fadl CVSaeed Fadl CV
Saeed Fadl CVsaeed981
 
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...BrightEdge Technologies
 
Leadership
LeadershipLeadership
LeadershipOnline
 
Governmentæs monetary policy
Governmentæs monetary policyGovernmentæs monetary policy
Governmentæs monetary policyOnline
 
Maximizing revenues stay true to the marketing message spa
Maximizing revenues stay true to the marketing message spaMaximizing revenues stay true to the marketing message spa
Maximizing revenues stay true to the marketing message spaAutonomy Hub
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
2016 Reno-Tahoe AMA Ace Awards Full Presentation
2016 Reno-Tahoe AMA Ace Awards Full Presentation2016 Reno-Tahoe AMA Ace Awards Full Presentation
2016 Reno-Tahoe AMA Ace Awards Full PresentationRenoTahoeAMA
 
LinkedIn For Learning: Maximizing Your Personal Brand
LinkedIn For Learning:  Maximizing Your Personal BrandLinkedIn For Learning:  Maximizing Your Personal Brand
LinkedIn For Learning: Maximizing Your Personal BrandSt. Edward's University
 
Principles of classical conditioning
Principles of classical conditioningPrinciples of classical conditioning
Principles of classical conditioningpearlz03
 
Scientific Research and its Types
Scientific Research and its TypesScientific Research and its Types
Scientific Research and its TypesHaris Khan
 

Viewers also liked (16)

Nour. Rayo de lUZ
Nour. Rayo de lUZNour. Rayo de lUZ
Nour. Rayo de lUZ
 
Saeed Fadl CV
Saeed Fadl CVSaeed Fadl CV
Saeed Fadl CV
 
Pop Sci Airbag
Pop Sci AirbagPop Sci Airbag
Pop Sci Airbag
 
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...
BrightEdge Share15 - CM201: Demand for Content: People, Personas & Intent - E...
 
Leadership
LeadershipLeadership
Leadership
 
Governmentæs monetary policy
Governmentæs monetary policyGovernmentæs monetary policy
Governmentæs monetary policy
 
Rail Exhibition & Conference 2014
Rail Exhibition & Conference 2014Rail Exhibition & Conference 2014
Rail Exhibition & Conference 2014
 
Maximizing revenues stay true to the marketing message spa
Maximizing revenues stay true to the marketing message spaMaximizing revenues stay true to the marketing message spa
Maximizing revenues stay true to the marketing message spa
 
Middle East Health & Safety Conference & Expo 2015
Middle East Health & Safety Conference & Expo 2015Middle East Health & Safety Conference & Expo 2015
Middle East Health & Safety Conference & Expo 2015
 
Pasando el globo
Pasando el globoPasando el globo
Pasando el globo
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
2016 Reno-Tahoe AMA Ace Awards Full Presentation
2016 Reno-Tahoe AMA Ace Awards Full Presentation2016 Reno-Tahoe AMA Ace Awards Full Presentation
2016 Reno-Tahoe AMA Ace Awards Full Presentation
 
LinkedIn For Learning: Maximizing Your Personal Brand
LinkedIn For Learning:  Maximizing Your Personal BrandLinkedIn For Learning:  Maximizing Your Personal Brand
LinkedIn For Learning: Maximizing Your Personal Brand
 
SAP TERP.PDF
SAP TERP.PDFSAP TERP.PDF
SAP TERP.PDF
 
Principles of classical conditioning
Principles of classical conditioningPrinciples of classical conditioning
Principles of classical conditioning
 
Scientific Research and its Types
Scientific Research and its TypesScientific Research and its Types
Scientific Research and its Types
 

Similar to Cyberlaw

Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfTifanija
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docxrhetttrevannion
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Governmentprimeteacher32
 
Should European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot ActShould European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot Actfrjennings
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Shawn Tuma
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellUBA-komitet
 

Similar to Cyberlaw (20)

E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Chapter2
Chapter2Chapter2
Chapter2
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing Yourself
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
 
Privacy and the Government
Privacy and the GovernmentPrivacy and the Government
Privacy and the Government
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Should European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot ActShould European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot Act
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
 
Digital Privacy
Digital PrivacyDigital Privacy
Digital Privacy
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 

Recently uploaded

Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 

Recently uploaded (20)

Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 

Cyberlaw

  • 1. LAW AND CYBER CRIME Professor Brian Bartlett Lamont Joey Lum October 12, 2016
  • 2. What is Cyber Crime  Attacks on computer systems especially company or governments.  Cyber-bullying.  Email spam and phishing.  Identity theft.  Prohibited offensive and illegal content.  Online child sexual abuse material.  Online trading scams. So what? Why don’t we just prevent the cyber attacks?
  • 3. Current Issues Surrounding Cyber Law  4th Amendment Search and Seizure  Data mining; sensitive and private information?  FISA courts and EO12333  14th Amendment (jurisdiction)  Patriot Act  Apple and CALEA
  • 4.  4th Amendment Search and Seizure  Courts have routinely ruled in favor of accused instead of law enforcement  The question is always “HOW” did law enforcement get the intel  Courts will be inundated with cases requiring clarifications until strong precedents are set
  • 5.  Data Mining and “Dog Sniffing”  Data mining is any piece of information that companies or governments collect on users  Many times used by retailers to predict shopping habits etc  Strict guidelines however for law enforcement use  (Rodriguez v. United States, 2015).
  • 6.  FISA courts, EO12333  FISA (Foreign Intelligence Surveillance Act of 1978  Collection efforts must go one of 11 pre-defined FISA courts  All US Citizen information is heavily scrutinized even after collection  EO12333 signed by President Reagan in 1981 Expanded collection efforts for known criminal or foreign surveillance activities Implemented long before modern computing Relevance to modern usage is routinely challenged
  • 7.  14th Amendment (due process & jurisdiction)  Continuing challenges of ownership/jurisdiction  Especially difficult across international boundaries  Jurisdiction expanded during Patriot Act
  • 8.  Apple and CALEA  Following a known terrorist attack DOJ “demanded” Apple amend security policies 11 other requests thus far  All Writs Act of 1789 which allowed federal courts to issue “writs” for aid  United States v. New York Telephone Co (dialed number recognition, or dnr) Arguably data mining and not as sensitive  CALEA Communications Assistance for Law Enforcement Act Implemented to force communication companies to implement “built in” surveillance opportunities Typically applied to AT&T or Verizon type providers who provided service, rather than manufactures
  • 9.  The Modern Christian Must follow man’s and natural law but above all, follow God’s commandments Must hold themselves accountable as God will hold us accountable Must be a witness to the world Let’s get thinking: Suppose you owned Apple… Do your obligations to your customers for data privacy outweigh that of catching a terrorist? Is this an ethical or moral dilemma? What do you think?