SlideShare a Scribd company logo
1 of 21
Download to read offline
Benjamin Ang
EDUCATION CHAIR,
Internet Society
CONSULTANT,
Keystone Law
Corporation
LECTURER, Temasek
Polytechnic
Ben.ang@gmail.com
Techmusicartandlaw
.blogspot.com
THE LAW AND AARON
SWARTZ – COULD IT
HAPPEN IN SINGAPORE?
Copyright
Is there copyright in journal articles?
Who owns the copyright?
Will the police take action for a breach?
Is there a law against accessing data?
What can police do when investigating a
case?
How can we prevent suicide?
OUTLINE
COPYRIGHT
Types of works that have
copyright
 Musical works
 Artistic works
 Dramatic works
 Literary works –
including journals
What copyright prevents you from
doing (without permission)
 Copying / reproducing a
substantial part
 Adapting
 Making available to the
public
IS THERE COPYRIGHT IN JOURNAL
ARTICLES?
The author owns copyright first
To get it published, he/she gives it to the
publisher
WHO OWNS THE COPYRIGHT?
I‘ve written an article
about my favourite XYZ
Obscure Point of
Research. Do you want it?
Author Publisher
I‘ll get it edited, peer
reviewed, and published it.
Then you give me all the
rights to the article.
COPYRIGHT
Rights Holder takes action?
 Civil lawsuit
 If defendant loses, he
must
 Pay damages (<$10K
each)
 Deliver up the infringing
items for destruction
Police take action?
 Criminal action
 If defendant loses, he
could
 Pay a fine
 Go to prison
 Rights holder can run the
criminal action in cases
of
 Counterfeiting
 Piracy
WHO SHOULD TAKE ACTION,
RIGHTS HOLDER OR POLICE?
IS THERE A LAW
AGAINST
ACCESSING DATA
WITHOUT AUTHORITY?
Section 2 – Definition
(‗Computer‘, ‗Unauthorized‘, ‗Access‘)
s.3 Unauthorized Access
s.4 Accessing
to commit
crime
s.5
Modification
s.6
Unauthorized
use
s.7
Unauthorized
obstruction
8
HOW TO READ THE CMCSA
A person secures access to any program or
data held in a computer if by causing a
computer to perform any function A he —
alters or erases the program or data; B
copies or moves it to
 any (other) storage medium
 Or a different location in the storage medium; C
uses it; D or
causes it to be output (display or otherwise) E
9
S2(2) DEFINITION OF ‗ACCESS‘
he is not himself entitled to control
access of the kind in question to the
program or data; A and
he does not have consent to access by
him of the kind in question to the
program or data from any person who is
so entitled. B
10
S2(5) DEFINITION OF ‗UNAUTHORIZED‘
Can a system
administrator in a
company read the e-
mail messages of
employees?
11
QUESTION
12
SONG YICK BIAU‘S CASE
Sure! My password is
―password‖
Hi blurgirl1999, can you
give me your password?
Ha, now I can
pretend to be
her and chat
with her
friends online!
13
MUHAMMAD NUZAIHAN‘S CASE(S)
Got into proxy
//swiftech/cloud4
Executed
‗ROTSHB
‘ to
access
files
Executed
‗bounce‘
to open
port
Used
open
port to
IRC
Installed backdoor
on SCV‘s FTP server
Used FTP to use
SCV‘s high speed
network without
paying
Ordinary Computers
 First time
 Fine $10,000
 Prison 3 years
 Second timer
 Fine $20,000
 Prison 5 years
Protected Computers
 9.—(1) Where access to
any protected computer
is obtained …
 fine not exceeding
$100,000
 or imprisonment not
exceeding 20 years
 or to both.
14
WHAT IS THE PUNISHMENT?
s.9(2) … the person committing the
offence knew, or ought reasonably to
have known, that the computer or
program or data is used directly in
connection with or necessary for —
the security, defence or international relations
of Singapore; A
15
WHICH ARE ―PROTECTED‖ COMPUTERS?
the existence or identity of a confidential source
of information relating to the enforcement of a
criminal law; B
the provision of services directly related to
communications infrastructure, banking and
financial services, public utilities, public
transportation or public key infrastructure; or C
the protection of public safety including systems
related to essential emergency services such as
police, civil defence and medical services. D
16
WHICH ARE ―PROTECTED‖ COMPUTERS?
WHAT CAN POLICE DO
WHEN INVESTIGATING A
CASE?
S.15A(2)(a) The powers referred to in sections
39 and 40 of the Criminal Procedure Code
They can search and seize computers
They can break encryption
They can demand passwords
Obstruction = jail
S.15A(2)(b) provide any information necessary
S.15A(2)(c) … (including real-time information)
18
POLICE POWERS OF SEARCH AND SEIZURE
IS SUICIDE INEVITABLE?
Legal Aid Bureau
https://www.mlaw.gov.sg/content/lab/e
n.html
Samaritans of Singapore
http://www.samaritans.org.sg/
Touch Community Helpline
http://www.touch.org.sg/helplines
WHAT CAN AN ACCUSED PERSON DO?
IF IT HAPPENS TO YOU,
GET HELP

More Related Content

What's hot

Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
guest66dc5f
 
Digi teen
Digi teenDigi teen
Digi teen
13aaa
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
erowell
 

What's hot (12)

Rohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_lawsRohas-7_years_of_indian_cyber_laws
Rohas-7_years_of_indian_cyber_laws
 
Digi teen
Digi teenDigi teen
Digi teen
 
Software piracy Grade 6
Software piracy Grade 6Software piracy Grade 6
Software piracy Grade 6
 
Internet Terms
Internet TermsInternet Terms
Internet Terms
 
Presentation
 Presentation Presentation
Presentation
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Arizona public-records pop quiz - David Cuillier - Phoenix NewsTrain - 4.06.18
Arizona public-records pop quiz - David Cuillier - Phoenix NewsTrain - 4.06.18Arizona public-records pop quiz - David Cuillier - Phoenix NewsTrain - 4.06.18
Arizona public-records pop quiz - David Cuillier - Phoenix NewsTrain - 4.06.18
 
ONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITYONLINE SAFETY AND SECURITY
ONLINE SAFETY AND SECURITY
 
IT Digital Citizenship
IT Digital CitizenshipIT Digital Citizenship
IT Digital Citizenship
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked

Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
Polsinelli PC
 
EPA RFS2
EPA RFS2EPA RFS2
EPA RFS2
mattn4
 

Viewers also liked (20)

Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)Election Blogging and Free Speech (Internet Society Singapore)
Election Blogging and Free Speech (Internet Society Singapore)
 
Election Blogging and Social Media 2015
Election Blogging and Social Media 2015Election Blogging and Social Media 2015
Election Blogging and Social Media 2015
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
5 steps to prevent project group meltdown
5 steps to prevent project group meltdown5 steps to prevent project group meltdown
5 steps to prevent project group meltdown
 
Open internet in singapore
Open internet in singaporeOpen internet in singapore
Open internet in singapore
 
Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)Intellectual property in music (Copyright and Creative Commons)
Intellectual property in music (Copyright and Creative Commons)
 
Copyright for Artists - including Creative Commons
Copyright for Artists - including Creative CommonsCopyright for Artists - including Creative Commons
Copyright for Artists - including Creative Commons
 
Bill of Rights
Bill of RightsBill of Rights
Bill of Rights
 
Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
Back to the Future... Will CMS' Proposed Provider-Based Rules Reshape the Fut...
 
Major changes brought in by companies bill 2012
Major changes brought in by companies bill 2012Major changes brought in by companies bill 2012
Major changes brought in by companies bill 2012
 
Changes to the Condominium Property Act and Regulations in Saskatchewan
Changes to the Condominium Property Act and Regulations in SaskatchewanChanges to the Condominium Property Act and Regulations in Saskatchewan
Changes to the Condominium Property Act and Regulations in Saskatchewan
 
EPA RFS2
EPA RFS2EPA RFS2
EPA RFS2
 
The Competition Amendment Act No. 1 of 2009 - by director Dominique Arteiro
The Competition Amendment Act No. 1 of 2009 - by director Dominique ArteiroThe Competition Amendment Act No. 1 of 2009 - by director Dominique Arteiro
The Competition Amendment Act No. 1 of 2009 - by director Dominique Arteiro
 
Presentation for Rockend\'s Melbourne Strata Users Day - June 2011
Presentation for Rockend\'s Melbourne Strata Users Day - June 2011Presentation for Rockend\'s Melbourne Strata Users Day - June 2011
Presentation for Rockend\'s Melbourne Strata Users Day - June 2011
 
THE LABOUR MARKET IN ITALY: WILL REFORMS ALONE CREATE EMPLOYMENT?
THE LABOUR MARKET IN ITALY: WILL REFORMS ALONE CREATE EMPLOYMENT?THE LABOUR MARKET IN ITALY: WILL REFORMS ALONE CREATE EMPLOYMENT?
THE LABOUR MARKET IN ITALY: WILL REFORMS ALONE CREATE EMPLOYMENT?
 
Direct Tax Amendments Applicable From 1st April 2017
Direct Tax Amendments Applicable From 1st April 2017Direct Tax Amendments Applicable From 1st April 2017
Direct Tax Amendments Applicable From 1st April 2017
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
The Every Student Succeeds Act (ESSA) and Authorizing (Part I)
The Every Student Succeeds Act (ESSA) and Authorizing (Part I)The Every Student Succeeds Act (ESSA) and Authorizing (Part I)
The Every Student Succeeds Act (ESSA) and Authorizing (Part I)
 
Enforcing Adjudication Determinations
Enforcing Adjudication DeterminationsEnforcing Adjudication Determinations
Enforcing Adjudication Determinations
 

Similar to The Law and Aaron Swartz: Could it happen in Singapore?

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to The Law and Aaron Swartz: Could it happen in Singapore? (20)

Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Digital law
Digital lawDigital law
Digital law
 

More from Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 

More from Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

The Law and Aaron Swartz: Could it happen in Singapore?

  • 1. Benjamin Ang EDUCATION CHAIR, Internet Society CONSULTANT, Keystone Law Corporation LECTURER, Temasek Polytechnic Ben.ang@gmail.com Techmusicartandlaw .blogspot.com THE LAW AND AARON SWARTZ – COULD IT HAPPEN IN SINGAPORE?
  • 2. Copyright Is there copyright in journal articles? Who owns the copyright? Will the police take action for a breach? Is there a law against accessing data? What can police do when investigating a case? How can we prevent suicide? OUTLINE
  • 4. Types of works that have copyright  Musical works  Artistic works  Dramatic works  Literary works – including journals What copyright prevents you from doing (without permission)  Copying / reproducing a substantial part  Adapting  Making available to the public IS THERE COPYRIGHT IN JOURNAL ARTICLES?
  • 5. The author owns copyright first To get it published, he/she gives it to the publisher WHO OWNS THE COPYRIGHT? I‘ve written an article about my favourite XYZ Obscure Point of Research. Do you want it? Author Publisher I‘ll get it edited, peer reviewed, and published it. Then you give me all the rights to the article. COPYRIGHT
  • 6. Rights Holder takes action?  Civil lawsuit  If defendant loses, he must  Pay damages (<$10K each)  Deliver up the infringing items for destruction Police take action?  Criminal action  If defendant loses, he could  Pay a fine  Go to prison  Rights holder can run the criminal action in cases of  Counterfeiting  Piracy WHO SHOULD TAKE ACTION, RIGHTS HOLDER OR POLICE?
  • 7. IS THERE A LAW AGAINST ACCESSING DATA WITHOUT AUTHORITY?
  • 8. Section 2 – Definition (‗Computer‘, ‗Unauthorized‘, ‗Access‘) s.3 Unauthorized Access s.4 Accessing to commit crime s.5 Modification s.6 Unauthorized use s.7 Unauthorized obstruction 8 HOW TO READ THE CMCSA
  • 9. A person secures access to any program or data held in a computer if by causing a computer to perform any function A he — alters or erases the program or data; B copies or moves it to  any (other) storage medium  Or a different location in the storage medium; C uses it; D or causes it to be output (display or otherwise) E 9 S2(2) DEFINITION OF ‗ACCESS‘
  • 10. he is not himself entitled to control access of the kind in question to the program or data; A and he does not have consent to access by him of the kind in question to the program or data from any person who is so entitled. B 10 S2(5) DEFINITION OF ‗UNAUTHORIZED‘
  • 11. Can a system administrator in a company read the e- mail messages of employees? 11 QUESTION
  • 12. 12 SONG YICK BIAU‘S CASE Sure! My password is ―password‖ Hi blurgirl1999, can you give me your password? Ha, now I can pretend to be her and chat with her friends online!
  • 13. 13 MUHAMMAD NUZAIHAN‘S CASE(S) Got into proxy //swiftech/cloud4 Executed ‗ROTSHB ‘ to access files Executed ‗bounce‘ to open port Used open port to IRC Installed backdoor on SCV‘s FTP server Used FTP to use SCV‘s high speed network without paying
  • 14. Ordinary Computers  First time  Fine $10,000  Prison 3 years  Second timer  Fine $20,000  Prison 5 years Protected Computers  9.—(1) Where access to any protected computer is obtained …  fine not exceeding $100,000  or imprisonment not exceeding 20 years  or to both. 14 WHAT IS THE PUNISHMENT?
  • 15. s.9(2) … the person committing the offence knew, or ought reasonably to have known, that the computer or program or data is used directly in connection with or necessary for — the security, defence or international relations of Singapore; A 15 WHICH ARE ―PROTECTED‖ COMPUTERS?
  • 16. the existence or identity of a confidential source of information relating to the enforcement of a criminal law; B the provision of services directly related to communications infrastructure, banking and financial services, public utilities, public transportation or public key infrastructure; or C the protection of public safety including systems related to essential emergency services such as police, civil defence and medical services. D 16 WHICH ARE ―PROTECTED‖ COMPUTERS?
  • 17. WHAT CAN POLICE DO WHEN INVESTIGATING A CASE?
  • 18. S.15A(2)(a) The powers referred to in sections 39 and 40 of the Criminal Procedure Code They can search and seize computers They can break encryption They can demand passwords Obstruction = jail S.15A(2)(b) provide any information necessary S.15A(2)(c) … (including real-time information) 18 POLICE POWERS OF SEARCH AND SEIZURE
  • 20. Legal Aid Bureau https://www.mlaw.gov.sg/content/lab/e n.html Samaritans of Singapore http://www.samaritans.org.sg/ Touch Community Helpline http://www.touch.org.sg/helplines WHAT CAN AN ACCUSED PERSON DO?
  • 21. IF IT HAPPENS TO YOU, GET HELP