IDENTITY THEFT: Identity Theft and Assumption Deterrence Act . 18 U.S.C. § 1028 (1998); California Anti-1 Phishing Act of 2005, California Business & Professions Code §229482 VIRUSES & MALWARE: Computer Fraud and Abuse Act, 18 U.S.C. §1030 (1986) .3 IP INFRINGEMENT: Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. §512(1998); Anti-cyber- squatting Consumer Protection Act. 15 U.S.C. §1125(d) )(1999). PRIVACY & SPYWARE: Electronic Communications Privacy Act of 1986, 18 U.S.C.§2510; California4 Consumer Protection Against Computer Spyware Act, Business & Professions Code § 22947 (2004) SPAM: Controlling the Assault of Non-Solicited Pornography And Marketing (“CAN-SPAM”) Act of 2003, 155 U.S.C. § 7701.6 CHILDREN: Childrens Online Privacy Protection Act of 1998 (COPPA) 15 U.S.C.§6501.
Example: Spam solution. Technology – partial solution2000-2000-2003 Spamgrows as a threat eco-to eco-system self- No meaningful self-regulation. Congress: spam is Constitutionally protected commercial speech – regulate it, do not ban it.
Rob McKenna Attorney General - State of Washington (2008)Frontier Population: 1,463,632,361 (June 2008) 2 Billion (2010)
VICTIMS 1.2 MM (2006) PERPETRATOR 72.5% women 63.3% men44% 18-30 yrs old (where known) Half have no prior relationship with victimDURATIONAvg. – 2 Years
Violence Against Women Act Amendments (18 USC § 2261A )State Cyber Stalking-Harassment/-Bullying LawsState Defamation StatutesState Cyber Stalking-Harassment-Bullying LawsComputer Fraud and Abuse ActTrespass, Fraud, Defamation. Invasion of Privacy and Infliction ofEmotional Distress
Criminal DefamationState level Red – States with criminal defamation laws and prosecutions Yellow – States with law on books but no recent prosecutions
Notes from Meeting with my Lawyer People we People we CANT sue CAN sueThe website Loon.email@example.comThe ISP (whoever that is)Mean people How much am I paying this guy?
The Models Strike Back In that the Internet provides a virtually unlimited, inexpensive, and almost immediate means of communication with tens, if not hundreds, of millions of people, the dangers of its misuse cannot be ignored. . . . Those who suffer damages as a result of tortious or other actionable communications on the Internet should be able to seek appropriate redress by preventing the wrongdoers from hiding behind an illusory shield of purported First Amendment rights.
It’s Really Simple (not) SPYWARE PRIVACY DATA SECURITY POLICIES USE OF CONSUMER DATA INFORMATION COLLECTION
By placing an order . . . . Should We wish to exercise thisoption, you agree to surrender your immortalsoul, and any claim you may have on it,within 5 (five) working days of receivingwritten notification from gamesation.co.uk orone of its duly authorised minions.
Prediction: APRIL 1, 2011 Prediction: APRIL 1, 2012Las Vegas, Nevada Las Vegas, Nevada
Bennet KelleyInternet Law Center100 Wilshire Blvd, Suite 950Santa Monica, CA firstname.lastname@example.org