This document summarizes a court case regarding whether Cisco Systems could be held liable for human rights abuses in China facilitated by their networking technology. The court found Cisco was not liable as their technology had legitimate uses and they did not tailor it for abuse. However, plaintiffs argued Cisco customized and marketed the technology to enable monitoring and censorship. The stakeholders are Cisco, Chinese customers/plaintiffs, and legal counsel. Alternatives discussed are promoting awareness of company complicity, continuing or refusing sales in China. The group decided increased awareness was best to identify violations abroad through media and courts. Outcomes are that companies face challenges of globalization and link between third party product use and the company.
Presentation by Damian Tambini at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Federica Casarosa at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Christian D'Cunha at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
Presentation by Ula Furgal at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Anna Herold at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Bernd Holznagel at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Damian Tambini at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Federica Casarosa at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Christian D'Cunha at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
A presentation by Pier Luigi Parcu on Artificial Intelligence, elections, media pluralism and media freedom at the European Artificial Intelligence Observatory April 2, 2019
Presentation by Ula Furgal at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Anna Herold at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
Presentation by Bernd Holznagel at the 2019 CMPF Summer School for Journalists and Media Practitioners - Covering Political Campaigns in the Age of Data, Algorithms & Artificial Intelligence
A presentation from Urska Umek at the Council of Europe on the Online and offline threats to media pluralism. Presented at the 2018 CMPF conference, Measuring Media Pluralism in Europe - Between Old Risks and New Threats.
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
To watch the full on-demand webinar recording please visit: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
As the scope of EU law extends its reach globally, we are also seeing greater international regulatory co-operation. Whether it’s the FTC, the FCC or European DPAs - global privacy regulators are taking steps to prioritize and address top concerns that affect everyone on a global scale.
In this on-demand webinar the speakers will:
• Review the latest case law and enforcement actions from the last 12 months
• Address the impact of the rise of activism and the role of individuals like Max Schrems who have forced legal changes
• Provide their perspectives on future outcomes and how to keep your company out of the regulatory spotlight
Register to watch this on-demand webinar now to to learn how to keep your company out of the regulatory spotlight: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
An inside look at a cartel at work common characteristics of international ca...GE 94
hey were first shown publicly at the trial of three former top executives from Archer Daniels Midland Company ("ADM"). ADM and its co-conspirators from Europe and Asia conspired to fix prices and allocate sales volumes of the food additive citric acid and the feed additive lysine. ADM pled guilty before trial and was sentenced to pay a $100 million fine - which at the time was nearly seven times larger than the previous record fine in an antitrust case in the United States. The ADM executives were convicted at trial and were recently sentenced to fines of up to $350,000 and lengthy prison sentences ranging from 24 to 30 months.
This presentation contains the following:
- Description of Advocacy, activities involved and scope.
- Steps involved in Advocacy.
- Digital Rights Advocacy and Achievements in Cameroon.
- How you can get involved.
Click here to agree managing intellectual property when crowdsourcing solutionsIan McCarthy
Tapping into the creativity of a crowd can provide a highly efficient and effective means of acquiring ideas, work, and content to solve problems. But crowdsourcing solutions can also come with risks, including the legal risks associated with intellectual property. Therefore, we raise and address a two-part question: Why -- and how -- should organizations deal with intellectual property issues when engaging in the crowdsourcing of solutions? The answers lie in understanding the approaches for acquiring sufficient intellectual property from a crowd and limiting the risks of using that intellectual property. Herein, we discuss the hazards of not considering these legal issues and explain how managers can use appropriate terms and conditions to balance and mitigate the risks associated with soliciting solutions from a crowd. Based on differences in how organizations acquire intellectual property and limit associated risks, we identify and illustrate with examples four approaches for managing intellectual property (passive, possessive, persuasive, and prudent) when crowdsourcing solutions. We conclude with recommendations for how organizations should use and tailor the approaches in our framework to source intellectual property from a crowd.
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
Short description:
In this webinar, we will be exploring the current trends, predictions and other things of relevance to GDPR enforcement. Further, we will touch on the big fines such as Facebook, Google, Experian as well as guide you how to stay out of trouble with the regulation.
Main points covered:
• A summary of ICO enforcement action in the UK over the past 12 months
• What organizations got wrong?
• The big fines – Facebook and Experian
• Trends and predictions
• How to keep out of trouble with the regulator
Presenter:
Our presenter for this webinar, James Castro-Edwards is a partner and Head of Data Protection at Wedlake Bell LLP. James advises domestic and multinational organizations on data protection issues. His experience includes managing global data protection compliance projects for multinationals and advising domestic companies on complex data protection issues. He has also developed and delivered innovative data protection training programs for multinational clients, including a data protection officers’ training course which was accredited by a European government. James leads the firm’s outsourced data protection officer service, ProDPO.
James frequently speaks on data protection and cybersecurity issues and is widely published, having written articles for a wide variety of titles including The Times and The Guardian, and wrote The Law Society textbook on the General Data Protection Regulation (GDPR).
Recorded Webinar: https://youtu.be/QAF1XXTBFyg
With the rise of entrepreneurship, intellectual property is booming. This creates a wealth of opportunities for attorneys to start or grow their IP practice. But, like with any area of law, IP requires specialized knowledge to succeed and comply with best practices. Technology is an essential element to minimizing risk in any practice, but particularly, in the deadline-driven world of IP.
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
A presentation from Urska Umek at the Council of Europe on the Online and offline threats to media pluralism. Presented at the 2018 CMPF conference, Measuring Media Pluralism in Europe - Between Old Risks and New Threats.
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
[Privacy Webinar Slides] Global Enforcement PrioritiesTrustArc
To watch the full on-demand webinar recording please visit: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
As the scope of EU law extends its reach globally, we are also seeing greater international regulatory co-operation. Whether it’s the FTC, the FCC or European DPAs - global privacy regulators are taking steps to prioritize and address top concerns that affect everyone on a global scale.
In this on-demand webinar the speakers will:
• Review the latest case law and enforcement actions from the last 12 months
• Address the impact of the rise of activism and the role of individuals like Max Schrems who have forced legal changes
• Provide their perspectives on future outcomes and how to keep your company out of the regulatory spotlight
Register to watch this on-demand webinar now to to learn how to keep your company out of the regulatory spotlight: https://info.truste.com/WB-2016-05-19-Insight-Series-Global-Privacy-Enforcement-Priorities_RegPage-OnDemand.html
An inside look at a cartel at work common characteristics of international ca...GE 94
hey were first shown publicly at the trial of three former top executives from Archer Daniels Midland Company ("ADM"). ADM and its co-conspirators from Europe and Asia conspired to fix prices and allocate sales volumes of the food additive citric acid and the feed additive lysine. ADM pled guilty before trial and was sentenced to pay a $100 million fine - which at the time was nearly seven times larger than the previous record fine in an antitrust case in the United States. The ADM executives were convicted at trial and were recently sentenced to fines of up to $350,000 and lengthy prison sentences ranging from 24 to 30 months.
This presentation contains the following:
- Description of Advocacy, activities involved and scope.
- Steps involved in Advocacy.
- Digital Rights Advocacy and Achievements in Cameroon.
- How you can get involved.
Click here to agree managing intellectual property when crowdsourcing solutionsIan McCarthy
Tapping into the creativity of a crowd can provide a highly efficient and effective means of acquiring ideas, work, and content to solve problems. But crowdsourcing solutions can also come with risks, including the legal risks associated with intellectual property. Therefore, we raise and address a two-part question: Why -- and how -- should organizations deal with intellectual property issues when engaging in the crowdsourcing of solutions? The answers lie in understanding the approaches for acquiring sufficient intellectual property from a crowd and limiting the risks of using that intellectual property. Herein, we discuss the hazards of not considering these legal issues and explain how managers can use appropriate terms and conditions to balance and mitigate the risks associated with soliciting solutions from a crowd. Based on differences in how organizations acquire intellectual property and limit associated risks, we identify and illustrate with examples four approaches for managing intellectual property (passive, possessive, persuasive, and prudent) when crowdsourcing solutions. We conclude with recommendations for how organizations should use and tailor the approaches in our framework to source intellectual property from a crowd.
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
Short description:
In this webinar, we will be exploring the current trends, predictions and other things of relevance to GDPR enforcement. Further, we will touch on the big fines such as Facebook, Google, Experian as well as guide you how to stay out of trouble with the regulation.
Main points covered:
• A summary of ICO enforcement action in the UK over the past 12 months
• What organizations got wrong?
• The big fines – Facebook and Experian
• Trends and predictions
• How to keep out of trouble with the regulator
Presenter:
Our presenter for this webinar, James Castro-Edwards is a partner and Head of Data Protection at Wedlake Bell LLP. James advises domestic and multinational organizations on data protection issues. His experience includes managing global data protection compliance projects for multinationals and advising domestic companies on complex data protection issues. He has also developed and delivered innovative data protection training programs for multinational clients, including a data protection officers’ training course which was accredited by a European government. James leads the firm’s outsourced data protection officer service, ProDPO.
James frequently speaks on data protection and cybersecurity issues and is widely published, having written articles for a wide variety of titles including The Times and The Guardian, and wrote The Law Society textbook on the General Data Protection Regulation (GDPR).
Recorded Webinar: https://youtu.be/QAF1XXTBFyg
With the rise of entrepreneurship, intellectual property is booming. This creates a wealth of opportunities for attorneys to start or grow their IP practice. But, like with any area of law, IP requires specialized knowledge to succeed and comply with best practices. Technology is an essential element to minimizing risk in any practice, but particularly, in the deadline-driven world of IP.
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
Increasingly, nonprofits hold large quantities of digital assets (such as donor information, grant application details, financial records, etc.). Organizations of all sizes and industries are being targeted by cyber criminals. Cyber-attacks will often devastate an organization’s operations and have significant financial, legal and reputational consequences.
In this webinar, Imran Ahmad of Miller Thomson, LLP will explain how implementing best practices from a pre-breach standpoint can go a long way to mitigate the negative consequences of a cyber-attack.
What you will learn:
- what the cyber threat landscape looks like
- how to ensure privacy of your digital assets
- steps to take in the aftermath of a cyber-attack
Litigation Activities May Be Insufficient To Obtain An Exclusion Order: Motiv...SHIMOKAJI IP
Patent owners often initiate concurrent proceedings against infringers in US district court and the International Trade Commission (ITC). The district court provides an avenue for an award of damages. The ITC provides an avenue for an order excluding the importation of infringing goods into the US.
The Federal Circuit, in Motiva v ITC, continues to create a barrier to jurisdiction before the ITC for those patent owners, such as Non-Practicing Entities (NPEs), whose business is focused on licensing and litigation.
For more information, contact info@shimokaji.com; www.shimokaji.com
1. CASE 4
CISCO: Are Tech Firms Responsible
for the Misuse of Their Products?
Estampador
Fajardo
Kim
2. Facts of the Case
• The lawsuit was filed under the 1789 Alien Tort Law, which
allows foreign nationals redress in US courts for human
rights abuses.
• In a decision carefully followed by the tech sector and
human rights activists, a US court cleared Cisco Systems of
any wrong doing for human rights abuses in China.
• The Maryland court found that Cisco’s technology
remained a neutral product with numerous legitimate uses,
and did not find evidence that Cisco tailored the technology
to facilitate the human rights abuses alleged.
3. Facts of the Case
• Cisco’s General Counsel responded to the
decision claiming that both Congress and the
Commerce Department permit the sale of the
technology in question, and that the
technology has “helped billions of people
around the world to access information.”
4. Ethical Issues
• Cisco was claimed liable for Beijing’s use of
Cisco’s networking technology to find, arrest,
and torture political activists.
• Chinese plaintiffs argued that not only did the
technology facilitate the abuses, but Cisco also
“actively customized, marketed, and provided
support for its monitoring and censorship
technologies.”
5. Identify Stakeholders
• The company (CISCO) and its executives. The
company who created and pushed for the use
of Cisco’s networking technology. Cisco’s stake
in this case is their future employees who are
the workforce of the company involved in
customizing ang manufacturing the said
network technology equipment.
6. Identify Stakeholders
• Chinese customers and plaintiffs claiming
about Cisco’s unethical procedures.
• Cisco’s legal counsel involved in responding
per the decision in the case
7. Consider the Alternatives
1.)Promote better consciousness on the part of
business and society more broadly, of
violations committed abroad due to increased
media coverage and access, and identification
of company complicity in the courts.
8. Consider the Alternatives
2.) Increased awareness on the part of business
and society more broadly, that companies are
expected to "make sure that they are not
complicit in human rights abuses"
9. Consider the Alternatives
3.) Continue legal sales of the product in that
country despite the danger that the product
may be used to commit human rights
violations
4.) Refuse to do business in that country, and so
forgo the revenues that would have been
generated through the legal sale of its
products there
10. How the Decision Affects the
Stakeholders
• The decision will affect the stakeholders
through the business process that the
company currently has. The success of the
decision made will be determined the by the
appropriateness of the goals that the
organization has pursued with regards to the
initial goals and objectives established by the
company.
11. Decision
The group has decided to go for the first
alternative which is to promote better
consciousness on the part of business and
society more broadly, of violations committed
abroad due to increased media coverage and
access, and identification of company
complicity in the courts.
12. Outcomes
• Multi national companies such as CISCO, are
facing the world of globalization in today’s
society. This means that their goods are being
sold into an ever-wider spectrum of countries
which brings forth challenges for the
stakeholders as well as fostering the link
between how these products are used by
third parties – and the company itself.