SlideShare a Scribd company logo
HOT HOT HOT
 TOPICS IN
BEHAVIORAL TARGETING
                INTERNET LAW CENTER
310) 452-0401                   www.internetlawcenter.net
bkelley@internetlawcenter.net   @InternetLawCent
The Good
The Good
The Good?
$
The Good?
The Good?
(Jan. 2011)




              (June 2010)




      (Dec 2010)



(Dec. 2010)
Class Action Litigation
• Electronic Communications Privacy Act
• Computer Fraud and Abuse Act

Mortensen v. Bresnan Comm., CV 10-13-BLG-RFC (D. Mont. Dec. 13,
2010) (dismisses ECPA claim due to consent, CFAA claim survives)
Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW –
JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren
Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August
2009)
Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW –
JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren
Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August
2009)
Big Nose strikes again by buzusa @ flickr
Michelle Ward, aka The When I Grow Up Coach
Hogette 1 – Micki James @ Flickr

Michelle Ward, aka The When I Grow Up Coach
Our report and law enforcement action send a
clear message to industry: despite some good
actors, self-regulation of privacy has not
worked adequately and is not working
adequately for Americans consumers. We
deserve far better from the companies we
entrust our data to, and industry, as a whole,
must do better.

                    FTC Chairman Jon Leibowitz
Key Principles
Privacy by Design
Simplified Choice
Greater Transparency
Key Principles
Privacy by Design
Simplified Choice
Greater Transparency
• “The concept of do not track has not
                 been endorsed by the commission
                 or, in my judgment, even properly
                 vetted yet. . . .”
               • Has “serious questions about the
                 various do-not-track proposals. . . .”
   FTC
Commissioner
                         J. Thomas Rosch, Brand Week (Mar. 24, 2011)
• Endorses baseline commercial data
  privacy principles that would fill any
  gaps in existing U.S. law;
• Safe harbors against FTC enforcement
  for practices defined by baseline data
  privacy or self-regulatory codes;
• Limited rulemaking authority over
  certain baseline fair information privacy
  practices principles if it is established
  that market failures require prescriptive
  regulatory action; and
• National Data Breach Standards
All rise . . .




Wednesdays at 10 AM PT
   WebmasterRadio.fm
HOT HOT HOT
 TOPICS IN

More Related Content

What's hot

Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
guest70f067f
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
Internet Law Center
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
Adler Law Group
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
Internet Law Center
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone Privacy
Christie Dudley
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
amprivacy
 
Tech Group Announces Privacy Standards
Tech Group Announces Privacy StandardsTech Group Announces Privacy Standards
Tech Group Announces Privacy Standards
magicaltenant8123
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
Muneeb Ahmed
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
Internet Law Center
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
Lance Hoffman
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
Teichka Muñoz
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
Vivastream
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
Internet Law Center
 
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma PaperEth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Heather Taylor
 
Black wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA ReportBlack wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA Report
Jose Pinilla
 
Social Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingSocial Media and the Law - by Tom Cowling
Social Media and the Law - by Tom Cowling
iCrossing
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Brian Miller, Solicitor
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
Ujjwal Joshi
 

What's hot (20)

Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone Privacy
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Tech Group Announces Privacy Standards
Tech Group Announces Privacy StandardsTech Group Announces Privacy Standards
Tech Group Announces Privacy Standards
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma PaperEth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
 
Black wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA ReportBlack wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA Report
 
Social Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingSocial Media and the Law - by Tom Cowling
Social Media and the Law - by Tom Cowling
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 

Viewers also liked

Farm Concern International
Farm Concern InternationalFarm Concern International
Flash Game with Freeware
Flash Game with FreewareFlash Game with Freeware
Flash Game with Freeware
Semen Frish
 
Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013
Internet Law Center
 
ICT Observatory 2009: Introduction
ICT Observatory 2009: IntroductionICT Observatory 2009: Introduction
Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10
Claudio Forghieri
 
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Technical Centre for Agricultural and Rural Cooperation ACP-EU (CTA)
 
Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12
Retelur Marketing
 
Linking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & AsiaLinking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & Asia
CIAT
 

Viewers also liked (8)

Farm Concern International
Farm Concern InternationalFarm Concern International
Farm Concern International
 
Flash Game with Freeware
Flash Game with FreewareFlash Game with Freeware
Flash Game with Freeware
 
Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013
 
ICT Observatory 2009: Introduction
ICT Observatory 2009: IntroductionICT Observatory 2009: Introduction
ICT Observatory 2009: Introduction
 
Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10
 
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
 
Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12
 
Linking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & AsiaLinking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & Asia
 

Similar to Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
YunLi
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L I
YunLi
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
YunLi
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
YunLi
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
Winston & Strawn LLP
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
Amy Larrimore
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Shawn Tuma
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
Michael Germano
 
CASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASECASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASE
ShivajiRao11
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
Michael C. Keeling, Esq.
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 

Similar to Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising (20)

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L I
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
CASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASECASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASE
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Internet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
Internet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
Internet Law Center
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
Internet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
Internet Law Center
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Internet Law Center
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
Internet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
Internet Law Center
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
Internet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
Internet Law Center
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
Internet Law Center
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
Internet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Internet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
Internet Law Center
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
Internet Law Center
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
Internet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
Internet Law Center
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 

Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising

  • 1. HOT HOT HOT TOPICS IN
  • 2. BEHAVIORAL TARGETING INTERNET LAW CENTER
  • 3. 310) 452-0401 www.internetlawcenter.net bkelley@internetlawcenter.net @InternetLawCent
  • 4.
  • 7.
  • 11.
  • 12. (Jan. 2011) (June 2010) (Dec 2010) (Dec. 2010)
  • 13. Class Action Litigation • Electronic Communications Privacy Act • Computer Fraud and Abuse Act Mortensen v. Bresnan Comm., CV 10-13-BLG-RFC (D. Mont. Dec. 13, 2010) (dismisses ECPA claim due to consent, CFAA claim survives)
  • 14. Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW – JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August 2009)
  • 15. Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW – JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August 2009)
  • 16.
  • 17. Big Nose strikes again by buzusa @ flickr
  • 18.
  • 19. Michelle Ward, aka The When I Grow Up Coach
  • 20. Hogette 1 – Micki James @ Flickr Michelle Ward, aka The When I Grow Up Coach
  • 21.
  • 22. Our report and law enforcement action send a clear message to industry: despite some good actors, self-regulation of privacy has not worked adequately and is not working adequately for Americans consumers. We deserve far better from the companies we entrust our data to, and industry, as a whole, must do better. FTC Chairman Jon Leibowitz
  • 23. Key Principles Privacy by Design Simplified Choice Greater Transparency
  • 24. Key Principles Privacy by Design Simplified Choice Greater Transparency
  • 25.
  • 26. • “The concept of do not track has not been endorsed by the commission or, in my judgment, even properly vetted yet. . . .” • Has “serious questions about the various do-not-track proposals. . . .” FTC Commissioner J. Thomas Rosch, Brand Week (Mar. 24, 2011)
  • 27. • Endorses baseline commercial data privacy principles that would fill any gaps in existing U.S. law; • Safe harbors against FTC enforcement for practices defined by baseline data privacy or self-regulatory codes; • Limited rulemaking authority over certain baseline fair information privacy practices principles if it is established that market failures require prescriptive regulatory action; and • National Data Breach Standards
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. All rise . . . Wednesdays at 10 AM PT WebmasterRadio.fm
  • 38. HOT HOT HOT TOPICS IN