SlideShare a Scribd company logo
1 of 39
Download to read offline
the individual
and technology
Section 3 - Individual and the State
Term 2/3 2013
Main Syllabus Points
Hint: This section connects with the theme “society
moves ahead as the law limps behind”
impacts of technology on the
individual
• Technology is often at the cutting edge of
development which often comes first before
decisions are made on making law.
• The main force changing law is the creation of the
internet – Over 1.5billion users in the world.
• Increase use of technology will raise privacy
issues e.g Google Earth Streetview
• Use of CCTV may act as a deterrent for crime
but may impede on individual privacy rights
Technology and Privacy
Click Here
• Cyberspace is a global
interconnection of millions
of computers over the
internet.
• No government or court
can claim cyberspace as its
exclusive jurisdiction
(power)
‘cyberspace’
coined by
William
Gibson
Jurisdiction of
cyberspace
Positives Negatives
Borderless system allowing
freedom of association
Increased Fraudulent/Corrupt
activity
Breaking down barriers
throughout the world
Difficult to enforce laws (cross
countries)
Debate on Cyberspace
• Should the Australian Government
introduce censorship to the internet in
the form of filtering out websites?
Discussion Point
internet filtering in australia
internet censorship
• Three distinct features of cyberspaces and challenges for legal
regulation
• 1.It facilitates anonymity
• easy to hide your real identity, creating pseudonyms
(avatars)
• IP addresses can be used to identify a computer, software
programs can be used to encrypt internet activity
Legal Issues in Cyberspace
internet filtering
• 2. It facilitates creativity
• The internet is a means of creating
your own work (blogs, websites,
social-networking)
• 3. It is global
• cyberspace lacks national
boundaries
• online communities can be found
throughout the whole world
• Internet fraud is the use of
the internet to misrepresent
or conceal information to
betray, deceive or mislead
• Unsolicited Email
• Pyramid Selling
• Phishing
• Nigerian Scam
Internet Fraud
• Spam is an unsolicited commercial
electronic communication, including
junk emails, SMS or instant messaging.
Internet Spam
Where did spam come from?
• Intellectual property refers to the creations of the mind
that have commercial value.
• e.g inventions, literary works, artistic works, software
programs
• Intellectual property is protected under many international
treaties
• In order for it to be protected the idea has to be developed
into something tangible – software program, essay or cd
Intellectual Property
• An exclusive right to
publish, copy, publicly
perform, broadcast, or make
an adaption of certain forms
of expression, namely
sounds, words or visual
expression
• Copyright Act 1968 (Cth)
Copyright
copyright around the world
• Many new challenges are
faced by Copyright laws
due to further digital
technology developments
and the enforceability of
such laws
• File Sharing
• Software Copyright
infringement
metallica and napster
• Signs or symbols that give a person or
corporation the legal right to use, license or
sell the product or service for which it is
registered
Trademarks
four chord song
• Rights granted for
any device, substance,
method or process
which is new,
inventive or useful
Patents
• Should file sharing be
legal in Australia?
Discussion Point
iinet v afact
• There are a number of ways individuals are
vulnerable in cyberspace:
• cyberbullying
• cyberstalking
• racial hatred
• exposure to violent, disturbing and/or illegal
material
• exposure to adult material
• intrusions into privacy
Privacy, safety and censorship
• The tendency to say and do things in cyberspace
that the person wouldn’t ordinarily say or do in
the face-to-face world
• rude language, harsh personal criticism, or violent
online games, threats, cyberbullying or
cyberstalking, racial hatred
• The Racial Hatred Act 1995 (Cth) protects any
forms of racial online vilification
Disinhibition Effect
Microchip technology
• All the types of information
about a person that he or she
has put onto the internet,
held in multiple locations
• Individuals have little
control over how the most
powerful search engines use
their information
Digital Dossier
privacy concerns
• Relates to how businesses should collect,
store, use and disclose personal information
• The Privacy Act needs to align itself with
modern issues in protecting individuals
The Privacy Act 1988 (Cth)
• Traditional bullying was
mainly physical and
occurred in the
playground, classroom and
walking home from school.
Now it occurs at home
using the internet.
• Online predators enticing
young people into harmful
encounters
Protecting children
cybercrime
• Currently the law can only set minimum
standards
• Protected under major international legislation
• Right to privacy
• Right to freedom of expression
• Certain limits are placed on domestic
enforcement of these rights
current legislation
• Crimes Act 1900 (NSW) –
crimes amendment
(computer offences) Act
2001 (NSW)
• Section 308 – computer
offences – hacking
• Spam Act 2003 (Cth)
Domestic Level
• Limited international treaties established
• The United Nations – Controls issues of
Intellectual Property through the agency World
Intellectual Property Organisation (WIPO)
• World Trade Organisation – Deals with issues
of intellectual property
• European Union – Convention on Cybercrime
(2001) – prevention of specific cybercrimes
International Level
• Governments are needed, to create an
environment where the rule of law prevails and
where law enforcement mechanisms will deter
those who break the law
• Governments who do not have regulated laws are
discouraging big business from operating in their
country
future directions
• Achieving perfect legal control is quite often just
too expensive
• Controlling content from internet service
providers
• Initiating financial intermediaries such as Paypal
• Making arrests of individuals suspected of
cybercrime
• Extraditing suspects from other countries
Strategies for Governments and Prosecution of
Individuals
internet revolution

More Related Content

What's hot

Nature of Crime
Nature of CrimeNature of Crime
Nature of CrimeMr Shipp
 
Responses to Problems in Family Relationships 2015
Responses to Problems in Family Relationships 2015Responses to Problems in Family Relationships 2015
Responses to Problems in Family Relationships 2015Mr Shipp
 
HSC Legal Studies - Young Offenders Topic
HSC Legal Studies - Young Offenders TopicHSC Legal Studies - Young Offenders Topic
HSC Legal Studies - Young Offenders TopicHSCLegalStudies
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminologyShaista Mariam
 
Classification of Law
Classification of LawClassification of Law
Classification of LawMr Shipp
 
Ch 19 Sentencing and Punishment
Ch 19 Sentencing and PunishmentCh 19 Sentencing and Punishment
Ch 19 Sentencing and Punishmentrharrisonaz
 
4a.law reform conditions
4a.law reform   conditions4a.law reform   conditions
4a.law reform conditionsHSCLegalStudies
 
Children and the Law
Children and the LawChildren and the Law
Children and the LawMr Shipp
 
THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006Mumbaikar Le
 
Nature of Human Rights
Nature of Human RightsNature of Human Rights
Nature of Human RightsMr Shipp
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Ch 13 Offenses Against Justice & Public Admin
Ch 13 Offenses Against Justice & Public AdminCh 13 Offenses Against Justice & Public Admin
Ch 13 Offenses Against Justice & Public Adminrharrisonaz
 

What's hot (20)

Nature of Crime
Nature of CrimeNature of Crime
Nature of Crime
 
Resources for hsc legal studies
Resources for hsc legal studiesResources for hsc legal studies
Resources for hsc legal studies
 
Responses to Problems in Family Relationships 2015
Responses to Problems in Family Relationships 2015Responses to Problems in Family Relationships 2015
Responses to Problems in Family Relationships 2015
 
HSC Legal Studies - Young Offenders Topic
HSC Legal Studies - Young Offenders TopicHSC Legal Studies - Young Offenders Topic
HSC Legal Studies - Young Offenders Topic
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminology
 
Classification of Law
Classification of LawClassification of Law
Classification of Law
 
Penology
PenologyPenology
Penology
 
Ch 19 Sentencing and Punishment
Ch 19 Sentencing and PunishmentCh 19 Sentencing and Punishment
Ch 19 Sentencing and Punishment
 
4a.law reform conditions
4a.law reform   conditions4a.law reform   conditions
4a.law reform conditions
 
Children and the Law
Children and the LawChildren and the Law
Children and the Law
 
Sentencing
SentencingSentencing
Sentencing
 
THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006
 
Nature of Human Rights
Nature of Human RightsNature of Human Rights
Nature of Human Rights
 
Victim's Rights
Victim's RightsVictim's Rights
Victim's Rights
 
Offenses relating to Public Order
Offenses relating to Public OrderOffenses relating to Public Order
Offenses relating to Public Order
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Ch 13 Offenses Against Justice & Public Admin
Ch 13 Offenses Against Justice & Public AdminCh 13 Offenses Against Justice & Public Admin
Ch 13 Offenses Against Justice & Public Admin
 
Organisation of prosecutors
Organisation of prosecutorsOrganisation of prosecutors
Organisation of prosecutors
 
Victims and offenders
Victims and offendersVictims and offenders
Victims and offenders
 

Similar to Individual and Technology

legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and SecuritiesNayan Dagliya
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoTAndres Guadamuz
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Othersnealbd
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Bases for legal systems
Bases for legal systemsBases for legal systems
Bases for legal systemsCourage Masuka
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimIGF Indonesia
 

Similar to Individual and Technology (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Bases for legal systems
Bases for legal systemsBases for legal systems
Bases for legal systems
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 

More from Mr Shipp

Nature of Consumers
Nature of ConsumersNature of Consumers
Nature of ConsumersMr Shipp
 
Sustainable biomes
Sustainable biomesSustainable biomes
Sustainable biomesMr Shipp
 
The Cooks River
The Cooks RiverThe Cooks River
The Cooks RiverMr Shipp
 
Ternary Graphs
Ternary GraphsTernary Graphs
Ternary GraphsMr Shipp
 
Biophysical Interactions and Functioning
Biophysical Interactions and FunctioningBiophysical Interactions and Functioning
Biophysical Interactions and FunctioningMr Shipp
 
Population Geography
Population GeographyPopulation Geography
Population GeographyMr Shipp
 
Political Geography
Political GeographyPolitical Geography
Political GeographyMr Shipp
 
Shipp's Six Sentence Structure
Shipp's Six Sentence StructureShipp's Six Sentence Structure
Shipp's Six Sentence StructureMr Shipp
 
Flexible Learning Space
Flexible Learning SpaceFlexible Learning Space
Flexible Learning SpaceMr Shipp
 
Boys Conference 2018 Presentation
Boys Conference 2018  PresentationBoys Conference 2018  Presentation
Boys Conference 2018 PresentationMr Shipp
 
Educational Leadership
Educational LeadershipEducational Leadership
Educational LeadershipMr Shipp
 
Our Economy
Our EconomyOur Economy
Our EconomyMr Shipp
 
Water in the World
Water in the WorldWater in the World
Water in the WorldMr Shipp
 
Contour Lines
Contour LinesContour Lines
Contour LinesMr Shipp
 
Latitude and Longitude
Latitude and Longitude Latitude and Longitude
Latitude and Longitude Mr Shipp
 
Synoptic Charts
Synoptic ChartsSynoptic Charts
Synoptic ChartsMr Shipp
 
Area and Grid References
Area and Grid ReferencesArea and Grid References
Area and Grid ReferencesMr Shipp
 
Scale - Geography Skill
Scale - Geography SkillScale - Geography Skill
Scale - Geography SkillMr Shipp
 
Landforms and Landscapes
Landforms and LandscapesLandforms and Landscapes
Landforms and LandscapesMr Shipp
 
Promoting and Enforcing Human Rights - HSC Legal Studies
Promoting and Enforcing Human Rights - HSC Legal StudiesPromoting and Enforcing Human Rights - HSC Legal Studies
Promoting and Enforcing Human Rights - HSC Legal StudiesMr Shipp
 

More from Mr Shipp (20)

Nature of Consumers
Nature of ConsumersNature of Consumers
Nature of Consumers
 
Sustainable biomes
Sustainable biomesSustainable biomes
Sustainable biomes
 
The Cooks River
The Cooks RiverThe Cooks River
The Cooks River
 
Ternary Graphs
Ternary GraphsTernary Graphs
Ternary Graphs
 
Biophysical Interactions and Functioning
Biophysical Interactions and FunctioningBiophysical Interactions and Functioning
Biophysical Interactions and Functioning
 
Population Geography
Population GeographyPopulation Geography
Population Geography
 
Political Geography
Political GeographyPolitical Geography
Political Geography
 
Shipp's Six Sentence Structure
Shipp's Six Sentence StructureShipp's Six Sentence Structure
Shipp's Six Sentence Structure
 
Flexible Learning Space
Flexible Learning SpaceFlexible Learning Space
Flexible Learning Space
 
Boys Conference 2018 Presentation
Boys Conference 2018  PresentationBoys Conference 2018  Presentation
Boys Conference 2018 Presentation
 
Educational Leadership
Educational LeadershipEducational Leadership
Educational Leadership
 
Our Economy
Our EconomyOur Economy
Our Economy
 
Water in the World
Water in the WorldWater in the World
Water in the World
 
Contour Lines
Contour LinesContour Lines
Contour Lines
 
Latitude and Longitude
Latitude and Longitude Latitude and Longitude
Latitude and Longitude
 
Synoptic Charts
Synoptic ChartsSynoptic Charts
Synoptic Charts
 
Area and Grid References
Area and Grid ReferencesArea and Grid References
Area and Grid References
 
Scale - Geography Skill
Scale - Geography SkillScale - Geography Skill
Scale - Geography Skill
 
Landforms and Landscapes
Landforms and LandscapesLandforms and Landscapes
Landforms and Landscapes
 
Promoting and Enforcing Human Rights - HSC Legal Studies
Promoting and Enforcing Human Rights - HSC Legal StudiesPromoting and Enforcing Human Rights - HSC Legal Studies
Promoting and Enforcing Human Rights - HSC Legal Studies
 

Individual and Technology

  • 1. the individual and technology Section 3 - Individual and the State Term 2/3 2013
  • 2. Main Syllabus Points Hint: This section connects with the theme “society moves ahead as the law limps behind”
  • 3. impacts of technology on the individual • Technology is often at the cutting edge of development which often comes first before decisions are made on making law. • The main force changing law is the creation of the internet – Over 1.5billion users in the world.
  • 4. • Increase use of technology will raise privacy issues e.g Google Earth Streetview • Use of CCTV may act as a deterrent for crime but may impede on individual privacy rights Technology and Privacy Click Here
  • 5. • Cyberspace is a global interconnection of millions of computers over the internet. • No government or court can claim cyberspace as its exclusive jurisdiction (power) ‘cyberspace’ coined by William Gibson Jurisdiction of cyberspace
  • 6. Positives Negatives Borderless system allowing freedom of association Increased Fraudulent/Corrupt activity Breaking down barriers throughout the world Difficult to enforce laws (cross countries) Debate on Cyberspace
  • 7. • Should the Australian Government introduce censorship to the internet in the form of filtering out websites? Discussion Point
  • 10. • Three distinct features of cyberspaces and challenges for legal regulation • 1.It facilitates anonymity • easy to hide your real identity, creating pseudonyms (avatars) • IP addresses can be used to identify a computer, software programs can be used to encrypt internet activity Legal Issues in Cyberspace
  • 12. • 2. It facilitates creativity • The internet is a means of creating your own work (blogs, websites, social-networking) • 3. It is global • cyberspace lacks national boundaries • online communities can be found throughout the whole world
  • 13. • Internet fraud is the use of the internet to misrepresent or conceal information to betray, deceive or mislead • Unsolicited Email • Pyramid Selling • Phishing • Nigerian Scam Internet Fraud
  • 14. • Spam is an unsolicited commercial electronic communication, including junk emails, SMS or instant messaging. Internet Spam
  • 15. Where did spam come from?
  • 16. • Intellectual property refers to the creations of the mind that have commercial value. • e.g inventions, literary works, artistic works, software programs • Intellectual property is protected under many international treaties • In order for it to be protected the idea has to be developed into something tangible – software program, essay or cd Intellectual Property
  • 17. • An exclusive right to publish, copy, publicly perform, broadcast, or make an adaption of certain forms of expression, namely sounds, words or visual expression • Copyright Act 1968 (Cth) Copyright
  • 18.
  • 20. • Many new challenges are faced by Copyright laws due to further digital technology developments and the enforceability of such laws • File Sharing • Software Copyright infringement
  • 22. • Signs or symbols that give a person or corporation the legal right to use, license or sell the product or service for which it is registered Trademarks
  • 24. • Rights granted for any device, substance, method or process which is new, inventive or useful Patents
  • 25. • Should file sharing be legal in Australia? Discussion Point
  • 27. • There are a number of ways individuals are vulnerable in cyberspace: • cyberbullying • cyberstalking • racial hatred • exposure to violent, disturbing and/or illegal material • exposure to adult material • intrusions into privacy Privacy, safety and censorship
  • 28. • The tendency to say and do things in cyberspace that the person wouldn’t ordinarily say or do in the face-to-face world • rude language, harsh personal criticism, or violent online games, threats, cyberbullying or cyberstalking, racial hatred • The Racial Hatred Act 1995 (Cth) protects any forms of racial online vilification Disinhibition Effect
  • 30. • All the types of information about a person that he or she has put onto the internet, held in multiple locations • Individuals have little control over how the most powerful search engines use their information Digital Dossier privacy concerns
  • 31. • Relates to how businesses should collect, store, use and disclose personal information • The Privacy Act needs to align itself with modern issues in protecting individuals The Privacy Act 1988 (Cth)
  • 32. • Traditional bullying was mainly physical and occurred in the playground, classroom and walking home from school. Now it occurs at home using the internet. • Online predators enticing young people into harmful encounters Protecting children
  • 34. • Currently the law can only set minimum standards • Protected under major international legislation • Right to privacy • Right to freedom of expression • Certain limits are placed on domestic enforcement of these rights current legislation
  • 35. • Crimes Act 1900 (NSW) – crimes amendment (computer offences) Act 2001 (NSW) • Section 308 – computer offences – hacking • Spam Act 2003 (Cth) Domestic Level
  • 36. • Limited international treaties established • The United Nations – Controls issues of Intellectual Property through the agency World Intellectual Property Organisation (WIPO) • World Trade Organisation – Deals with issues of intellectual property • European Union – Convention on Cybercrime (2001) – prevention of specific cybercrimes International Level
  • 37. • Governments are needed, to create an environment where the rule of law prevails and where law enforcement mechanisms will deter those who break the law • Governments who do not have regulated laws are discouraging big business from operating in their country future directions
  • 38. • Achieving perfect legal control is quite often just too expensive • Controlling content from internet service providers • Initiating financial intermediaries such as Paypal • Making arrests of individuals suspected of cybercrime • Extraditing suspects from other countries Strategies for Governments and Prosecution of Individuals