SlideShare a Scribd company logo
 	
  	
  
Internet	
  and	
  the	
  law:	
  protec0ng	
  yourself	
  
against	
  online	
  abuse	
  
Dr.	
  Emily	
  Laidlaw	
  
Faculty	
  of	
  Law	
  
University	
  of	
  Calgary	
  
	
  
June	
  21,	
  2016	
  
Emily	
  Laidlaw	
  
•  Assistant	
  professor	
  
•  Researches	
  in	
  the	
  areas	
  
of	
  informaEon	
  
technology,	
  copyright	
  
and	
  media	
  law,	
  human	
  
rights	
  and	
  corporate	
  
social	
  responsibility	
  
•  Has	
  a	
  parEcular	
  interest	
  
in	
  the	
  regulaEon	
  of	
  
intermediaries	
  and	
  the	
  
human	
  rights	
  impact	
  of	
  
new	
  technologies	
  
Outline	
  
•  The	
  Problem	
  
•  The	
  Law	
  
•  RegulaEon	
  by	
  Social	
  Networking	
  Providers	
  (SNPs)	
  
•  How	
  to	
  Protect	
  Yourself	
  
The	
  Problem	
  
What	
  is	
  Happening?	
  
Doxed	
  
SWATTed	
  
Revenge	
  
pornography	
  
Cyber-­‐flashing	
  Threats	
  
Mob	
  JusEce	
  
Harassment	
  
Stolen	
  
idenEEes	
  
Stalking	
  
Blackmail	
  
Offensiveness	
  
Hate	
  
Speech	
  
Shaming	
  
Invasions	
  of	
  
Privacy	
  
Lies	
  
Bullying	
  
What	
  is	
  bullying?	
  “[B]ehaviour	
  that	
  is	
  intended	
  to	
  
cause,	
  or	
  should	
  be	
  known	
  to	
  cause,	
  fear,	
  
inEmidaEon,	
  humiliaEon,	
  distress	
  or	
  other	
  forms	
  of	
  
harm	
  to	
  another	
  person’s	
  body,	
  feelings,	
  self-­‐
esteem,	
  reputaEon	
  or	
  property.”	
  	
  
Respec&ul	
  and	
  Responsible	
  Rela0onships:	
  There’s	
  No	
  App	
  for	
  That:	
  The	
  Report	
  of	
  
the	
  Nova	
  Sco0a	
  Task	
  Force	
  on	
  Bullying	
  and	
  Cyberbullying	
  (2012).	
  See	
  AB	
  v	
  Bragg	
  
Communica0ons	
  Inc,	
  2012	
  SCC	
  45,	
  para	
  	
  20	
  
Bullying	
  
	
  	
  	
  	
  
Rehtaeh
Parsons
	
  
Amanda Todd
Photo	
  source:	
  Wikepedia	
  
Bigotry	
  
	
  	
  	
  
Anita	
  
Sarkeesian	
  
Photo	
  source:	
  The	
  Verge	
  
Caroline-­‐Criado	
  Perez	
  
Photo	
  source:	
  The	
  Mirror	
  
Zoe	
  Quinn	
  
Photo	
  source:	
  gamesindustry.biz	
  
Gossiping	
  
Vigilantes	
  
Vigilan0sm	
  
Free	
  Speech	
  
•  American	
  approach	
  to	
  free	
  speech	
  is	
  the	
  
marketplace	
  of	
  ideas	
  
•  Greater	
  regulaEon	
  in	
  Europe	
  and	
  Canada	
  ie	
  hate	
  
speech	
  
•  How	
  to	
  deal	
  with	
  offense?	
  Offensive	
  jokes?	
  
Free	
  Speech	
  Eli0sm	
  
“Free	
  speech	
  eliEsm	
  is	
  the	
  pretense	
  that	
  “everyone”	
  
shares	
  equally	
  in	
  the	
  costs	
  and	
  benefits	
  of	
  unfehered	
  
expression,	
  when	
  in	
  reality	
  the	
  powerful	
  receive	
  the	
  
benefits	
  while	
  the	
  marginalized	
  bear	
  the	
  costs.	
  Free	
  
speech	
  eliEsts	
  urge	
  “tolerance”	
  for	
  toxic	
  expression	
  
because	
  they	
  know	
  the	
  burden	
  of	
  this	
  tolerance	
  will	
  
not	
  fall	
  on	
  them.”	
  Mary	
  Ann	
  Franks	
  (2014)	
  
Some	
  Stats	
  
•  40%	
  have	
  been	
  harassed	
  online	
  (Pew)	
  
•  73%	
  have	
  witnessed	
  harassment	
  online	
  (Pew)	
  
•  66%	
  on	
  social	
  networking	
  (Pew)	
  
•  Men	
  are	
  more	
  likely	
  than	
  women	
  to	
  be	
  harassed	
  ie	
  name	
  
calling,	
  but	
  the	
  more	
  severe	
  harassment	
  (stalking,	
  sexual	
  
harassment,	
  physical	
  threats	
  etc.)	
  are	
  against	
  women.	
  (Pew)	
  
•  70%	
  of	
  stalking	
  are	
  against	
  women	
  (US	
  JusEce	
  Department)	
  
•  Over	
  90%	
  of	
  revenge	
  pornography	
  target	
  women	
  (Citron)	
  
•  76%	
  of	
  women	
  under	
  30	
  have	
  experienced	
  online	
  abuse	
  
(Norton)	
  
The	
  Law	
  
The	
  Various	
  Laws	
  
Criminal	
  Code	
  
•  InEmate	
  Images	
  
•  Harassment	
  
•  Hate	
  Speech	
  
Civil	
  
•  Privacy	
  
•  DefamaEon	
  
•  Employment	
  
Terms	
  and	
  CondiEons	
  
•  OpEons:	
  
•  Criminal	
  prosecuEon	
  
•  Civil	
  case	
  
•  Seek	
  takedown	
  of	
  
content	
  from	
  host	
  
•  If	
  in	
  a	
  school	
  context,	
  
resoluEon	
  through	
  
school	
  
•  More	
  difficult:	
  
stopping	
  the	
  mob	
  
Criminal	
  
In0mate	
  Images	
  
PublicaEon,	
  etc.,	
  of	
  an	
  inEmate	
  image	
  without	
  consent	
  
162.1	
  (1)	
  Everyone	
  who	
  knowingly	
  publishes,	
  distributes,	
  
transmits,	
  sells,	
  makes	
  available	
  or	
  adverEses	
  an	
  inEmate	
  
image	
  of	
  a	
  person	
  knowing	
  that	
  the	
  person	
  depicted	
  in	
  the	
  
image	
  did	
  not	
  give	
  their	
  consent	
  to	
  that	
  conduct,	
  or	
  being	
  
reckless	
  as	
  to	
  whether	
  or	
  not	
  that	
  person	
  gave	
  their	
  
consent	
  to	
  that	
  conduct,	
  is	
  guilty	
  
(a)	
  of	
  an	
  indictable	
  offence	
  and	
  liable	
  to	
  imprisonment	
  for	
  a	
  
term	
  of	
  not	
  more	
  than	
  five	
  years;	
  or	
  
(b)	
  of	
  an	
  offence	
  punishable	
  on	
  summary	
  convicEon.	
  
Child	
  Pornography	
  
DistribuEon,	
  etc.	
  of	
  child	
  pornography	
  
163.1(3)	
  Every	
  person	
  who	
  transmits,	
  makes	
  
available,	
  distributes,	
  sells,	
  adverEses,	
  imports,	
  
exports	
  or	
  possesses	
  for	
  the	
  purpose	
  of	
  transmission,	
  
making	
  available,	
  distribuEon,	
  sale,	
  adverEsing	
  or	
  
exportaEon	
  any	
  child	
  pornography	
  is	
  guilty	
  of	
  an	
  
indictable	
  offence	
  and	
  liable	
  to	
  imprisonment	
  for	
  a	
  
term	
  of	
  not	
  more	
  than	
  14	
  years	
  and	
  to	
  a	
  minimum	
  
punishment	
  of	
  imprisonment	
  for	
  a	
  term	
  of	
  one	
  year.	
  
Criminal	
  Harassment	
  
What	
  cons0tutes	
  criminal	
  harassment?	
  
264	
  (2)	
  	
  
(a)	
  repeatedly	
  following	
  from	
  place	
  to	
  place	
  the	
  other	
  person	
  
or	
  anyone	
  known	
  to	
  them;	
  
(b)	
  repeatedly	
  communica0ng	
  with,	
  either	
  directly	
  or	
  
indirectly,	
  the	
  other	
  person	
  or	
  anyone	
  known	
  to	
  them;	
  
(c)	
  besepng	
  or	
  watching	
  the	
  dwelling-­‐house,	
  or	
  place	
  where	
  
the	
  other	
  person,	
  or	
  anyone	
  known	
  to	
  them,	
  resides,	
  works,	
  
carries	
  on	
  business	
  or	
  happens	
  to	
  be;	
  or	
  
(d)	
  engaging	
  in	
  threatening	
  conduct	
  directed	
  at	
  the	
  other	
  
person	
  or	
  any	
  member	
  of	
  their	
  family.	
  
	
  
Criminal	
  Harassment	
  
Recent	
  case:	
  
•  R	
  v	
  EllioK,	
  2016	
  ONCJ	
  35	
  
	
  
Involving	
  poli0cians	
  
•  ConvicEon	
  of	
  Damany	
  Skeene	
  for	
  harassment	
  of	
  
MP	
  Michelle	
  Rempel	
  2015	
  
•  Complaints	
  of	
  MLA	
  Deborah	
  Drever	
  
Hate	
  Speech	
  
•  Only	
  opEon	
  is	
  criminal	
  prosecuEon	
  under	
  S.	
  318-­‐319	
  Criminal	
  Code	
  
for	
  public	
  incitement	
  of	
  hatred	
  or	
  wilful	
  promoEon	
  of	
  hatred	
  
•  No	
  complaint	
  possible	
  under	
  human	
  rights	
  legislaEon:	
  
•  s.	
  13	
  hate	
  speech	
  provision	
  in	
  the	
  Canada	
  Human	
  Rights	
  Act	
  
repealed	
  
Mob	
  Persecu0on	
  
•  “I	
  remember	
  sipng	
  in	
  my	
  flat,	
  watching	
  all	
  these	
  
threats	
  roll	
  in,	
  and	
  it	
  was	
  horrifying,	
  uherly	
  
shocking	
  and	
  scary.	
  I	
  didn’t	
  know	
  who	
  these	
  people	
  
were	
  and	
  what	
  they	
  were	
  capable	
  of.	
  It	
  was	
  
relentless.”	
  Caroline	
  Criado-­‐Perez	
  	
  
•  “I	
  felt	
  like	
  every	
  layer	
  of	
  my	
  skin	
  and	
  my	
  idenEty	
  
were	
  ripped	
  off	
  of	
  me	
  in	
  ’98	
  and	
  ’99,”	
  she	
  tells	
  me	
  
now.	
  “It’s	
  a	
  skinning	
  of	
  sorts.	
  You	
  feel	
  incredibly	
  
raw	
  and	
  frightened.	
  But	
  I	
  also	
  feel	
  like	
  the	
  shame	
  
sEcks	
  to	
  you	
  like	
  tar.”	
  Monica	
  Lewinsky	
  
Criminalizing	
  offence?	
  Cau0onary	
  Tale:	
  
Chambers	
  v	
  DPP	
  
Paul	
  Chambers:	
  15	
  January	
  
2010	
  “Crap!	
  Robin	
  Hood	
  
airport	
  is	
  closed.	
  You’ve	
  got	
  
a	
  week	
  and	
  a	
  bit	
  to	
  get	
  your	
  
shit	
  together	
  otherwise	
  I	
  am	
  
blowing	
  the	
  airport	
  sky	
  
high!”	
  
	
  
Criminalize	
  “low	
  level	
  
speech”	
  (Jacob	
  
RowboYom)	
  
Communica0ons	
  Act 	
  	
  
Malicious	
  
CommunicaEons	
  
Public	
  Order	
  Act	
  
ProtecEon	
  from	
  
Harassment	
  
Act	
  etc.	
  
Criminalizing	
  bullying	
  –	
  is	
  it	
  effec0ve?	
  
•  Most	
  experts	
  agree	
  that	
  criminalizing	
  most	
  bullying	
  
is	
  not	
  effecEve	
  
•  MulE-­‐prong	
  approach	
  
•  EducaEon	
  
•  Does	
  criminalizing	
  cyber-­‐bullying	
  help	
  prevent	
  
bullying	
  of	
  kids?	
  
•  Experts	
  fear	
  kids	
  won’t	
  report	
  as	
  don’t	
  want	
  to	
  make	
  a	
  
big	
  deal	
  out	
  it	
  
•  No	
  deterrence	
  value	
  if	
  kids	
  don’t	
  know	
  the	
  law	
  
•  BUT,	
  seemingly	
  limited	
  reach	
  of	
  schools	
  outside	
  the	
  
school	
  yard	
  
Civil	
  
Streisand	
  Effect	
  
Defama0on	
  
	
  
“DefamaEon	
  is	
  a	
  publicaEon	
  of	
  an	
  untrue	
  statement	
  
about	
  a	
  person	
  that	
  tends	
  to	
  lower	
  his	
  reputaEon	
  in	
  
the	
  opinion	
  of	
  ‘right-­‐thinking	
  members	
  of	
  the	
  
community’”	
  Lord	
  Atkin	
  
	
  
	
  
Defama0on	
  and	
  Social	
  Media	
  
1. If	
  you	
  want	
  the	
  content	
  taken	
  down,	
  contact	
  the	
  
poster	
  directly	
  (maybe,	
  beware	
  trolls),	
  or	
  contact	
  the	
  
host	
  
2. If	
  the	
  host	
  refuses	
  to	
  take	
  down	
  the	
  content,	
  you	
  may	
  
have	
  a	
  cause	
  of	
  acEon	
  against	
  the	
  host,	
  if	
  the	
  host	
  is	
  
Canadian-­‐based	
  
3. If	
  the	
  host	
  is	
  American-­‐based,	
  you	
  will	
  not	
  have	
  a	
  
cause	
  of	
  acEon,	
  nor	
  will	
  you	
  likely	
  be	
  able	
  to	
  enforce	
  a	
  
Canadian	
  judgment	
  
4. Note	
  the	
  problems	
  of	
  anonymity	
  
5. Cost	
  
6. Search	
  results:	
  contact	
  Google	
  for	
  delisEng	
  
Defama0on	
  and	
  Social	
  Media	
  
	
  
Pritchard	
  v	
  Van	
  Nes,	
  2016	
  BCSC	
  
686:	
  liable	
  for	
  comments	
  of	
  
friends	
  on	
  Facebook	
  
(see	
  my	
  post	
  on	
  ablawg.ca	
  for	
  
more)	
  
Baglow	
  v	
  Smith,	
  
2015	
  ONSC	
  1175:	
  
comments	
  online	
  
and	
  off	
  aren’t	
  
treated	
  differently	
  
Crookes	
  v	
  Newton,	
  
2011	
  SCC	
  47:	
  no	
  
liability	
  for	
  mere	
  
provision	
  of	
  
hyperlinks	
  
Privacy	
  
•  If	
  private	
  picture	
  posted	
  
of	
  you	
  without	
  your	
  
consent:	
  
•  Contact	
  the	
  host	
  for	
  
content	
  removal.	
  
•  Sue	
  for	
  invasion	
  of	
  
privacy:	
  
•  Intrusion	
  on	
  seclusion;	
  
•  Disclosure	
  of	
  
embarrassing	
  facts;	
  
Online	
  Shaming	
  and	
  Humilia0on	
  
•  Privacy,	
  whether	
  in	
  law	
  or	
  otherwise,	
  needs	
  to	
  
beher	
  account	
  for	
  public	
  humiliaEon	
  
•  Raises	
  issues	
  of:	
  
•  Privacy	
  as	
  protecEon	
  of	
  dignity	
  versus	
  autonomy	
  
•  Privacy	
  in	
  public	
  
•  The	
  social	
  dimension	
  of	
  privacy	
  
	
  	
  
Employment	
  Law	
  
•  See	
  David	
  Mangan,	
  “A	
  Platorm	
  for	
  Discipline:	
  Social	
  Media	
  Speech	
  
and	
  the	
  Workplace”,	
  available	
  on	
  www.ssrn.com	
  	
  
1.  Employment	
  law	
  broadly	
  accepts	
  potenEal	
  harm	
  to	
  business	
  
reputaEon	
  as	
  jusEficaEon	
  for	
  terminaEon	
  or	
  discipline	
  
2.  Social	
  media	
  policies	
  ouen	
  are	
  broadly	
  draued	
  so	
  that	
  any	
  social	
  
media	
  use	
  that	
  reflects	
  poorly	
  on	
  the	
  company	
  can	
  lead	
  to	
  discipline	
  
•  ConsideraEons	
  in	
  Canada:	
  
•  Privacy	
  sepngs	
  
•  Sustained	
  rant	
  or	
  one-­‐off	
  
•  Look	
  for	
  something	
  more	
  than	
  griping	
  
•  Toxic	
  comments	
  
•  Acknowledgement	
  of	
  wrongdoing	
  
Terms	
  and	
  Condi0ons	
  
Facebook	
  Policies	
  
Facebook	
  Community	
  Standards:	
  
	
  
“We	
  allow	
  you	
  to	
  speak	
  freely	
  on	
  mahers	
  and	
  people	
  
of	
  public	
  interest,	
  but	
  remove	
  content	
  that	
  appears	
  
to	
  purposefully	
  target	
  private	
  individuals	
  with	
  the	
  
intenEon	
  of	
  degrading	
  or	
  shaming	
  them.”	
  
	
  
•  Ban	
  ie.	
  
•  Hate	
  speech	
  
•  Revenge	
  pornography	
  
•  Process:	
  
•  Report	
  abuse	
  link	
  
•  EducaEon	
  space	
  
•  Social	
  reporEng	
  
TwiYer	
  Policies	
  
•  Previous	
  Abusive	
  behaviour	
  policy:	
  	
  	
  
“Twiher	
  does	
  not	
  screen	
  content	
  and	
  does	
  not	
  remove	
  potenEally	
  
offensive	
  content	
  unless	
  such	
  content	
  is	
  in	
  violaEon	
  of	
  the	
  Twiher	
  
Rules	
  and	
  Terms	
  of	
  Service.”	
  
•  Now:	
  
“We	
  believe	
  in	
  freedom	
  of	
  expression	
  and	
  in	
  speaking	
  truth	
  to	
  
power,	
  but	
  that	
  means	
  lihle	
  as	
  an	
  underlying	
  philosophy	
  if	
  voices	
  
are	
  silenced	
  because	
  people	
  are	
  afraid	
  to	
  speak	
  up.	
  In	
  order	
  to	
  
ensure	
  that	
  people	
  feel	
  safe	
  expressing	
  diverse	
  opinions	
  and	
  
beliefs,	
  we	
  do	
  not	
  tolerate	
  behavior	
  that	
  crosses	
  the	
  line	
  into	
  
abuse,	
  including	
  behavior	
  that	
  harasses,	
  inEmidates,	
  or	
  uses	
  fear	
  to	
  
silence	
  another	
  user’s	
  voice.”	
  
TwiYer	
  Policies	
  
•  The	
  following	
  might	
  lead	
  to	
  temporary	
  blocking	
  of	
  
accounts	
  or	
  permanent	
  suspension:	
  
1.  Violent	
  threats	
  
2.  Harassment	
  
3.  Hateful	
  conduct	
  (restricted	
  to	
  promoEon	
  of	
  violence,	
  
threats	
  or	
  direct	
  ahacks)	
  
4.  MulEple	
  Accounts	
  
5.  Private	
  informaEon	
  (including	
  inEmate	
  images)	
  
6.  ImpersonaEon	
  
7.  Self-­‐harm	
  
	
  
Assessment	
  of	
  Complaint	
  	
  
Mechanisms	
  
• Pros	
  
-­‐ Cheap	
  
-­‐ Fast	
  
-­‐ TransnaEonal	
  
• Cons	
  
-­‐ First	
  Amendment	
  based	
  
-­‐ Lack	
  of	
  transparency	
  
-­‐ Lack	
  of	
  robust	
  complaints	
  mechanism	
  	
  
How	
  to	
  Protect	
  Yourself	
  Online	
  
How	
  to	
  Protect	
  Yourself	
  Online	
  
Your	
  Conduct	
  Online	
  
1.  Be	
  kind	
  
2.  Consider	
  your	
  audience.	
  Don’t	
  say	
  anything	
  
online	
  that	
  you	
  wouldn’t	
  want	
  your	
  employer	
  to	
  
see	
  
3.  Check,	
  re-­‐check	
  your	
  privacy	
  sepngs	
  
4.  If	
  you	
  are	
  abused	
  online,	
  it	
  is	
  not	
  your	
  fault	
  
How	
  to	
  Protect	
  Yourself	
  Online	
  
If	
  you	
  are	
  abused	
  online	
  
1.  If	
  you	
  have	
  been	
  threatened,	
  stalked,	
  harassed,	
  or	
  inEmate	
  
images	
  of	
  you	
  shared,	
  contact	
  the	
  police	
  
2.  If	
  you	
  are	
  a	
  minor,	
  and	
  this	
  involves	
  people	
  in	
  your	
  school	
  or	
  
community	
  organizaEon,	
  contact	
  your	
  school/organizaEon.	
  
Talk	
  to	
  your	
  parents	
  or	
  another	
  trusted	
  adult	
  
3.  If	
  appropriate	
  in	
  the	
  circumstances,	
  tell	
  the	
  person/people	
  to	
  
stop	
  the	
  abuse	
  
4.  Report	
  the	
  abuse	
  to	
  the	
  content	
  host	
  to	
  (a)	
  have	
  it	
  removed	
  
and	
  (b)	
  discipline	
  the	
  user	
  
5.  Report	
  the	
  abuse	
  to	
  Google	
  to	
  potenEally	
  remove	
  from	
  search	
  
results	
  
6.  Scrub	
  the	
  content	
  from	
  search	
  results	
  ie	
  
hhps://www.reputaEon.ca	
  	
  
Upcoming	
  webinars	
  
•  How	
  childhood	
  cancer	
  affects	
  families,	
  June	
  23,	
  
10-­‐11	
  a.m.	
  MST	
  
•  AuEsm	
  Spectrum	
  Disorder:	
  Early	
  detecEon,	
  
resilience	
  and	
  growing	
  into	
  adulthood,	
  June	
  28,	
  
12-­‐1	
  p.m.	
  MST	
  
•  Healthy	
  aging	
  and	
  memory,	
  June	
  29,	
  12-­‐1	
  p.m.	
  MST	
  
•  ParenEng:	
  Gepng	
  it	
  right,	
  June	
  30,	
  10-­‐11	
  a.m.	
  MST	
  
Thank	
  you	
  
Sign	
  up	
  for	
  other	
  UCalgary	
  webinars,	
  
download	
  our	
  eBooks,	
  
and	
  watch	
  videos	
  on	
  the	
  outcomes	
  of	
  our	
  
scholars’	
  research	
  at	
  
ucalgary.ca/explore/collecEons	
  
	
  
Other	
  webinar	
  topics	
  
	
  
	
  
For	
  ideas	
  on	
  other	
  UCalgary	
  webinar	
  topics,	
  
please	
  email	
  us	
  at	
  
exploreucalgary@ucalgary.ca	
  

More Related Content

What's hot

Defamation on the internet
Defamation on the internetDefamation on the internet
Defamation on the internetginakessler
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
ryangregory55
 
6 pornography
6 pornography6 pornography
6 pornography
Anna Salter
 
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
Muhammad Nabeel Musharraf
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?cloestead
 
Social media law
Social media law Social media law
Social media law
Matt J. Duffy
 
Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornographyhinpr18
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Center for Sustainable Journalism at Kennesaw State University
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
Frederick Lane
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
SAMBIT SWAIN
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad ideaPJG123
 
Pornography
PornographyPornography
Pornography
Akbar Kiani
 
Pornography essay
Pornography essayPornography essay
Pornography essay
Pablo Echeverria
 
Online pornography
Online pornographyOnline pornography
Online pornography
Morgane Mahler
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
Jason Nathu
 
Defamation
DefamationDefamation
Hate Crimes On Campus
Hate Crimes On CampusHate Crimes On Campus
Hate Crimes On Campus
Mark Litwa
 

What's hot (19)

Online Defamation
Online DefamationOnline Defamation
Online Defamation
 
Defamation on the internet
Defamation on the internetDefamation on the internet
Defamation on the internet
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
6 pornography
6 pornography6 pornography
6 pornography
 
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
Don't Hate - Debate! (Freedom of Speech) || Australian Islamic Library || www...
 
Hate speech
Hate speechHate speech
Hate speech
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?
 
Social media law
Social media law Social media law
Social media law
 
Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad idea
 
Pornography
PornographyPornography
Pornography
 
Pornography essay
Pornography essayPornography essay
Pornography essay
 
Online pornography
Online pornographyOnline pornography
Online pornography
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
 
Defamation
DefamationDefamation
Defamation
 
Hate Crimes On Campus
Hate Crimes On CampusHate Crimes On Campus
Hate Crimes On Campus
 

Viewers also liked

New media technologies
New media technologiesNew media technologies
New media technologies
GeoffKane
 
Pap per battery
Pap per batteryPap per battery
Pap per battery
Selvakumar Selva
 
Usage patterns based security attacks for smart devices
Usage patterns based security attacks for smart devicesUsage patterns based security attacks for smart devices
Usage patterns based security attacks for smart devices
Soumya Kanti Datta
 
Wilson-Hurd: Company Overview
Wilson-Hurd: Company OverviewWilson-Hurd: Company Overview
Wilson-Hurd: Company Overview
WilsonHurd
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detection
Nagendra Kumar
 
Examinee's Guide in Taking CSE-PPT (Ballpen-based)
Examinee's Guide in Taking CSE-PPT (Ballpen-based)Examinee's Guide in Taking CSE-PPT (Ballpen-based)
Examinee's Guide in Taking CSE-PPT (Ballpen-based)
John Homer Alim
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Mohit Pandey
 
Spyware
SpywareSpyware
Paper battery presentation by vikas
Paper battery presentation by vikasPaper battery presentation by vikas
Paper battery presentation by vikasVikas Gupta
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
Paper battery
Paper batteryPaper battery
Paper battery
Sivananda Reddy
 
Paper Battery PPT
Paper Battery PPTPaper Battery PPT
Paper Battery PPT
Rajnish Kumar Singh
 
GIFI
GIFI GIFI
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
manish katara
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
Sumit Thakur
 

Viewers also liked (19)

New media technologies
New media technologiesNew media technologies
New media technologies
 
Pap per battery
Pap per batteryPap per battery
Pap per battery
 
Usage patterns based security attacks for smart devices
Usage patterns based security attacks for smart devicesUsage patterns based security attacks for smart devices
Usage patterns based security attacks for smart devices
 
Wilson-Hurd: Company Overview
Wilson-Hurd: Company OverviewWilson-Hurd: Company Overview
Wilson-Hurd: Company Overview
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detection
 
Examinee's Guide in Taking CSE-PPT (Ballpen-based)
Examinee's Guide in Taking CSE-PPT (Ballpen-based)Examinee's Guide in Taking CSE-PPT (Ballpen-based)
Examinee's Guide in Taking CSE-PPT (Ballpen-based)
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Paper battery presentation by vikas
Paper battery presentation by vikasPaper battery presentation by vikas
Paper battery presentation by vikas
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
spyware
spywarespyware
spyware
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Paper Battery PPT
Paper Battery PPTPaper Battery PPT
Paper Battery PPT
 
GIFI
GIFI GIFI
GIFI
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Paper battery
Paper batteryPaper battery
Paper battery
 

Similar to Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily Laidlaw, University of Calgary

Defining Censorship
Defining CensorshipDefining Censorship
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Brian Markle
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
SWEET SPOT ACADEMY
 
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Amit Sheth
 
Combating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it RightCombating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it Right
Byron Olivere
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibility
Stephen Carrick-Davies
 
Rape culture and_media[1]
Rape culture and_media[1]Rape culture and_media[1]
Rape culture and_media[1]Karoline Khamis
 
Rape culture and_media[1]
Rape culture and_media[1]Rape culture and_media[1]
Rape culture and_media[1]Karoline Khamis
 
Meeting the challenge of child sexual abuse
Meeting the challenge of child sexual abuseMeeting the challenge of child sexual abuse
Meeting the challenge of child sexual abuse
University of Salford
 
Slut Shaming, Victim Blaming and Harassment on Social Media
Slut Shaming, Victim Blaming and Harassment on Social MediaSlut Shaming, Victim Blaming and Harassment on Social Media
Slut Shaming, Victim Blaming and Harassment on Social Media
Bailey Parnell
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryanshjaffe
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Web Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From HereWeb Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From Here
Shireen Mitchell
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
Gender Equality: Realities in Lieu of UN Sustainable Development GoalsGender Equality: Realities in Lieu of UN Sustainable Development Goals
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
AzjaFrench
 
Agent awf hate crime initial
Agent awf hate crime initialAgent awf hate crime initial
Agent awf hate crime initial
aealey
 
Sexuality & Deviance
Sexuality & DevianceSexuality & Deviance
Sexuality & Deviance
Tiffany Buchanan
 

Similar to Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily Laidlaw, University of Calgary (20)

Defining Censorship
Defining CensorshipDefining Censorship
Defining Censorship
 
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
Unmasking the Shadows: Exploring the Depths of Cyberbullying and Criminal Har...
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
Combating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it RightCombating Human Trafficking in the USA and investigating it Right
Combating Human Trafficking in the USA and investigating it Right
 
Munch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibilityMunch, poke, ping! understanding the language of safety and responsibility
Munch, poke, ping! understanding the language of safety and responsibility
 
Rape culture and_media[1]
Rape culture and_media[1]Rape culture and_media[1]
Rape culture and_media[1]
 
Rape culture and_media[1]
Rape culture and_media[1]Rape culture and_media[1]
Rape culture and_media[1]
 
Meeting the challenge of child sexual abuse
Meeting the challenge of child sexual abuseMeeting the challenge of child sexual abuse
Meeting the challenge of child sexual abuse
 
Slut Shaming, Victim Blaming and Harassment on Social Media
Slut Shaming, Victim Blaming and Harassment on Social MediaSlut Shaming, Victim Blaming and Harassment on Social Media
Slut Shaming, Victim Blaming and Harassment on Social Media
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryan
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Web Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From HereWeb Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From Here
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
Gender Equality: Realities in Lieu of UN Sustainable Development GoalsGender Equality: Realities in Lieu of UN Sustainable Development Goals
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Agent awf hate crime initial
Agent awf hate crime initialAgent awf hate crime initial
Agent awf hate crime initial
 
Sexuality & Deviance
Sexuality & DevianceSexuality & Deviance
Sexuality & Deviance
 

More from University of Calgary

COVID-19 support webinar - Managing ADHD during isolation
COVID-19 support webinar - Managing ADHD during isolationCOVID-19 support webinar - Managing ADHD during isolation
COVID-19 support webinar - Managing ADHD during isolation
University of Calgary
 
Voter's bootcamp
Voter's bootcampVoter's bootcamp
Voter's bootcamp
University of Calgary
 
Learning to tread lightly in the boreal forest
Learning to tread lightly in the boreal forestLearning to tread lightly in the boreal forest
Learning to tread lightly in the boreal forest
University of Calgary
 
Aging well: Are you prepared?
Aging well: Are you prepared?Aging well: Are you prepared?
Aging well: Are you prepared?
University of Calgary
 
Elections in the digital age
Elections in the digital ageElections in the digital age
Elections in the digital age
University of Calgary
 
Power and collective resistance
Power and collective resistancePower and collective resistance
Power and collective resistance
University of Calgary
 
Women in politics: Access, impact and outcomes
Women in politics: Access, impact and outcomes Women in politics: Access, impact and outcomes
Women in politics: Access, impact and outcomes
University of Calgary
 
7 Steps to an international strategy implementation
7 Steps to an international strategy implementation7 Steps to an international strategy implementation
7 Steps to an international strategy implementation
University of Calgary
 
Let food be thy medicine: Diet and disease
Let food be thy medicine: Diet and diseaseLet food be thy medicine: Diet and disease
Let food be thy medicine: Diet and disease
University of Calgary
 
Overcoming anxiety in schools
Overcoming anxiety in schoolsOvercoming anxiety in schools
Overcoming anxiety in schools
University of Calgary
 
The roots of anxiety
The roots of anxietyThe roots of anxiety
The roots of anxiety
University of Calgary
 
Cannabis legalization and youth
Cannabis legalization and youthCannabis legalization and youth
Cannabis legalization and youth
University of Calgary
 
What does legalized cannabis mean for Canadians?
What does legalized cannabis mean for Canadians?What does legalized cannabis mean for Canadians?
What does legalized cannabis mean for Canadians?
University of Calgary
 
Technology and gaming in education
Technology and gaming in educationTechnology and gaming in education
Technology and gaming in education
University of Calgary
 
Top tips to build student teams that excel
Top tips to build student teams that excelTop tips to build student teams that excel
Top tips to build student teams that excel
University of Calgary
 
Preparing students for the unknown
Preparing students for the unknownPreparing students for the unknown
Preparing students for the unknown
University of Calgary
 
Energy and environment: Are our laws keeping up?
Energy and environment: Are our laws keeping up?Energy and environment: Are our laws keeping up?
Energy and environment: Are our laws keeping up?
University of Calgary
 
Leaving carbon behind
Leaving carbon behindLeaving carbon behind
Leaving carbon behind
University of Calgary
 
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
University of Calgary
 
Are we ready to flip the switch on clean energy?
Are we ready to flip the switch on clean energy?Are we ready to flip the switch on clean energy?
Are we ready to flip the switch on clean energy?
University of Calgary
 

More from University of Calgary (20)

COVID-19 support webinar - Managing ADHD during isolation
COVID-19 support webinar - Managing ADHD during isolationCOVID-19 support webinar - Managing ADHD during isolation
COVID-19 support webinar - Managing ADHD during isolation
 
Voter's bootcamp
Voter's bootcampVoter's bootcamp
Voter's bootcamp
 
Learning to tread lightly in the boreal forest
Learning to tread lightly in the boreal forestLearning to tread lightly in the boreal forest
Learning to tread lightly in the boreal forest
 
Aging well: Are you prepared?
Aging well: Are you prepared?Aging well: Are you prepared?
Aging well: Are you prepared?
 
Elections in the digital age
Elections in the digital ageElections in the digital age
Elections in the digital age
 
Power and collective resistance
Power and collective resistancePower and collective resistance
Power and collective resistance
 
Women in politics: Access, impact and outcomes
Women in politics: Access, impact and outcomes Women in politics: Access, impact and outcomes
Women in politics: Access, impact and outcomes
 
7 Steps to an international strategy implementation
7 Steps to an international strategy implementation7 Steps to an international strategy implementation
7 Steps to an international strategy implementation
 
Let food be thy medicine: Diet and disease
Let food be thy medicine: Diet and diseaseLet food be thy medicine: Diet and disease
Let food be thy medicine: Diet and disease
 
Overcoming anxiety in schools
Overcoming anxiety in schoolsOvercoming anxiety in schools
Overcoming anxiety in schools
 
The roots of anxiety
The roots of anxietyThe roots of anxiety
The roots of anxiety
 
Cannabis legalization and youth
Cannabis legalization and youthCannabis legalization and youth
Cannabis legalization and youth
 
What does legalized cannabis mean for Canadians?
What does legalized cannabis mean for Canadians?What does legalized cannabis mean for Canadians?
What does legalized cannabis mean for Canadians?
 
Technology and gaming in education
Technology and gaming in educationTechnology and gaming in education
Technology and gaming in education
 
Top tips to build student teams that excel
Top tips to build student teams that excelTop tips to build student teams that excel
Top tips to build student teams that excel
 
Preparing students for the unknown
Preparing students for the unknownPreparing students for the unknown
Preparing students for the unknown
 
Energy and environment: Are our laws keeping up?
Energy and environment: Are our laws keeping up?Energy and environment: Are our laws keeping up?
Energy and environment: Are our laws keeping up?
 
Leaving carbon behind
Leaving carbon behindLeaving carbon behind
Leaving carbon behind
 
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
Climate change in Canada's Arctic: Impacts on Inuit communities and marine ec...
 
Are we ready to flip the switch on clean energy?
Are we ready to flip the switch on clean energy?Are we ready to flip the switch on clean energy?
Are we ready to flip the switch on clean energy?
 

Recently uploaded

Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 

Recently uploaded (20)

Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 

Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily Laidlaw, University of Calgary

  • 1.       Internet  and  the  law:  protec0ng  yourself   against  online  abuse   Dr.  Emily  Laidlaw   Faculty  of  Law   University  of  Calgary     June  21,  2016  
  • 2. Emily  Laidlaw   •  Assistant  professor   •  Researches  in  the  areas   of  informaEon   technology,  copyright   and  media  law,  human   rights  and  corporate   social  responsibility   •  Has  a  parEcular  interest   in  the  regulaEon  of   intermediaries  and  the   human  rights  impact  of   new  technologies  
  • 3. Outline   •  The  Problem   •  The  Law   •  RegulaEon  by  Social  Networking  Providers  (SNPs)   •  How  to  Protect  Yourself  
  • 5. What  is  Happening?   Doxed   SWATTed   Revenge   pornography   Cyber-­‐flashing  Threats   Mob  JusEce   Harassment   Stolen   idenEEes   Stalking   Blackmail   Offensiveness   Hate   Speech   Shaming   Invasions  of   Privacy   Lies  
  • 6. Bullying   What  is  bullying?  “[B]ehaviour  that  is  intended  to   cause,  or  should  be  known  to  cause,  fear,   inEmidaEon,  humiliaEon,  distress  or  other  forms  of   harm  to  another  person’s  body,  feelings,  self-­‐ esteem,  reputaEon  or  property.”     Respec&ul  and  Responsible  Rela0onships:  There’s  No  App  for  That:  The  Report  of   the  Nova  Sco0a  Task  Force  on  Bullying  and  Cyberbullying  (2012).  See  AB  v  Bragg   Communica0ons  Inc,  2012  SCC  45,  para    20  
  • 7. Bullying           Rehtaeh Parsons   Amanda Todd Photo  source:  Wikepedia  
  • 8. Bigotry         Anita   Sarkeesian   Photo  source:  The  Verge   Caroline-­‐Criado  Perez   Photo  source:  The  Mirror   Zoe  Quinn   Photo  source:  gamesindustry.biz  
  • 11. Free  Speech   •  American  approach  to  free  speech  is  the   marketplace  of  ideas   •  Greater  regulaEon  in  Europe  and  Canada  ie  hate   speech   •  How  to  deal  with  offense?  Offensive  jokes?  
  • 12. Free  Speech  Eli0sm   “Free  speech  eliEsm  is  the  pretense  that  “everyone”   shares  equally  in  the  costs  and  benefits  of  unfehered   expression,  when  in  reality  the  powerful  receive  the   benefits  while  the  marginalized  bear  the  costs.  Free   speech  eliEsts  urge  “tolerance”  for  toxic  expression   because  they  know  the  burden  of  this  tolerance  will   not  fall  on  them.”  Mary  Ann  Franks  (2014)  
  • 13. Some  Stats   •  40%  have  been  harassed  online  (Pew)   •  73%  have  witnessed  harassment  online  (Pew)   •  66%  on  social  networking  (Pew)   •  Men  are  more  likely  than  women  to  be  harassed  ie  name   calling,  but  the  more  severe  harassment  (stalking,  sexual   harassment,  physical  threats  etc.)  are  against  women.  (Pew)   •  70%  of  stalking  are  against  women  (US  JusEce  Department)   •  Over  90%  of  revenge  pornography  target  women  (Citron)   •  76%  of  women  under  30  have  experienced  online  abuse   (Norton)  
  • 15. The  Various  Laws   Criminal  Code   •  InEmate  Images   •  Harassment   •  Hate  Speech   Civil   •  Privacy   •  DefamaEon   •  Employment   Terms  and  CondiEons   •  OpEons:   •  Criminal  prosecuEon   •  Civil  case   •  Seek  takedown  of   content  from  host   •  If  in  a  school  context,   resoluEon  through   school   •  More  difficult:   stopping  the  mob  
  • 17. In0mate  Images   PublicaEon,  etc.,  of  an  inEmate  image  without  consent   162.1  (1)  Everyone  who  knowingly  publishes,  distributes,   transmits,  sells,  makes  available  or  adverEses  an  inEmate   image  of  a  person  knowing  that  the  person  depicted  in  the   image  did  not  give  their  consent  to  that  conduct,  or  being   reckless  as  to  whether  or  not  that  person  gave  their   consent  to  that  conduct,  is  guilty   (a)  of  an  indictable  offence  and  liable  to  imprisonment  for  a   term  of  not  more  than  five  years;  or   (b)  of  an  offence  punishable  on  summary  convicEon.  
  • 18. Child  Pornography   DistribuEon,  etc.  of  child  pornography   163.1(3)  Every  person  who  transmits,  makes   available,  distributes,  sells,  adverEses,  imports,   exports  or  possesses  for  the  purpose  of  transmission,   making  available,  distribuEon,  sale,  adverEsing  or   exportaEon  any  child  pornography  is  guilty  of  an   indictable  offence  and  liable  to  imprisonment  for  a   term  of  not  more  than  14  years  and  to  a  minimum   punishment  of  imprisonment  for  a  term  of  one  year.  
  • 19. Criminal  Harassment   What  cons0tutes  criminal  harassment?   264  (2)     (a)  repeatedly  following  from  place  to  place  the  other  person   or  anyone  known  to  them;   (b)  repeatedly  communica0ng  with,  either  directly  or   indirectly,  the  other  person  or  anyone  known  to  them;   (c)  besepng  or  watching  the  dwelling-­‐house,  or  place  where   the  other  person,  or  anyone  known  to  them,  resides,  works,   carries  on  business  or  happens  to  be;  or   (d)  engaging  in  threatening  conduct  directed  at  the  other   person  or  any  member  of  their  family.    
  • 20. Criminal  Harassment   Recent  case:   •  R  v  EllioK,  2016  ONCJ  35     Involving  poli0cians   •  ConvicEon  of  Damany  Skeene  for  harassment  of   MP  Michelle  Rempel  2015   •  Complaints  of  MLA  Deborah  Drever  
  • 21. Hate  Speech   •  Only  opEon  is  criminal  prosecuEon  under  S.  318-­‐319  Criminal  Code   for  public  incitement  of  hatred  or  wilful  promoEon  of  hatred   •  No  complaint  possible  under  human  rights  legislaEon:   •  s.  13  hate  speech  provision  in  the  Canada  Human  Rights  Act   repealed  
  • 22. Mob  Persecu0on   •  “I  remember  sipng  in  my  flat,  watching  all  these   threats  roll  in,  and  it  was  horrifying,  uherly   shocking  and  scary.  I  didn’t  know  who  these  people   were  and  what  they  were  capable  of.  It  was   relentless.”  Caroline  Criado-­‐Perez     •  “I  felt  like  every  layer  of  my  skin  and  my  idenEty   were  ripped  off  of  me  in  ’98  and  ’99,”  she  tells  me   now.  “It’s  a  skinning  of  sorts.  You  feel  incredibly   raw  and  frightened.  But  I  also  feel  like  the  shame   sEcks  to  you  like  tar.”  Monica  Lewinsky  
  • 23. Criminalizing  offence?  Cau0onary  Tale:   Chambers  v  DPP   Paul  Chambers:  15  January   2010  “Crap!  Robin  Hood   airport  is  closed.  You’ve  got   a  week  and  a  bit  to  get  your   shit  together  otherwise  I  am   blowing  the  airport  sky   high!”     Criminalize  “low  level   speech”  (Jacob   RowboYom)   Communica0ons  Act     Malicious   CommunicaEons   Public  Order  Act   ProtecEon  from   Harassment   Act  etc.  
  • 24. Criminalizing  bullying  –  is  it  effec0ve?   •  Most  experts  agree  that  criminalizing  most  bullying   is  not  effecEve   •  MulE-­‐prong  approach   •  EducaEon   •  Does  criminalizing  cyber-­‐bullying  help  prevent   bullying  of  kids?   •  Experts  fear  kids  won’t  report  as  don’t  want  to  make  a   big  deal  out  it   •  No  deterrence  value  if  kids  don’t  know  the  law   •  BUT,  seemingly  limited  reach  of  schools  outside  the   school  yard  
  • 27. Defama0on     “DefamaEon  is  a  publicaEon  of  an  untrue  statement   about  a  person  that  tends  to  lower  his  reputaEon  in   the  opinion  of  ‘right-­‐thinking  members  of  the   community’”  Lord  Atkin      
  • 28. Defama0on  and  Social  Media   1. If  you  want  the  content  taken  down,  contact  the   poster  directly  (maybe,  beware  trolls),  or  contact  the   host   2. If  the  host  refuses  to  take  down  the  content,  you  may   have  a  cause  of  acEon  against  the  host,  if  the  host  is   Canadian-­‐based   3. If  the  host  is  American-­‐based,  you  will  not  have  a   cause  of  acEon,  nor  will  you  likely  be  able  to  enforce  a   Canadian  judgment   4. Note  the  problems  of  anonymity   5. Cost   6. Search  results:  contact  Google  for  delisEng  
  • 29. Defama0on  and  Social  Media     Pritchard  v  Van  Nes,  2016  BCSC   686:  liable  for  comments  of   friends  on  Facebook   (see  my  post  on  ablawg.ca  for   more)   Baglow  v  Smith,   2015  ONSC  1175:   comments  online   and  off  aren’t   treated  differently   Crookes  v  Newton,   2011  SCC  47:  no   liability  for  mere   provision  of   hyperlinks  
  • 30. Privacy   •  If  private  picture  posted   of  you  without  your   consent:   •  Contact  the  host  for   content  removal.   •  Sue  for  invasion  of   privacy:   •  Intrusion  on  seclusion;   •  Disclosure  of   embarrassing  facts;  
  • 31. Online  Shaming  and  Humilia0on   •  Privacy,  whether  in  law  or  otherwise,  needs  to   beher  account  for  public  humiliaEon   •  Raises  issues  of:   •  Privacy  as  protecEon  of  dignity  versus  autonomy   •  Privacy  in  public   •  The  social  dimension  of  privacy      
  • 32. Employment  Law   •  See  David  Mangan,  “A  Platorm  for  Discipline:  Social  Media  Speech   and  the  Workplace”,  available  on  www.ssrn.com     1.  Employment  law  broadly  accepts  potenEal  harm  to  business   reputaEon  as  jusEficaEon  for  terminaEon  or  discipline   2.  Social  media  policies  ouen  are  broadly  draued  so  that  any  social   media  use  that  reflects  poorly  on  the  company  can  lead  to  discipline   •  ConsideraEons  in  Canada:   •  Privacy  sepngs   •  Sustained  rant  or  one-­‐off   •  Look  for  something  more  than  griping   •  Toxic  comments   •  Acknowledgement  of  wrongdoing  
  • 34. Facebook  Policies   Facebook  Community  Standards:     “We  allow  you  to  speak  freely  on  mahers  and  people   of  public  interest,  but  remove  content  that  appears   to  purposefully  target  private  individuals  with  the   intenEon  of  degrading  or  shaming  them.”     •  Ban  ie.   •  Hate  speech   •  Revenge  pornography   •  Process:   •  Report  abuse  link   •  EducaEon  space   •  Social  reporEng  
  • 35. TwiYer  Policies   •  Previous  Abusive  behaviour  policy:       “Twiher  does  not  screen  content  and  does  not  remove  potenEally   offensive  content  unless  such  content  is  in  violaEon  of  the  Twiher   Rules  and  Terms  of  Service.”   •  Now:   “We  believe  in  freedom  of  expression  and  in  speaking  truth  to   power,  but  that  means  lihle  as  an  underlying  philosophy  if  voices   are  silenced  because  people  are  afraid  to  speak  up.  In  order  to   ensure  that  people  feel  safe  expressing  diverse  opinions  and   beliefs,  we  do  not  tolerate  behavior  that  crosses  the  line  into   abuse,  including  behavior  that  harasses,  inEmidates,  or  uses  fear  to   silence  another  user’s  voice.”  
  • 36. TwiYer  Policies   •  The  following  might  lead  to  temporary  blocking  of   accounts  or  permanent  suspension:   1.  Violent  threats   2.  Harassment   3.  Hateful  conduct  (restricted  to  promoEon  of  violence,   threats  or  direct  ahacks)   4.  MulEple  Accounts   5.  Private  informaEon  (including  inEmate  images)   6.  ImpersonaEon   7.  Self-­‐harm    
  • 37. Assessment  of  Complaint     Mechanisms   • Pros   -­‐ Cheap   -­‐ Fast   -­‐ TransnaEonal   • Cons   -­‐ First  Amendment  based   -­‐ Lack  of  transparency   -­‐ Lack  of  robust  complaints  mechanism    
  • 38. How  to  Protect  Yourself  Online  
  • 39. How  to  Protect  Yourself  Online   Your  Conduct  Online   1.  Be  kind   2.  Consider  your  audience.  Don’t  say  anything   online  that  you  wouldn’t  want  your  employer  to   see   3.  Check,  re-­‐check  your  privacy  sepngs   4.  If  you  are  abused  online,  it  is  not  your  fault  
  • 40. How  to  Protect  Yourself  Online   If  you  are  abused  online   1.  If  you  have  been  threatened,  stalked,  harassed,  or  inEmate   images  of  you  shared,  contact  the  police   2.  If  you  are  a  minor,  and  this  involves  people  in  your  school  or   community  organizaEon,  contact  your  school/organizaEon.   Talk  to  your  parents  or  another  trusted  adult   3.  If  appropriate  in  the  circumstances,  tell  the  person/people  to   stop  the  abuse   4.  Report  the  abuse  to  the  content  host  to  (a)  have  it  removed   and  (b)  discipline  the  user   5.  Report  the  abuse  to  Google  to  potenEally  remove  from  search   results   6.  Scrub  the  content  from  search  results  ie   hhps://www.reputaEon.ca    
  • 41. Upcoming  webinars   •  How  childhood  cancer  affects  families,  June  23,   10-­‐11  a.m.  MST   •  AuEsm  Spectrum  Disorder:  Early  detecEon,   resilience  and  growing  into  adulthood,  June  28,   12-­‐1  p.m.  MST   •  Healthy  aging  and  memory,  June  29,  12-­‐1  p.m.  MST   •  ParenEng:  Gepng  it  right,  June  30,  10-­‐11  a.m.  MST  
  • 42. Thank  you   Sign  up  for  other  UCalgary  webinars,   download  our  eBooks,   and  watch  videos  on  the  outcomes  of  our   scholars’  research  at   ucalgary.ca/explore/collecEons    
  • 43. Other  webinar  topics       For  ideas  on  other  UCalgary  webinar  topics,   please  email  us  at   exploreucalgary@ucalgary.ca