This document discusses cyberlaw and information intermediaries. It covers topics such as intellectual property, freedom of expression, privacy, immunity from liability provisions for intermediaries, and notice-and-takedown procedures. It argues that open innovation, transparency, consumer protection, and economic growth depend on protecting the rights of netizens and intermediaries. The document was written by Eddan Katz of the Electronic Frontier Foundation.
The New Data Protection Regulation and Cookie ComplianceLewis Silkin
This presentation is from Lewis Silkin’s The New Data Protection Regulation and Cookie Compliance breakfast briefing on the 23 February 2012. Simon Morrissey, Lewis Silkin, and Meriel Lenfestey, Foolproof, look at the new Data Protection Regulations and some of the options available when thinking about cookie compliance and the end user experience.
You can visit http://www.lewissilkin.com for more information.
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
The essential functionality of any digital
transaction system is the protection of the anonymity of user
and the message. Group signature allows any valid group
member to sign any number of messages on behalf of the
group without revealing the member identity. A blind signature
is a cryptographic scheme produces a signature, where the
digital signature is obtained on a message from a signer
without revealing any information about the message. In this
paper we bring in a new cryptographic scheme called a Group
Blind Digital Signature combines the existing concept of a
Group Digital Signature and a Blind Digital Signature. This
scheme is useful in many applications where anonymity is
very important like evoting and ecash. This blind group
signature scheme uses the identity based signature in which
the public key can be derived from any arbitrary unique string.
This reduces the complexity involved in certificate
management as compared to the traditional public key
signature scheme. Moreover, this signature scheme based on
the bilinear pairings enables utilizing smaller key sizes
The New Data Protection Regulation and Cookie ComplianceLewis Silkin
This presentation is from Lewis Silkin’s The New Data Protection Regulation and Cookie Compliance breakfast briefing on the 23 February 2012. Simon Morrissey, Lewis Silkin, and Meriel Lenfestey, Foolproof, look at the new Data Protection Regulations and some of the options available when thinking about cookie compliance and the end user experience.
You can visit http://www.lewissilkin.com for more information.
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
The essential functionality of any digital
transaction system is the protection of the anonymity of user
and the message. Group signature allows any valid group
member to sign any number of messages on behalf of the
group without revealing the member identity. A blind signature
is a cryptographic scheme produces a signature, where the
digital signature is obtained on a message from a signer
without revealing any information about the message. In this
paper we bring in a new cryptographic scheme called a Group
Blind Digital Signature combines the existing concept of a
Group Digital Signature and a Blind Digital Signature. This
scheme is useful in many applications where anonymity is
very important like evoting and ecash. This blind group
signature scheme uses the identity based signature in which
the public key can be derived from any arbitrary unique string.
This reduces the complexity involved in certificate
management as compared to the traditional public key
signature scheme. Moreover, this signature scheme based on
the bilinear pairings enables utilizing smaller key sizes
"Cyberlaw and Information Intermediaries" (กฎหมายไซเบอร์และตัวกลางข้อมูล) by Eddan Katz, International Affairs Director, Electronic Frontier Foundation http://eff.org/, นำเสนอในงานอบรมเชิงปฏิบัติการ จัดโดยเครือข่ายพลเมืองเน็ต 25 ก.ค. 2552
Slide deck for brief presentation on intellectual property law, public policy, piracy, and modes of regulation in different industrial, cultural, and technological settings.
In this presentation, we will discuss the human resource information system of an organization, which also involves the information processing cycle and proper collection of data to create a meaningful and comprehensive organizational database.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Presentation to OECD project group on Global Risk. Expanded version presented to British Computer Society, Deutsche Bank and University of Southern Denmark.
Cyber(in)security: systemic risks and responsesblogzilla
Presented at National Security 2008 in Brussels. Updated for British Computer Society, Deutsche Bank, Oxford University, and University of Southern Denmark.
California Bar Cyberspace Committee presentation on the essentials of cyberspace law focusing on user generated content, privacy and online advertising. President by Committee Co-Chair Bennet Kelley, Vice Chair Robert Hawn and Committee member Nicole Ozer.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
"Cyberlaw and Information Intermediaries" (กฎหมายไซเบอร์และตัวกลางข้อมูล) by Eddan Katz, International Affairs Director, Electronic Frontier Foundation http://eff.org/, นำเสนอในงานอบรมเชิงปฏิบัติการ จัดโดยเครือข่ายพลเมืองเน็ต 25 ก.ค. 2552
Slide deck for brief presentation on intellectual property law, public policy, piracy, and modes of regulation in different industrial, cultural, and technological settings.
In this presentation, we will discuss the human resource information system of an organization, which also involves the information processing cycle and proper collection of data to create a meaningful and comprehensive organizational database.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Presentation to OECD project group on Global Risk. Expanded version presented to British Computer Society, Deutsche Bank and University of Southern Denmark.
Cyber(in)security: systemic risks and responsesblogzilla
Presented at National Security 2008 in Brussels. Updated for British Computer Society, Deutsche Bank, Oxford University, and University of Southern Denmark.
California Bar Cyberspace Committee presentation on the essentials of cyberspace law focusing on user generated content, privacy and online advertising. President by Committee Co-Chair Bennet Kelley, Vice Chair Robert Hawn and Committee member Nicole Ozer.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
cyber security seminar session-3. in this session we are providing the basic and advance cyber security tips and tricks for all studdents from class 6 to 12. We request you to gothrough entire ppt to discover the detailing about cyber sefty in todays world.
1. Cyberlaw and Information
Intermediaries
Eddan Katz
International Affairs Director
Electronic Frontier Foundation
Wednesday, December 29, 2010 1
2. Cyberlaw
Intellectual Property
Telecommunications
Media Law
Cybercrime
Internet Jurisdiction
Wednesday, December 29, 2010 2
3. Netizen Rights
Freedom of Expression
Due Process
Privacy
Transparency
Consumer Protection
Wednesday, December 29, 2010 3
4. Access to Knowledge
Innovation
Open Infrastructure
Collaborative Production
Development
Economic Growth
Individual Autonomy
Wednesday, December 29, 2010 4
5. Regulating Behavior
developing strategies to use human or institutional
intermediaries
indirectly regulate individual behavior by changing the
technology itself
Wednesday, December 29, 2010 5
7. Types of Information Intermediaries
Hosting Providers
Internet Service Providers Search Engines
Domain Name Registrars Participative Web Platforms
Financial Intermediaries Virtual Worlds
Auction Platforms and Distributed Computing
eCommerce actors Social Networks
Wednesday, December 29, 2010 7
8. Immunity from Liability
Communications Decency Act §230 (1996)
No provider or user of an interactive computer service shall be treated as the publisher
or speaker of any information provided by another information content provider.
1. The defendant must be a "provider or user" of an "interactive computer
service."
2. The cause of action asserted by the plaintiff must "treat" the defendant "as the
publisher or speaker" of the harmful information at issue.
3. The information must be "provided by another information content provider,"
i.e., the defendant must not be the "information content provider" of the harmful
information at issue.
Wednesday, December 29, 2010 8
9. Copyright Safe Harbor
Digital Millennium Copyright Act §512 (1998)
Transitory Digital Network Communications
System Cacheing
Information Residing on Systems
Information Location Tools
Wednesday, December 29, 2010 9
10. Notice & Takedown Procedure
Infringement Allegation Notice
The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an
"information location tool" such as a search engine, the reference or link to the infringing materials [512(d)
(3)].
Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials
complained of [512(c)(3)(A)(v)].
A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is
authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Wednesday, December 29, 2010 10
11. Counter-Notice & Putback Proecdure
Counter-Notice Requirements
The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
Identification of the material and its location before removal [512(g)(3)(B)]
A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)
(3)(C)]
Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)
(D)]
Putback
[512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service
provider is then required to restore the material to its location on its network. [512(g)(2)(C)]
Wednesday, December 29, 2010 11
12. Trademark Infringement
Lanham Act 32(2)
(B) Where the infringement or violation complained of is contained in or is part of paid advertising matter in a
newspaper, magazine, or other similar periodical or in an electronic communication as defined in section 2510
(12) of title 18, United States Code, the remedies of the owner of the right infringed or person bringing the
action under section 43(a) [15 USC 1125(a)] as against the publisher or distributor of such newspaper,
magazine, or other similar periodical or electronic communication shall be limited to an injunction against the
presentation of such advertising matter in future issues of such newspapers, magazines, or other similar
periodicals or in future transmissions of such electronic communications. The limitations of this subparagraph
shall apply only to innocent infringers and innocent violators.
Wednesday, December 29, 2010 12
13. Netizen Rights (redux)
Freedom of Expression
Due Process
Privacy
Transparency
Consumer Protection
Wednesday, December 29, 2010 13
14. Freedom of Expression
Freedom of Speech
Right to Read
Chilling Effects
Democratic Culture
Anonymity
Wednesday, December 29, 2010 14
15. Due Process
Notice of Procedure
Specificity of Claims
Right to Appeal
Redress for Abuse/Misuse of Law
Wednesday, December 29, 2010 15
16. Privacy
Notice/Disclosure/Collection Limitation
Mandatory Disclosure of Personal Data
Choice/Consent
Access
Security/Integrity
Enforcement/Redress
Wednesday, December 29, 2010 16
17. Transparency
Arbitrary Application of Law
Conflicts of Interest
Accountability
Accuracy
Wednesday, December 29, 2010 17
18. Consumer Protection
Anti-Competitive Behavior
False Advertising
Contracts of Adhesion/Terms of Service
Unconscionable Terms
Wednesday, December 29, 2010 18
19. Open Innovation
End-to-End Principle
Interoperability Freedom to Tinker
Creative Destruction Distributed Responsibility
Level Playing Field Self-Organizing Community
Collaborative Production Reputation Economies
Modularity Correctability
Granularity
Wednesday, December 29, 2010 19
20. Domestic Economic Growth
Translation
Adaptability to Local Customs
Network Effects
Open Standards
Skill Development
Wednesday, December 29, 2010 20
21. Thank you.
Eddan Katz
eddan@eff.org
Danny O’Brien
danny@eff.org
Wednesday, December 29, 2010 21