SlideShare a Scribd company logo
What do we do about a problem 
like revenge porn? 
ORGcon 
Nov 2014 
Lilian Edwards 
Professor of E-Governance 
University of 
Strathclyde, Glasgow 
& Deputy Director, 
CREATe 
Lilian.edwards@strath.ac.uk 
@lilianedwards 
Pangloss blog : 
http://blogscript.blogspot.co.uk/
Revenge porn 
• What is revenge porn? “Bastard child of sexting”? 
• Probably not new but exacerbated by camphones, social 
networks, WhatsApp, Snapchat , dedicated sites etc 
• Usually ex-partners, usually images originally given 
consensually 
• But not always; eg recent threats to do a “Jennifer Lawrence” 
on Emma Watson by 4chan (hoax, but still..) 
• Ist UK case involved lost/hacked mobile 
• Gendered crime? Online harassment disproportionately aimed 
at women – 72.5% of victims of Internet, Pew Internet – also 
gay men. 
• MacAfee report 2013 – 10% of Americans had threats of 
exposure of images by ex partners, 60% of threats acted on, 
vast majority of victims women.
What are the harms? 
• Strongly negative effects – “slut 
shaming”, loss of job, depression, 
wrecking future relationships, 
silencing, suicide? (Hess) 
• A new type of harassment? A 
virtual sexual assault? Merely 
“speech”? 
• Arguably art of general wave of 
online misogyny and harassment: 
– cf UK Criado-Perez/Creasy 
cases; “I will rape you 
tomorrow at 9 p.m … Shall we 
meet near your house?” 
– #gamergate 
– “Everyday Sexism” 
– “Victim blaming” .. 
“Ignore the barrage of violent 
threats and harassing messages 
that confront you online every 
day.” That’s what women are 
told. But these relentless 
messages are an assault on 
women’s careers, their 
psychological bandwidth, and 
their freedom to live online. We 
have been thinking about 
Internet harassment all wrong. 
Hess Why Women Aren’t 
Welcome on the Internet
Victim blaming 
Don't let anyone take smutty pictures of you. Trying to remove it from 
the Internet is like attempting to empty Loch Ness with a teaspoon. 
The simple answer to this problem is not to ever give anyone a photo 
that you would mind being put on the internet. No-one is under any 
obligation to do such an idiotic thing after all. 
How to beat it? - don't take you own boobs selfie 
Rhiaden makz 
29 July 2014 7:29pm 
No, it is horrific that people trust each other, especially in long-term 
relationships isn't it?
The sexting heritage 
• 2012 , NSPCC/KCL/LSE : “girls as young as 11 were 
being asked to send "special photos" to boys who they 
knew”. 
• “many young people seem to accept all this as part of 
life. But it can be another layer of sexual abuse” 
• 2013, NSPCC/Childline “Six out of 10 teenagers say 
they have been asked for sexual images or videos” 
• 2014, US survey “about two-thirds of the teens in my 
research studies report that they were pressured or 
coerced into sexting at least some of the time”.. 
“becoming a “normal” part of adolescent sexual 
development”
The problem environment 
• Specialist sites in US: IsAnyoneUp.com, 2010; 
IsAnyoneDown; MyEx.com; Texxaan.com – often many 
details attached 
• Sites earn c $10,000pcm in ads; blackmail also a revenue 
stream – ugotposted.com (Cal) 
• Now arriving in UK/EU since around start 2014 
• More use “mainstream” sites – FB, Twitter 
• Forerunner - AMP case, 2011, FB/BitTorrent, held 
harassment & injunctions granted 
• “Ist” UK “revenge porn” case , Samuel, Bristol Aug 2014; Pix 
on FB, (MCA 88 prosecution) 
• 2nd, Luke King, 21, Nottingham, jailed Nov 14, 12 wks 
(harassment) 
• Maria Miller, Telegraph 6/10/14 : 149 complaints across 8 
police forces but only 8 cautions resulted
US law – the speech problem 
• Criminal law 
– Speech issues – First amendment 
– Harassment laws (largely state based) usually very limiting 
• Cal. “substantial emotional distress” 
• Cal. “gravity of purpose and immediate prospect of execution of the 
threat” 
– ID theft? Extortion? Some success. 
– Some dedicated revenge porn statutes – but may fall foul of 
constl guarantees (but see also Israel, Victoria AUS, Canada ..) 
• Remedy of take down against host site? 
– US s 230© CDA – no website is responsible for content 
authored by third party – even after notice 
– Unless federal criminal law (eg child porn ) or IP 
– => Some attempts to take down via copyright (DMCA). Silly. 
What about non-selfies?!
Revenge porn vs freedom of speech 
online? US vs EU 
• Freedom of speech? Interference with public record?; Conceivably if 
public figure (Jennifer Lawrence? Cf Max Mosley Nazi orgy?) but v 
unlikely. 
• ECHR art 10 “Everyone has the right to freedom of expression...” 
• Handyside v UK ECtHR , 1976 : this includes right to express opinions 
“that offend, shock or disturb the state or any sector of the population” 
• BUT art 10(2) 2: “The exercise of these freedoms, since it carries with 
it duties and responsibilities, may be subject to such formalities, 
conditions, restrictions or penalties as are prescribed by law and are 
necessary in a democratic society… for the protection of the 
reputation or rights of others, for preventing the disclosure of 
information received in confidence.. 
• EU defends rights to control personal data esp sensitive personal data 
• Assaults on women online arguably restrict their access to the Internet
UK: Criminal law - 1 
• “Malicious communications” 
1. Communications Act 2003 s 127 
– Using a “public e-communications network” 
– To send a “message or other matter that is grossly offensive or of an 
indecent , obscene or menacing character” 
– Max 6 mos summary, 2 years on indictment 
2. Malicious Communications Act 1988 s 1 
– Communication must be 
• “in whole or part, of an indecent or grossly offensive nature” if 
purpose was to “cause distress or anxiety to the recipient or to any 
other person “ it was meant to be communicated to 
• Used in Bristol case – but plead guilty. 
• Not applic Scotland; 6mos jail max currently 
• Problem 1 – is revenge porn ““grossly offensive or 
indecent”? Originally consensual, usually “. Only illegal or 
extreme sex images being prosecuted – DPP guidelines 
obscenity. Look at the “message” not the image??
3. Protection From Harassment Act 
1997 (PHA) 
Not mainly designed for the Internet 
Section 2: harassment involves 
• a “course of conduct” (at least 2 occasions, s 7); 
• which amounts to “harassment “of another; and defendant 
knows, or ought to know this 
• Harassment not defined but can clearly include “speech” and 
nonconsensual use of images (AMP) 
• Section 4, 2A and 4A (“stalking”) also relevant; max 5 yrs jail 
Problem 2 : what if not a “course of conduct” = at least 2 occasions, 
(s 7) (will 2 photos do,2 sites?)
Policing and social networks? 
• Police perception issues: A “domestic” matter? 
• Can women just “walk away” from Twitter? (Hess, p 3). 
• Guardian 21 Oct 14: “I remember the police telling me 
they couldn’t do anything. I remember them offering to 
file a domestic incident report and have a word with 
my ex. I remember begging them not to reveal to him 
that they had no power to act. I was petrified of 
antagonising him further.” 
• July 14 – police just rolling out social media training… 
• FB/Twitter – emphasis self-help, peer to peer 
mediation – resistant to real time monitoring; abuse 
team in 100s for entire globe; look at community rules 
NOT national criminal rules
The legislative response 
• HL Select Committee – July 14; no brand new law needed; 
tweaks, yes. 
• DPP social media prosecution guidance amended to include 
revenge porn, specifying for CA/MCA, the indecency etc is 
of “message” not “image” 
– SOA 2003 (?); under 18s, child porn possession etc offences 
possible 
• Amendments from peers, govt to Criminal Justice and 
Courts Bill 
– Offense to disclose “private sexual photo or film” 
• Without consent 
• With intention of causing that individual distress (“for the lulz?”) 
– Defenses: “public interest” journalism, detecting crime, previous 
disclosure for reward 
– Also E-Commerce Directive defenses – see next.. 
– Max 2 years or 12 months on summary trial
Effectiveness? 
• Will new criminal offences make big difference? Already 5 
years poss under harassment and 2 years under CA2003 
(and soon, MCA). 
Not addressed - 
• Remedy of take down for victims?? 
• Statute does not create a a primary criminal offence by 
host sites eg SNSs -> desire to take down expeditiously (EC 
E-Commerce Directive) to avoid liability 
– no offense as no intention to cause distress. 
– So no advance in pushing takedown remedy 
Better approaches? 
• Changes in policing attitudes and training? 
• Different remedies? Restorative justice? 
• More responsibility by social network providers? 
• Fundamental changes in gender attitudes on and offline?
Meanwhile - The “right to be 
forgotten” solution 
• EU Data Protection Directive 1995 : Right to control processing of your 
personal data. 
• Sexual image is “sensitive personal data” ie only ground for processing 
it = explicit consent, withdrawable 
• Plus can stop processing (including delete data) if “causing damage or 
distress” (DPA) ; cheap and fast (cf injunction) 
• EU law – won’t apply to US dedicated revenge porn sites , but.. 
• “Right to be forgotten” upheld as against Google in ECJ Google Spain 
case (C-131/12, 2014)– right not to have your name linked to a 
certain page 
• Issues: 
– can find link by searching google.com (etc); “Streisand effect”; 
– Remedy after the fact. Deterrent effect of criminal law still needed 
in combination.

More Related Content

What's hot

Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and IndecencyMiriam Smith
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
University of Calgary
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Center for Sustainable Journalism at Kennesaw State University
 
Social media law
Social media law Social media law
Social media law
Matt J. Duffy
 
Journalism law
Journalism lawJournalism law
Journalism law
CubReporters.org
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)OliviaBolt
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
Loraine Kaye Franco
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad ideaPJG123
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
Frederick Lane
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine ResponsibilitiesEmily Laidlaw
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
kmcintire84
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechEmily Laidlaw
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
CubReporters.org
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 

What's hot (18)

Obscenity on the Web
Obscenity on the WebObscenity on the Web
Obscenity on the Web
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and Indecency
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
 
Social media law
Social media law Social media law
Social media law
 
Journalism law
Journalism lawJournalism law
Journalism law
 
Censorship
CensorshipCensorship
Censorship
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad idea
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine Responsibilities
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 

Similar to What do we do with aproblem like revenge porn ?

Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
Lilian Edwards
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
Tom Daly
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcour
ssuser774ad41
 
The misrepresentation of Digital Teens as trolls
The misrepresentation of Digital Teens as trollsThe misrepresentation of Digital Teens as trolls
The misrepresentation of Digital Teens as trolls
Jonathan Bishop
 
Essay Zithande Ukuze Nabantu Bakuthande
Essay Zithande Ukuze Nabantu BakuthandeEssay Zithande Ukuze Nabantu Bakuthande
Essay Zithande Ukuze Nabantu Bakuthande
Jessica Gefroh
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
protected7000
 
Digital r rsjb2011
Digital r rsjb2011Digital r rsjb2011
Digital r rsjb2011
SJBelcher
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
Suna Gurol
 
Bill of Rights
Bill of RightsBill of Rights
Bill of Rights
irvin2030
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
Dr. Prashant Vats
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
Justine
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
BiproRoy3
 
03 internet addiction
03 internet addiction03 internet addiction
03 internet addiction
offaq
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Right to personality and privacy in south korea
Right to personality and privacy in south koreaRight to personality and privacy in south korea
Right to personality and privacy in south korea
K.s. Park
 

Similar to What do we do with aproblem like revenge porn ? (19)

Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Obscenityonthweb
ObscenityonthwebObscenityonthweb
Obscenityonthweb
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcour
 
The misrepresentation of Digital Teens as trolls
The misrepresentation of Digital Teens as trollsThe misrepresentation of Digital Teens as trolls
The misrepresentation of Digital Teens as trolls
 
Essay Zithande Ukuze Nabantu Bakuthande
Essay Zithande Ukuze Nabantu BakuthandeEssay Zithande Ukuze Nabantu Bakuthande
Essay Zithande Ukuze Nabantu Bakuthande
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
Digital r rsjb2011
Digital r rsjb2011Digital r rsjb2011
Digital r rsjb2011
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Bill of Rights
Bill of RightsBill of Rights
Bill of Rights
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
03 internet addiction
03 internet addiction03 internet addiction
03 internet addiction
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Right to personality and privacy in south korea
Right to personality and privacy in south koreaRight to personality and privacy in south korea
Right to personality and privacy in south korea
 

More from Lilian Edwards

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
Lilian Edwards
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
Lilian Edwards
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
Lilian Edwards
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
Lilian Edwards
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
Lilian Edwards
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
Lilian Edwards
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
Lilian Edwards
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
Lilian Edwards
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
Lilian Edwards
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
Lilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
Lilian Edwards
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
Lilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
Lilian Edwards
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
Lilian Edwards
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
Lilian Edwards
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
Lilian Edwards
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
Lilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 

More from Lilian Edwards (20)

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 

Recently uploaded

怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
YashSingh373746
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 

Recently uploaded (20)

怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
Consolidated_Analysis_report_(Phase_1_to_7)_of_Criminal_and_Financial_backgro...
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 

What do we do with aproblem like revenge porn ?

  • 1. What do we do about a problem like revenge porn? ORGcon Nov 2014 Lilian Edwards Professor of E-Governance University of Strathclyde, Glasgow & Deputy Director, CREATe Lilian.edwards@strath.ac.uk @lilianedwards Pangloss blog : http://blogscript.blogspot.co.uk/
  • 2. Revenge porn • What is revenge porn? “Bastard child of sexting”? • Probably not new but exacerbated by camphones, social networks, WhatsApp, Snapchat , dedicated sites etc • Usually ex-partners, usually images originally given consensually • But not always; eg recent threats to do a “Jennifer Lawrence” on Emma Watson by 4chan (hoax, but still..) • Ist UK case involved lost/hacked mobile • Gendered crime? Online harassment disproportionately aimed at women – 72.5% of victims of Internet, Pew Internet – also gay men. • MacAfee report 2013 – 10% of Americans had threats of exposure of images by ex partners, 60% of threats acted on, vast majority of victims women.
  • 3. What are the harms? • Strongly negative effects – “slut shaming”, loss of job, depression, wrecking future relationships, silencing, suicide? (Hess) • A new type of harassment? A virtual sexual assault? Merely “speech”? • Arguably art of general wave of online misogyny and harassment: – cf UK Criado-Perez/Creasy cases; “I will rape you tomorrow at 9 p.m … Shall we meet near your house?” – #gamergate – “Everyday Sexism” – “Victim blaming” .. “Ignore the barrage of violent threats and harassing messages that confront you online every day.” That’s what women are told. But these relentless messages are an assault on women’s careers, their psychological bandwidth, and their freedom to live online. We have been thinking about Internet harassment all wrong. Hess Why Women Aren’t Welcome on the Internet
  • 4. Victim blaming Don't let anyone take smutty pictures of you. Trying to remove it from the Internet is like attempting to empty Loch Ness with a teaspoon. The simple answer to this problem is not to ever give anyone a photo that you would mind being put on the internet. No-one is under any obligation to do such an idiotic thing after all. How to beat it? - don't take you own boobs selfie Rhiaden makz 29 July 2014 7:29pm No, it is horrific that people trust each other, especially in long-term relationships isn't it?
  • 5. The sexting heritage • 2012 , NSPCC/KCL/LSE : “girls as young as 11 were being asked to send "special photos" to boys who they knew”. • “many young people seem to accept all this as part of life. But it can be another layer of sexual abuse” • 2013, NSPCC/Childline “Six out of 10 teenagers say they have been asked for sexual images or videos” • 2014, US survey “about two-thirds of the teens in my research studies report that they were pressured or coerced into sexting at least some of the time”.. “becoming a “normal” part of adolescent sexual development”
  • 6. The problem environment • Specialist sites in US: IsAnyoneUp.com, 2010; IsAnyoneDown; MyEx.com; Texxaan.com – often many details attached • Sites earn c $10,000pcm in ads; blackmail also a revenue stream – ugotposted.com (Cal) • Now arriving in UK/EU since around start 2014 • More use “mainstream” sites – FB, Twitter • Forerunner - AMP case, 2011, FB/BitTorrent, held harassment & injunctions granted • “Ist” UK “revenge porn” case , Samuel, Bristol Aug 2014; Pix on FB, (MCA 88 prosecution) • 2nd, Luke King, 21, Nottingham, jailed Nov 14, 12 wks (harassment) • Maria Miller, Telegraph 6/10/14 : 149 complaints across 8 police forces but only 8 cautions resulted
  • 7. US law – the speech problem • Criminal law – Speech issues – First amendment – Harassment laws (largely state based) usually very limiting • Cal. “substantial emotional distress” • Cal. “gravity of purpose and immediate prospect of execution of the threat” – ID theft? Extortion? Some success. – Some dedicated revenge porn statutes – but may fall foul of constl guarantees (but see also Israel, Victoria AUS, Canada ..) • Remedy of take down against host site? – US s 230© CDA – no website is responsible for content authored by third party – even after notice – Unless federal criminal law (eg child porn ) or IP – => Some attempts to take down via copyright (DMCA). Silly. What about non-selfies?!
  • 8. Revenge porn vs freedom of speech online? US vs EU • Freedom of speech? Interference with public record?; Conceivably if public figure (Jennifer Lawrence? Cf Max Mosley Nazi orgy?) but v unlikely. • ECHR art 10 “Everyone has the right to freedom of expression...” • Handyside v UK ECtHR , 1976 : this includes right to express opinions “that offend, shock or disturb the state or any sector of the population” • BUT art 10(2) 2: “The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a democratic society… for the protection of the reputation or rights of others, for preventing the disclosure of information received in confidence.. • EU defends rights to control personal data esp sensitive personal data • Assaults on women online arguably restrict their access to the Internet
  • 9. UK: Criminal law - 1 • “Malicious communications” 1. Communications Act 2003 s 127 – Using a “public e-communications network” – To send a “message or other matter that is grossly offensive or of an indecent , obscene or menacing character” – Max 6 mos summary, 2 years on indictment 2. Malicious Communications Act 1988 s 1 – Communication must be • “in whole or part, of an indecent or grossly offensive nature” if purpose was to “cause distress or anxiety to the recipient or to any other person “ it was meant to be communicated to • Used in Bristol case – but plead guilty. • Not applic Scotland; 6mos jail max currently • Problem 1 – is revenge porn ““grossly offensive or indecent”? Originally consensual, usually “. Only illegal or extreme sex images being prosecuted – DPP guidelines obscenity. Look at the “message” not the image??
  • 10. 3. Protection From Harassment Act 1997 (PHA) Not mainly designed for the Internet Section 2: harassment involves • a “course of conduct” (at least 2 occasions, s 7); • which amounts to “harassment “of another; and defendant knows, or ought to know this • Harassment not defined but can clearly include “speech” and nonconsensual use of images (AMP) • Section 4, 2A and 4A (“stalking”) also relevant; max 5 yrs jail Problem 2 : what if not a “course of conduct” = at least 2 occasions, (s 7) (will 2 photos do,2 sites?)
  • 11. Policing and social networks? • Police perception issues: A “domestic” matter? • Can women just “walk away” from Twitter? (Hess, p 3). • Guardian 21 Oct 14: “I remember the police telling me they couldn’t do anything. I remember them offering to file a domestic incident report and have a word with my ex. I remember begging them not to reveal to him that they had no power to act. I was petrified of antagonising him further.” • July 14 – police just rolling out social media training… • FB/Twitter – emphasis self-help, peer to peer mediation – resistant to real time monitoring; abuse team in 100s for entire globe; look at community rules NOT national criminal rules
  • 12. The legislative response • HL Select Committee – July 14; no brand new law needed; tweaks, yes. • DPP social media prosecution guidance amended to include revenge porn, specifying for CA/MCA, the indecency etc is of “message” not “image” – SOA 2003 (?); under 18s, child porn possession etc offences possible • Amendments from peers, govt to Criminal Justice and Courts Bill – Offense to disclose “private sexual photo or film” • Without consent • With intention of causing that individual distress (“for the lulz?”) – Defenses: “public interest” journalism, detecting crime, previous disclosure for reward – Also E-Commerce Directive defenses – see next.. – Max 2 years or 12 months on summary trial
  • 13. Effectiveness? • Will new criminal offences make big difference? Already 5 years poss under harassment and 2 years under CA2003 (and soon, MCA). Not addressed - • Remedy of take down for victims?? • Statute does not create a a primary criminal offence by host sites eg SNSs -> desire to take down expeditiously (EC E-Commerce Directive) to avoid liability – no offense as no intention to cause distress. – So no advance in pushing takedown remedy Better approaches? • Changes in policing attitudes and training? • Different remedies? Restorative justice? • More responsibility by social network providers? • Fundamental changes in gender attitudes on and offline?
  • 14. Meanwhile - The “right to be forgotten” solution • EU Data Protection Directive 1995 : Right to control processing of your personal data. • Sexual image is “sensitive personal data” ie only ground for processing it = explicit consent, withdrawable • Plus can stop processing (including delete data) if “causing damage or distress” (DPA) ; cheap and fast (cf injunction) • EU law – won’t apply to US dedicated revenge porn sites , but.. • “Right to be forgotten” upheld as against Google in ECJ Google Spain case (C-131/12, 2014)– right not to have your name linked to a certain page • Issues: – can find link by searching google.com (etc); “Streisand effect”; – Remedy after the fact. Deterrent effect of criminal law still needed in combination.