Revenge porn is a vile and growing phenomenon. Thuis talk discusses its origins and gendered nature, what UK criminal law applies to stop it, and what other solutions there might be eg faster take down by socuial networks, the "right to be forgotten"
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009Doug Thompson
How should the Internet be governed? What is the role of policy and law in shaping on-line communities? Should we allow anonymity on-line or does that lead to cyber-bullying and griefers? Are there dangers if government avoids asserting control over on-line content and commerce?
Robert Bloomfield, Professor at Cornell University, welcomed Adam Thierer on Wednesday October 7th for a discussion of on-line freedom on Metanomics, a weekly virtual world broadcast.
To view the video visit: http://tinyurl.com/y8j4fmb
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009Doug Thompson
How should the Internet be governed? What is the role of policy and law in shaping on-line communities? Should we allow anonymity on-line or does that lead to cyber-bullying and griefers? Are there dangers if government avoids asserting control over on-line content and commerce?
Robert Bloomfield, Professor at Cornell University, welcomed Adam Thierer on Wednesday October 7th for a discussion of on-line freedom on Metanomics, a weekly virtual world broadcast.
To view the video visit: http://tinyurl.com/y8j4fmb
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...University of Calgary
UCalgary researcher Dr. Emily Laidlaw examines the current laws that apply to online abuse and explores legal reforms that could better tackle the harm involved.
Laidlaw discusses:
- The line between free speech and other rights such as privacy and reputation.
- The ways that social media platforms have sought to regulate through their terms and conditions.
- The ways you can protect yourself or assert your rights under the law.
To learn more about research-based insights on Safe Spaces, visit ucalgary.ca/explore/safespaces.
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
This is a presentation I delivered to the Federal Defenders Program for the District of Indiana (N.D.) on December 18, 2013. It is a 6-hour CLE presentation covering the following topics: overview of the law of child pornography, methods of distribution, digital investigations, hash values, trial issues, and the ethics of client data.
An iterative update on my ongoing work on revenge porn and how to deal with it. This talk analyses recent legislation and Google's recent decision to extend the "right to be forgotten" to revenge porn and argues both forgiving (restorative justice) and forgetting (RTBF) may be more useful remedies than the crimainal law alone for victims.
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...University of Calgary
UCalgary researcher Dr. Emily Laidlaw examines the current laws that apply to online abuse and explores legal reforms that could better tackle the harm involved.
Laidlaw discusses:
- The line between free speech and other rights such as privacy and reputation.
- The ways that social media platforms have sought to regulate through their terms and conditions.
- The ways you can protect yourself or assert your rights under the law.
To learn more about research-based insights on Safe Spaces, visit ucalgary.ca/explore/safespaces.
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
This is a presentation I delivered to the Federal Defenders Program for the District of Indiana (N.D.) on December 18, 2013. It is a 6-hour CLE presentation covering the following topics: overview of the law of child pornography, methods of distribution, digital investigations, hash values, trial issues, and the ethics of client data.
An iterative update on my ongoing work on revenge porn and how to deal with it. This talk analyses recent legislation and Google's recent decision to extend the "right to be forgotten" to revenge porn and argues both forgiving (restorative justice) and forgetting (RTBF) may be more useful remedies than the crimainal law alone for victims.
Crj 101 as we enter the last week of the course/tutorialoutletLockley
FOR MORE CLASSES VISIT
tutorialoutletdotcom
As we enter the last week of the course and we look back upon the many different forms of
white collar crime, we know that many types of white collar crime are committed through the
use of pen, paper, computers, etc. instead of guns and knives. Many white collar crimes
involve financial gain, but is the use of a computer to engage in cybersex with children a white
BeeHive Varna
http://beehive.bg
Тема:
Компютърна сигурност, анонимност, защита на лични данни в Интернет
Заглавие на лекцията:
"Privacy Is Dead, Get Over It REDUX", BeeHive Varna
Лектор:
Мурад Касим, Project Manager & Software Developer at 158 Ltd.
Дата:
10.12.2014 19:10, BeeHive Varna
Място:
BeeHive Co-Working Space, Varna, Bulgaria
Описание:
Това е продължението на оригиналната лекция "Privacy Is Dead" (https://www.youtube.com/watch?v=k_C_2...), която се проведе през октомври 2014 във BeeHive Varna (http://beehive.bg/). Целта на лекцията е да запознае всички хора с това до каква дълбока степен се събират лични данни по всеки един възможен начин за нас и че вече е невъзможно да бъдем аномни в интернет, благодарение на това че ние сами споделяме със всеки един нашите най-съкровени тайни. За всеки човек се изгражда много подробно досие, с което се търгува и ескпериментира по всякакъв възможен начин благодарение на нашето постоянно безразборно споделяне на лична информация.
Първо ще започнем с кратък преглед на причините, заради които компаниите имат интерес да изграждат поведенчески модели за нас, след това ще дадем няколко забавни примери за това как понякога хората споделят твърде лични неща с напълно непознати хора. След това следва една "по-техническа" част, където ще разгледаме накратко как големи компании като Facebook и Google събират данни за потребителите си, какво твърдят, че правят с тях и какво реално правят. Ще си поговорим и малко за нашумялата в последни години мрежа за анонимност Tor. Накрая ще завърша с някои наистина крайно авангардни технологии за следене и наблюдение, които са разработени и патентовани през последните няколко години и вече започват да се прилагат в САЩ.
Събитието във Facebook:
https://www.facebook.com/events/84997...
Благодарим на следните компании, за подкрепата им към събитието:
Beehive Varna - http://beehive.bg/
158 Ltd - http://158ltd.com
телевизия bTV - http://www.btv.bg/
телевизия "Черно Море" - http://www.cherno-more.tv/
списание "VIP" - http://spisanievip.com/
beehive varna, beehive coworking space, beehive.bg, beehive варна, споделено работно място варна, 158, 158ltd, 158ltd.com, компютърна сигурност, лични данни, анонимност, Tor, privacy, computer security, anonymity, network security, security, privacy, personal data, data protection, cybersecurity, privacy protection, protect your data, data collection, google, facebook, personal data collection, privacy policy
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
AI regulation has been a hot topic since the rise of machine learning (ML) in the “big data” era, but generative AI or “foundation models” tools like ChatGPT, DALL-E 2(now 3) and CoPilot, ike ML before them, may create serious societal risks, including embedding and outputting bias; generating fake news, illegal or harmful content and inadvertent “hallucinations”; infringing existing laws relating eg to copyright and privacy; as well as environmental, competition and workplace concerns.
Many nations are now considering regulation to address these worries, and can draw on a number of basic and hybrid models of governance. This paper canvasses models of mandatory comprehensive legislation (where the EU AI Act hopes to place itself as a gold standard model); vertical mandatory legislation (where China has quietly taken a lead); adapting existing law (see the many copyright lawsuits underway); and voluntary “soft law” such as codes of ethics, “blueprints”, or industry guidelines. Both the domestic and international regulatory scenes for AI are also increasingly politicised as the rise of "AI safety" hype shows. Against this backdrop what choices should smaller countries such as the UK and Australia make? will international harmonisation lead to a race to the top as with the GDPR, or the bottom - rule by tech for tech?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
This talk looks at
(a) the progress in regulating GPAI, renamed foundation models, by the EU AI Act as the EU parliament reaches a final text in May 2023
(b) what other laws exist to regulate generative AI meanwhile , notably copyright and the GDPR (latter dealt with in detail here https://www.slideshare.net/lilianed/can-chatgpt-be-compatible-with-the-gdpr-discuss )
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
Since the Italian Garantie became the first DP authority in the world to even temporarily ban ChatGPT, debate has broken out as to whether generative AI models can comply with data protection laws, not just in the GDPR but around the world. The use of personal data for training requires a legal basis which is hard to find, special category data raises special problems (duh) and the model itself may be considered personal data due to inversion attacks and data leakage in outputs. Hallucination presents seemingly insuperable problems as to accuracy and rectification. Even though Open AI have temporarily satisfied the Garantie, further disputes still seem likely to eventually reach the courts. In this talk I will attempt to throw the entirety of DP law against the wall of large language and image models and even, jut for fun, raise the spectre of whether AI models can libel
Brief summary of how the law and legal practice may be affected by the ris of AI and autonomous cars, robots, etc - with a look at what harms or biases may result and how law and the market might try to solve those problems.
If the UK leaves the EU and EEA, will it be "adequate" for data transfers from the EU? Evidemnce suggests not, especially following the passing of the IP Act and the Tele2/Watson CJEU decision.
Updated vesion of my talk from 2013 as given in March 2016.
Coves the basics of why algorithmic governance may be problematic for users and society and suggests some legal remedies for these problems including competition law and defamation law.
Privacy, the Internet of Things and Smart Cities Lilian Edwards
Updated version of my paper, delivered Florence spring 2016. How can we obtain consent to sharing of personal data in a ubiquitous/ioT environment? is it possible given the requeirements of the GDPR and E-Privacy Directive?
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
Short paper by Laurence Diver and myself on why the IoT is a special problem for privacy and how we can and should try to build such systems using Privacy by Design
UK copyright, online intermediaries and enforcementLilian Edwards
What evidence do judges take into acount when they decide to block websites to prevent copyright infringement? Using case reports of s 97A CPDA cases in the UK, this paper shows a number of problems with judicial use of empirical evidnece especially as to whether blocking is effective.
Be careful what you wish for! How the GDPR even now it has been finalised may not solve the key problems of rthe tech community of what is personal data and what is anonymised/pseudonymous.
Can privacy survive the onslaught of online standard form "consent"; big data; and the Internet of Things? This paper wonders, and considers in particular the challenges of privacy and smart cities, which combine all three issues.
the music industry has many problems, and , some would say, enemies. THis talk looks at some of these and summarises the outcomes to date of the "war on piracy". It also however foresees a newer threat - the algorithmic curation and , perhaps, creation, of popular music. Do we need new music and human musicians any more?
A brief account of the current state of EU data protection laws accompanied by the suggestion they face almost insuperable challenge from the combination of the illusory nature of consent in most online contracts; the rise of big data as a "treasure hunt"; and the rise oambient environments for data colelction (the "Internet of Things") where design imperatives push towards an absence of opportunities for informed specific consent.
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
This paper (co-authored with lachlan Urquart of U of Nottingham) discusses if we have any expectations of privacy in content we make public on;line on social media - or can such content be data mined by the police at will? Should any kind of surveillance warrant be required of the police to use such material? has social jmedia become the new panopticon?
IT law : the middle kingdom between east and WestLilian Edwards
Privacy as a value is often as conflicting with and less important than other major societal goals such as nation state secureity and business profits. China as a socialist state emerging a a major digital economuic force may fall prey to both these assumptions. However the recent history in the West shows that over zealous national secueity infringing citizen privacy, as revealed in the recent Snowden PRISM/TEMPORA etc scandals, may backlash against business profits as well as reducing citizen trust in security.China can learn from these lessons as it expands its own privacy law especially in the IT/telecoms area.
Algorithms are taking control of our information rich world. As the twin sibling to Big Data, increasingly they decide how society views us via constructed profiles (as criminals? as terrorists? as rich or poor consumers?); what we see as important, newsworthy, cool or profitable (eg Twitter trending topics, automated stock selling, Amazon recommendations, BBC website top news topics etc); and indeed what we see at all as algorithms are increasingly used to filter our illegal or undesirable content as tools of public policy. Algorithms are peceived by virtue of their automation as neutral, objective and fair, unlike human decision makers - yet evidence increasingly shows the opposite - eg a series of legal complaints assert that Google games its own search results to promote its own economic interests and demote those of competitors or annoyances; while in the defamation field, French, German and Italian courts have decided that algorithmically generated autosuggests in search can be libellous (eg "Bettina Wolf prostitute"). . This paper asks if any legal remedies do or should exist to *audit* proprietary algorithms , given their importance, and asks if one way forward might be via existing and future subject access rights to personal data in EU data protection law. The transformation of these rights as proposed in the draft Data Protection Regulation is not however hopeful.
Robots are no longer creatures of science fiction nor even restricted to industrial and warfare contexts but moving into sensitive domnestic worlds such as homes, hospitals and schools. How will laws about liability, privacy, evidence etc apply in this brave new world? How do we avoid creating kneejerk moral panic laws which may restrict the vaule of robotics to society?
Data protection and other systems of personal data protection around the globe are fundamentally based on principles of "notice and choice". These basic principles are now however assailed from three directions: the chimera of online consent; the lack of opportunity for consent in the world of ambient intelligence or ubiq; and the destruction of purpose specification by the rise of Big Data. This paper connects the dots between all three and considers if anything is left of DP after.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
1. What do we do about a problem
like revenge porn?
ORGcon
Nov 2014
Lilian Edwards
Professor of E-Governance
University of
Strathclyde, Glasgow
& Deputy Director,
CREATe
Lilian.edwards@strath.ac.uk
@lilianedwards
Pangloss blog :
http://blogscript.blogspot.co.uk/
2. Revenge porn
• What is revenge porn? “Bastard child of sexting”?
• Probably not new but exacerbated by camphones, social
networks, WhatsApp, Snapchat , dedicated sites etc
• Usually ex-partners, usually images originally given
consensually
• But not always; eg recent threats to do a “Jennifer Lawrence”
on Emma Watson by 4chan (hoax, but still..)
• Ist UK case involved lost/hacked mobile
• Gendered crime? Online harassment disproportionately aimed
at women – 72.5% of victims of Internet, Pew Internet – also
gay men.
• MacAfee report 2013 – 10% of Americans had threats of
exposure of images by ex partners, 60% of threats acted on,
vast majority of victims women.
3. What are the harms?
• Strongly negative effects – “slut
shaming”, loss of job, depression,
wrecking future relationships,
silencing, suicide? (Hess)
• A new type of harassment? A
virtual sexual assault? Merely
“speech”?
• Arguably art of general wave of
online misogyny and harassment:
– cf UK Criado-Perez/Creasy
cases; “I will rape you
tomorrow at 9 p.m … Shall we
meet near your house?”
– #gamergate
– “Everyday Sexism”
– “Victim blaming” ..
“Ignore the barrage of violent
threats and harassing messages
that confront you online every
day.” That’s what women are
told. But these relentless
messages are an assault on
women’s careers, their
psychological bandwidth, and
their freedom to live online. We
have been thinking about
Internet harassment all wrong.
Hess Why Women Aren’t
Welcome on the Internet
4. Victim blaming
Don't let anyone take smutty pictures of you. Trying to remove it from
the Internet is like attempting to empty Loch Ness with a teaspoon.
The simple answer to this problem is not to ever give anyone a photo
that you would mind being put on the internet. No-one is under any
obligation to do such an idiotic thing after all.
How to beat it? - don't take you own boobs selfie
Rhiaden makz
29 July 2014 7:29pm
No, it is horrific that people trust each other, especially in long-term
relationships isn't it?
5. The sexting heritage
• 2012 , NSPCC/KCL/LSE : “girls as young as 11 were
being asked to send "special photos" to boys who they
knew”.
• “many young people seem to accept all this as part of
life. But it can be another layer of sexual abuse”
• 2013, NSPCC/Childline “Six out of 10 teenagers say
they have been asked for sexual images or videos”
• 2014, US survey “about two-thirds of the teens in my
research studies report that they were pressured or
coerced into sexting at least some of the time”..
“becoming a “normal” part of adolescent sexual
development”
6. The problem environment
• Specialist sites in US: IsAnyoneUp.com, 2010;
IsAnyoneDown; MyEx.com; Texxaan.com – often many
details attached
• Sites earn c $10,000pcm in ads; blackmail also a revenue
stream – ugotposted.com (Cal)
• Now arriving in UK/EU since around start 2014
• More use “mainstream” sites – FB, Twitter
• Forerunner - AMP case, 2011, FB/BitTorrent, held
harassment & injunctions granted
• “Ist” UK “revenge porn” case , Samuel, Bristol Aug 2014; Pix
on FB, (MCA 88 prosecution)
• 2nd, Luke King, 21, Nottingham, jailed Nov 14, 12 wks
(harassment)
• Maria Miller, Telegraph 6/10/14 : 149 complaints across 8
police forces but only 8 cautions resulted
8. Revenge porn vs freedom of speech
online? US vs EU
• Freedom of speech? Interference with public record?; Conceivably if
public figure (Jennifer Lawrence? Cf Max Mosley Nazi orgy?) but v
unlikely.
• ECHR art 10 “Everyone has the right to freedom of expression...”
• Handyside v UK ECtHR , 1976 : this includes right to express opinions
“that offend, shock or disturb the state or any sector of the population”
• BUT art 10(2) 2: “The exercise of these freedoms, since it carries with
it duties and responsibilities, may be subject to such formalities,
conditions, restrictions or penalties as are prescribed by law and are
necessary in a democratic society… for the protection of the
reputation or rights of others, for preventing the disclosure of
information received in confidence..
• EU defends rights to control personal data esp sensitive personal data
• Assaults on women online arguably restrict their access to the Internet
9. UK: Criminal law - 1
• “Malicious communications”
1. Communications Act 2003 s 127
– Using a “public e-communications network”
– To send a “message or other matter that is grossly offensive or of an
indecent , obscene or menacing character”
– Max 6 mos summary, 2 years on indictment
2. Malicious Communications Act 1988 s 1
– Communication must be
• “in whole or part, of an indecent or grossly offensive nature” if
purpose was to “cause distress or anxiety to the recipient or to any
other person “ it was meant to be communicated to
• Used in Bristol case – but plead guilty.
• Not applic Scotland; 6mos jail max currently
• Problem 1 – is revenge porn ““grossly offensive or
indecent”? Originally consensual, usually “. Only illegal or
extreme sex images being prosecuted – DPP guidelines
obscenity. Look at the “message” not the image??
10. 3. Protection From Harassment Act
1997 (PHA)
Not mainly designed for the Internet
Section 2: harassment involves
• a “course of conduct” (at least 2 occasions, s 7);
• which amounts to “harassment “of another; and defendant
knows, or ought to know this
• Harassment not defined but can clearly include “speech” and
nonconsensual use of images (AMP)
• Section 4, 2A and 4A (“stalking”) also relevant; max 5 yrs jail
Problem 2 : what if not a “course of conduct” = at least 2 occasions,
(s 7) (will 2 photos do,2 sites?)
11. Policing and social networks?
• Police perception issues: A “domestic” matter?
• Can women just “walk away” from Twitter? (Hess, p 3).
• Guardian 21 Oct 14: “I remember the police telling me
they couldn’t do anything. I remember them offering to
file a domestic incident report and have a word with
my ex. I remember begging them not to reveal to him
that they had no power to act. I was petrified of
antagonising him further.”
• July 14 – police just rolling out social media training…
• FB/Twitter – emphasis self-help, peer to peer
mediation – resistant to real time monitoring; abuse
team in 100s for entire globe; look at community rules
NOT national criminal rules
12. The legislative response
• HL Select Committee – July 14; no brand new law needed;
tweaks, yes.
• DPP social media prosecution guidance amended to include
revenge porn, specifying for CA/MCA, the indecency etc is
of “message” not “image”
– SOA 2003 (?); under 18s, child porn possession etc offences
possible
• Amendments from peers, govt to Criminal Justice and
Courts Bill
– Offense to disclose “private sexual photo or film”
• Without consent
• With intention of causing that individual distress (“for the lulz?”)
– Defenses: “public interest” journalism, detecting crime, previous
disclosure for reward
– Also E-Commerce Directive defenses – see next..
– Max 2 years or 12 months on summary trial
13. Effectiveness?
• Will new criminal offences make big difference? Already 5
years poss under harassment and 2 years under CA2003
(and soon, MCA).
Not addressed -
• Remedy of take down for victims??
• Statute does not create a a primary criminal offence by
host sites eg SNSs -> desire to take down expeditiously (EC
E-Commerce Directive) to avoid liability
– no offense as no intention to cause distress.
– So no advance in pushing takedown remedy
Better approaches?
• Changes in policing attitudes and training?
• Different remedies? Restorative justice?
• More responsibility by social network providers?
• Fundamental changes in gender attitudes on and offline?
14. Meanwhile - The “right to be
forgotten” solution
• EU Data Protection Directive 1995 : Right to control processing of your
personal data.
• Sexual image is “sensitive personal data” ie only ground for processing
it = explicit consent, withdrawable
• Plus can stop processing (including delete data) if “causing damage or
distress” (DPA) ; cheap and fast (cf injunction)
• EU law – won’t apply to US dedicated revenge porn sites , but..
• “Right to be forgotten” upheld as against Google in ECJ Google Spain
case (C-131/12, 2014)– right not to have your name linked to a
certain page
• Issues:
– can find link by searching google.com (etc); “Streisand effect”;
– Remedy after the fact. Deterrent effect of criminal law still needed
in combination.