SlideShare une entreprise Scribd logo
1  sur  18
A Gift of Fire
5.4 Whose Laws Rule the Web?
By: Hasan Dang
Sara Base: A Gift of Fire pgs. 258-267
Outline
5.4.1 Digital Actions Cross Borders
5.4.2 Libel, Speech, and Commercial Law
5.4.3 Culture, Law, and Ethics
5.4.4 Potential Solutions
5.4.1 When Digital Actions Cross Borders
Multinational corporations and tourist have
always had to learn about and comply with the
laws of countries they operated in or visited.
At home, in the past, they only had to deal with
their home country’s laws.
The Web changed that…
5.4.1 When Digital
Actions Cross Borders
Which countries laws
should apply when web
content crosses
borders?
Areas in which national
laws differ:
o Content Control/ Censorship
o Intellectual Property
o Gambling
o Hacking/Viruses
o Libel
o Privacy
o Commerce
o Spam
5.4.1 When Digital Actions Cross Borders
5.4.1 Whose Laws Rule the Web
Responsibility to Prevent Access:
- It is the responsibility of providers of service and information to
make sure their material is not accessible in countries where it is
illegal.
5.4.1 When Digital Actions Cross Borders
ILOVEYOU Virus:
o Infected millions of computers world wide in 2000.
o Destroyed files, collected passwords, and snarled
computers at major corporations and government
agencies.
o Prosecutors dropped charges against the Philippine man
responsible because the Philippines at the time had no
laws against releasing viruses.
Yahoo vs. France
Display and sale of Nazi memorabilia is illegal in France
and Germany.
o Two antiracism organizations sued Yahoo in a French
court in 1999 because French people could view Nazi
memorabilia being offered for sale on Yahoo’s U.S.
based auction.
o Yahoo’s Argument: It is not technically feasible to block
France from accessing Yahoo. Use of filters would not be
able to distinguish references to Nazis in hate material,
references in The Diary of Anne Frank, or holocaust
memorials.
Yahoo vs. France cont.
o Legal Issues: Should French law apply to Yahoo auction
sites on Yahoo’s computers located outside of France?
o Results: Criminal against Yahoo and former CEO Tim
Koogle were dismissed. Yahoo and Koogle were
acquitted and the court decided that permitting the
auction was not “justifying” the Nazi crimes.
5.4.2 Libel, Speech, and Commercial
Law
Differences among free countries
Libel- Written defamation Slander- Verbal defamation
The U.S. has a strong protection for freedom of speech and expression of opinion.
Public figures such as politicians and entertainers, have less libel protection than
other people. The reasoning is that vigorous, open debate- ultimately freedom- would
suffer if people could not express strong opinions about prominent people.
English and Australian law on the other hand, place more emphasis on protecting
reputations.
The burden of proof differs in different countries. In the U.S., the person who is suing
has the burden of proving the case.
Public figures in the U.S. must prove the published information is false and that the
publisher knew it was false. Libel Law in other countries requires that the publisher
of the statement prove it is true or that the publisher reasonably believed it to be
true.
Libel law as a threat to free speech
The differences in libel laws amongst different countries have
caused a phenomenon called Libel Tourism.
Libel Tourism: The person or business being sued is not located
in the country the case was established.
Example: A U.S. publisher published a book in the U.S. about
funding of terrorism. A few people in England purchased copies
over the web. A Saudi banker who, according to the book,
helped fund Osama bin Laden, brought a libel suit in England
against the author and won. The content was posted outside of
England, but the content was still accessible.
Such lawsuits impede freedom of speech for people in countries
other than England where the libel suit would have failed.
Libel law as a threat to free speech cont.
The abuse of the libel law led to passage of the SPEECH Act of
2010, which makes foreign libel judgments unenforceable in the
U.S. if they violate the First Amendment.
o But if U.S. courts do not enforce such foreign court decisions,
foreign governments can seize assets of U.S. companies that are
in their country or arrest visiting individuals.
Location of a trial is highly important even when countries have
similar laws. A trial in a foreign country means high travel and legal
expenses.
In the U.S. libel cases where two parties are from different states
the court will often rule that the trial be held where the damages
take place. This would make sense for international cases as well
but only in reasonable free countries like the U.S., England, and
Australia.
Libel law as a threat to free speech cont.
But what happens if the country is not like ours, and uses
strict libel laws for political purposes?
Saudi Arabia: Bans “anything damaging to the dignity of
head of state.”
Russia: It is a crime to slander government
officials.
Singapore: Government officials often use libel laws to
bankrupt critical opposition
The European Union (EU) severely restricts advertising of medical drugs
and devices directed to consumers.
Some countries prohibit or restrict direct price comparisons, product
giveaways, and contributions to charity.
Should commercial websites with drug ads or price comparison have to
screen out shoppers from countries where the are illegal?
5.4.3. Culture, Law, and Ethics
If publishers must comply with the laws of almost 200
countries, would they protect themselves by avoiding
anything controversial?
The fear is that this would destroy the openness and
global information flow of the internet.
5.4.3 Culture, Law, and Ethics
Jack Goldsmith and Tim Wu, in their book Who Controls
the Internet?, argue that the
“global network is becoming a collection of
nation-state networks”
5.4.4 Potential Solutions
International agreements: Can set a common standard or
means of resolving international cases among the countries that
sign them.
An alternative principle to responsibility to prevent access
Authority to prevent entry: The government of Country A
can act within Country A to try to block the entrance of material
that is illegal there, but may not apply its laws to the people
who create and publish the material, or provide a service, in
Country B if it is legal there.
5.4.4 Potential Solutions
If influential countries like
the United States and France,
for example, adopted this
principle and refrained from
arresting visiting foreigners,
their example could apply
pressure to less free countries
to do the same.

Contenu connexe

Tendances

Same sex marriage
Same sex marriageSame sex marriage
Same sex marriagetawnisalas
 
The War on Drugs
The War on DrugsThe War on Drugs
The War on Drugsrandsofia
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
History of internet
History of internetHistory of internet
History of internetBoopathi Nsb
 
Mobile computing
Mobile computingMobile computing
Mobile computingEeshasri97
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operationInqilab Patel
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Different Types of Websites
Different Types of WebsitesDifferent Types of Websites
Different Types of WebsitesNeil Lohana
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 

Tendances (20)

Same sex marriage
Same sex marriageSame sex marriage
Same sex marriage
 
Online freedom of expression
Online freedom of expressionOnline freedom of expression
Online freedom of expression
 
The War on Drugs
The War on DrugsThe War on Drugs
The War on Drugs
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
History of internet
History of internetHistory of internet
History of internet
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 
Gambling
GamblingGambling
Gambling
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Wap
WapWap
Wap
 
Project loon
Project loonProject loon
Project loon
 
Different Types of Websites
Different Types of WebsitesDifferent Types of Websites
Different Types of Websites
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 

En vedette

Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpointmortgagerateutah
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protectioncaretocontinue
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelVidaB
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.NCCPPR
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespiteNowGreg
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Age Action
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryMeiling XU
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial AbuseMegan Yip
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PPKatelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALGina Leymeister
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouzadyutirajagiri
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomicsdpirouz
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation rexnayee
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceStephen Kinsella
 

En vedette (20)

Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making Theory
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial Abuse
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
Elder Abuse on the Front Lines
Elder Abuse on the Front LinesElder Abuse on the Front Lines
Elder Abuse on the Front Lines
 
Senior scams
Senior scamsSenior scams
Senior scams
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
What is neuroeconomics
What is neuroeconomicsWhat is neuroeconomics
What is neuroeconomics
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L Neurofinance
 

Similaire à 5.4 whose laws rule the web

Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?CubReporters.org
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LDTed Roe
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Arab Defamation Law
Arab Defamation Law Arab Defamation Law
Arab Defamation Law Matt J. Duffy
 
Cover Page For Apa Style Research Paper - 100 Co
Cover Page For Apa Style Research Paper - 100 CoCover Page For Apa Style Research Paper - 100 Co
Cover Page For Apa Style Research Paper - 100 CoMiz Hester
 
Examples Of Catchy Essay Titles
Examples Of Catchy Essay TitlesExamples Of Catchy Essay Titles
Examples Of Catchy Essay TitlesLisa Wera
 
Ch.01 private and public international law
Ch.01 private and public international lawCh.01 private and public international law
Ch.01 private and public international lawAsmatullah Kakar
 
Canadian or American multinationals’ accountability in canada or the usa for ...
Canadian or American multinationals’ accountability in canada or the usa for ...Canadian or American multinationals’ accountability in canada or the usa for ...
Canadian or American multinationals’ accountability in canada or the usa for ...Shirley Li
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate statesIlya Ponomarev
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared TawnaDelatorrejs
 
Chapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxChapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxketurahhazelhurst
 
R I. D V I E Wwhen is different just different, andwhen .docx
R I. D V I E Wwhen is different just different, andwhen .docxR I. D V I E Wwhen is different just different, andwhen .docx
R I. D V I E Wwhen is different just different, andwhen .docxmakdul
 
Legal and ethical constraints in the creative media sector
Legal and ethical constraints in the creative media sectorLegal and ethical constraints in the creative media sector
Legal and ethical constraints in the creative media sectorReeceEcR
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxbissacr
 

Similaire à 5.4 whose laws rule the web (18)

Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?
 
064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD064-066-IPM_July_August_2013-LD
064-066-IPM_July_August_2013-LD
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Arab Defamation Law
Arab Defamation Law Arab Defamation Law
Arab Defamation Law
 
Cover Page For Apa Style Research Paper - 100 Co
Cover Page For Apa Style Research Paper - 100 CoCover Page For Apa Style Research Paper - 100 Co
Cover Page For Apa Style Research Paper - 100 Co
 
Examples Of Catchy Essay Titles
Examples Of Catchy Essay TitlesExamples Of Catchy Essay Titles
Examples Of Catchy Essay Titles
 
Ch.01 private and public international law
Ch.01 private and public international lawCh.01 private and public international law
Ch.01 private and public international law
 
Canadian or American multinationals’ accountability in canada or the usa for ...
Canadian or American multinationals’ accountability in canada or the usa for ...Canadian or American multinationals’ accountability in canada or the usa for ...
Canadian or American multinationals’ accountability in canada or the usa for ...
 
2010 US Congress on pirate states
2010 US Congress on pirate states2010 US Congress on pirate states
2010 US Congress on pirate states
 
Race powerpoint
Race powerpointRace powerpoint
Race powerpoint
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared Chapter 3Freedom of SpeechBased on slides prepared
Chapter 3Freedom of SpeechBased on slides prepared
 
Chapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docxChapter 3Freedom of SpeechBased on slides prepared .docx
Chapter 3Freedom of SpeechBased on slides prepared .docx
 
R I. D V I E Wwhen is different just different, andwhen .docx
R I. D V I E Wwhen is different just different, andwhen .docxR I. D V I E Wwhen is different just different, andwhen .docx
R I. D V I E Wwhen is different just different, andwhen .docx
 
Legal and ethical constraints in the creative media sector
Legal and ethical constraints in the creative media sectorLegal and ethical constraints in the creative media sector
Legal and ethical constraints in the creative media sector
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docxCHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
CHAPTER 7 Criminal Law and CybercrimeNew York Police Departmen.docx
 

Dernier

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Dernier (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

5.4 whose laws rule the web

  • 1. A Gift of Fire 5.4 Whose Laws Rule the Web? By: Hasan Dang Sara Base: A Gift of Fire pgs. 258-267
  • 2. Outline 5.4.1 Digital Actions Cross Borders 5.4.2 Libel, Speech, and Commercial Law 5.4.3 Culture, Law, and Ethics 5.4.4 Potential Solutions
  • 3. 5.4.1 When Digital Actions Cross Borders Multinational corporations and tourist have always had to learn about and comply with the laws of countries they operated in or visited. At home, in the past, they only had to deal with their home country’s laws. The Web changed that…
  • 4. 5.4.1 When Digital Actions Cross Borders Which countries laws should apply when web content crosses borders?
  • 5. Areas in which national laws differ: o Content Control/ Censorship o Intellectual Property o Gambling o Hacking/Viruses o Libel o Privacy o Commerce o Spam 5.4.1 When Digital Actions Cross Borders
  • 6. 5.4.1 Whose Laws Rule the Web Responsibility to Prevent Access: - It is the responsibility of providers of service and information to make sure their material is not accessible in countries where it is illegal.
  • 7. 5.4.1 When Digital Actions Cross Borders ILOVEYOU Virus: o Infected millions of computers world wide in 2000. o Destroyed files, collected passwords, and snarled computers at major corporations and government agencies. o Prosecutors dropped charges against the Philippine man responsible because the Philippines at the time had no laws against releasing viruses.
  • 8. Yahoo vs. France Display and sale of Nazi memorabilia is illegal in France and Germany. o Two antiracism organizations sued Yahoo in a French court in 1999 because French people could view Nazi memorabilia being offered for sale on Yahoo’s U.S. based auction. o Yahoo’s Argument: It is not technically feasible to block France from accessing Yahoo. Use of filters would not be able to distinguish references to Nazis in hate material, references in The Diary of Anne Frank, or holocaust memorials.
  • 9. Yahoo vs. France cont. o Legal Issues: Should French law apply to Yahoo auction sites on Yahoo’s computers located outside of France? o Results: Criminal against Yahoo and former CEO Tim Koogle were dismissed. Yahoo and Koogle were acquitted and the court decided that permitting the auction was not “justifying” the Nazi crimes.
  • 10. 5.4.2 Libel, Speech, and Commercial Law Differences among free countries Libel- Written defamation Slander- Verbal defamation The U.S. has a strong protection for freedom of speech and expression of opinion. Public figures such as politicians and entertainers, have less libel protection than other people. The reasoning is that vigorous, open debate- ultimately freedom- would suffer if people could not express strong opinions about prominent people. English and Australian law on the other hand, place more emphasis on protecting reputations. The burden of proof differs in different countries. In the U.S., the person who is suing has the burden of proving the case. Public figures in the U.S. must prove the published information is false and that the publisher knew it was false. Libel Law in other countries requires that the publisher of the statement prove it is true or that the publisher reasonably believed it to be true.
  • 11. Libel law as a threat to free speech The differences in libel laws amongst different countries have caused a phenomenon called Libel Tourism. Libel Tourism: The person or business being sued is not located in the country the case was established. Example: A U.S. publisher published a book in the U.S. about funding of terrorism. A few people in England purchased copies over the web. A Saudi banker who, according to the book, helped fund Osama bin Laden, brought a libel suit in England against the author and won. The content was posted outside of England, but the content was still accessible. Such lawsuits impede freedom of speech for people in countries other than England where the libel suit would have failed.
  • 12. Libel law as a threat to free speech cont. The abuse of the libel law led to passage of the SPEECH Act of 2010, which makes foreign libel judgments unenforceable in the U.S. if they violate the First Amendment. o But if U.S. courts do not enforce such foreign court decisions, foreign governments can seize assets of U.S. companies that are in their country or arrest visiting individuals. Location of a trial is highly important even when countries have similar laws. A trial in a foreign country means high travel and legal expenses. In the U.S. libel cases where two parties are from different states the court will often rule that the trial be held where the damages take place. This would make sense for international cases as well but only in reasonable free countries like the U.S., England, and Australia.
  • 13. Libel law as a threat to free speech cont. But what happens if the country is not like ours, and uses strict libel laws for political purposes? Saudi Arabia: Bans “anything damaging to the dignity of head of state.” Russia: It is a crime to slander government officials. Singapore: Government officials often use libel laws to bankrupt critical opposition
  • 14. The European Union (EU) severely restricts advertising of medical drugs and devices directed to consumers. Some countries prohibit or restrict direct price comparisons, product giveaways, and contributions to charity. Should commercial websites with drug ads or price comparison have to screen out shoppers from countries where the are illegal?
  • 15. 5.4.3. Culture, Law, and Ethics If publishers must comply with the laws of almost 200 countries, would they protect themselves by avoiding anything controversial? The fear is that this would destroy the openness and global information flow of the internet.
  • 16. 5.4.3 Culture, Law, and Ethics Jack Goldsmith and Tim Wu, in their book Who Controls the Internet?, argue that the “global network is becoming a collection of nation-state networks”
  • 17. 5.4.4 Potential Solutions International agreements: Can set a common standard or means of resolving international cases among the countries that sign them. An alternative principle to responsibility to prevent access Authority to prevent entry: The government of Country A can act within Country A to try to block the entrance of material that is illegal there, but may not apply its laws to the people who create and publish the material, or provide a service, in Country B if it is legal there.
  • 18. 5.4.4 Potential Solutions If influential countries like the United States and France, for example, adopted this principle and refrained from arresting visiting foreigners, their example could apply pressure to less free countries to do the same.

Notes de l'éditeur

  1. Test notes
  2. Some of the areas in which national laws differ are:
  3. In several cases the governments are acting on the assumption of a principle called Responsibility to Prevent Access
  4. One of the very first cases that brought a spotlight to these issues was the ILOVEYOU Virus
  5. Another prominent case was Yahoovsfrance
  6. Goldsmith and Wu believe the Net will be more peaceful and productive if each country controls content within its borders according to its own history, culture, and values. I also agree with Goldsmith and Wu, the Internet is far to intricate for one nations laws to encompass the entirety of the net.
  7. Of course like anything there are weaknesses to this plan. Countries which lack up-to-date cybercrime laws will attract people who seek to commit international online crimes, like major frauds. The biggest obstacle is the amount of different laws from country to country it is nearly impossible to come up with a solution that will satisfy every ones needs.