SlideShare une entreprise Scribd logo
1  sur  21
Biomatrix v. Costanza “cybersmear” By  Seda SESGÖR C.Handan YILMAZ On  Freedom of Speech in Cyberspace 17.12.2007
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Biomatrix v. Costanza ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Biomatrix v. Costanza cont’d…
[object Object],[object Object],[object Object],[object Object],[object Object],Biomatrix v. Costanza cont’d…
Biomatrix v. Costanza cont’d… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Former Biomatrix Employees The court rejected the both arguments
[object Object],[object Object],[object Object],[object Object],[object Object],Biomatrix v. Costanza cont’d…
Laws and Legal Regulations in U.S related to Cybersmear Cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],To learn the identities of owners of defamatory speech….
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],ACLU roled as Amici Curiae in Biomatrix v. Costanza Case in order to balance the harm of Biomatirx and anonymity of BMX Police……..
a court should  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other Laws on Freedom of Speech in Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Situation In EU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],47 MEMBER STATES  
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Situation In EU ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Situation  in Turkey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Freedom of Speech Privacy LAW  (25)  everyone  is free in their thoughts in terms of freedom of speech . LAW  (301)  anyone who has a malicious saying about Turkish nationality, republic,  Turkish National Assembly (TBMM), military or security is founded guilty and imprisoned between six months and three years.  Monitoring Conflict between Madde 301 & Madde 25
Ethical Theories In Society Than Anonymity Supporters Opponents  It allows to hide those  who have a malicious intend Gives support to freedom of speech Anonymity Free on Cyber Space
Ethical Theories Ethical Distributive justice Deontology Teleology (Utilitarianism) Objectivism Unethical Ethical Guidelines ,[object Object],[object Object],[object Object],[object Object],Une thical
Final Words: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“… .best antidote to false speech is not censorship, that is less speech, but more speech out of which true speech will eventually emerge and prevail…” THANKS…

Contenu connexe

Tendances

Ethical Dilemmas and Web Marketing
Ethical Dilemmas and Web MarketingEthical Dilemmas and Web Marketing
Ethical Dilemmas and Web MarketingScott Wolfe
 
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360Jeremy Abay, Esq.
 
Social media legislation
Social media legislationSocial media legislation
Social media legislationyayayaya76
 
FT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFelicia Thomas
 
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLP
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLPWilliam M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLP
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLPworldwidebranding
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
2012 MSEC Legal Update
2012 MSEC Legal Update2012 MSEC Legal Update
2012 MSEC Legal UpdateMMMTechLaw
 
A Window Into Washington Antitrust Blog Article April 2010
A Window Into Washington Antitrust Blog Article April 2010A Window Into Washington Antitrust Blog Article April 2010
A Window Into Washington Antitrust Blog Article April 2010Heather Cooper
 
Devastation Caused by Liquidation of Integrity
Devastation Caused by Liquidation of IntegrityDevastation Caused by Liquidation of Integrity
Devastation Caused by Liquidation of IntegrityIain Stamp
 
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...Stan Caterbone
 
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesKanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesraspyyouth3234
 
The Form I 9 Compliance and E Verify
The Form I 9 Compliance and E VerifyThe Form I 9 Compliance and E Verify
The Form I 9 Compliance and E VerifyLauren Shreve
 
Legal and Ethical Research
Legal and Ethical ResearchLegal and Ethical Research
Legal and Ethical ResearchSarahMurrayy
 
12.6.1 gongwer news service signing of ohio texting law
12.6.1 gongwer news service   signing of ohio texting law12.6.1 gongwer news service   signing of ohio texting law
12.6.1 gongwer news service signing of ohio texting lawhmhollingsworth
 
SCOTUS / Media Law Update: 2008-2011
SCOTUS / Media Law Update: 2008-2011SCOTUS / Media Law Update: 2008-2011
SCOTUS / Media Law Update: 2008-2011CubReporters.org
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgesusanne kayser-schillegger
 

Tendances (18)

Ethical Dilemmas and Web Marketing
Ethical Dilemmas and Web MarketingEthical Dilemmas and Web Marketing
Ethical Dilemmas and Web Marketing
 
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360
Uber Won’t Get Arbitration For Philly Limo Driver Wage Suit - Law360
 
Social media legislation
Social media legislationSocial media legislation
Social media legislation
 
FT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal EnvironmentFT Week 7 Crital Thinking in the Legal Environment
FT Week 7 Crital Thinking in the Legal Environment
 
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLP
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLPWilliam M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLP
William M. Sullivan Jr. - Partner, Pillsbury Winthrop Shaw Pittman LLP
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
The business of government contracts
The business of government contractsThe business of government contracts
The business of government contracts
 
2012 MSEC Legal Update
2012 MSEC Legal Update2012 MSEC Legal Update
2012 MSEC Legal Update
 
A Window Into Washington Antitrust Blog Article April 2010
A Window Into Washington Antitrust Blog Article April 2010A Window Into Washington Antitrust Blog Article April 2010
A Window Into Washington Antitrust Blog Article April 2010
 
Devastation Caused by Liquidation of Integrity
Devastation Caused by Liquidation of IntegrityDevastation Caused by Liquidation of Integrity
Devastation Caused by Liquidation of Integrity
 
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...
Lambert MOTION to File SUMMARY JUDGEMENT by Movant Case No. 5-14-cv-02259 Sep...
 
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woesKanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
KanCare inspector general's past shaped by DUI, bankruptcy, ethics woes
 
The Form I 9 Compliance and E Verify
The Form I 9 Compliance and E VerifyThe Form I 9 Compliance and E Verify
The Form I 9 Compliance and E Verify
 
Legal and Ethical Research
Legal and Ethical ResearchLegal and Ethical Research
Legal and Ethical Research
 
12.6.1 gongwer news service signing of ohio texting law
12.6.1 gongwer news service   signing of ohio texting law12.6.1 gongwer news service   signing of ohio texting law
12.6.1 gongwer news service signing of ohio texting law
 
SCOTUS / Media Law Update: 2008-2011
SCOTUS / Media Law Update: 2008-2011SCOTUS / Media Law Update: 2008-2011
SCOTUS / Media Law Update: 2008-2011
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judge
 
Jun12 copy
Jun12 copyJun12 copy
Jun12 copy
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Mis417 Group1

  • 1. Biomatrix v. Costanza “cybersmear” By Seda SESGÖR C.Handan YILMAZ On Freedom of Speech in Cyberspace 17.12.2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Ethical Theories In Society Than Anonymity Supporters Opponents It allows to hide those who have a malicious intend Gives support to freedom of speech Anonymity Free on Cyber Space
  • 20.
  • 21.