SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
CYBER HARASSMENT


                          Bennet Kelley ‘89
     Georgetown University Law Center Reunion Weekend
Cyber
Harassment by
the Numbers
PERPETRATOR
  VICTIMS                 63.3% men
                        (where known)               DURATION
  72.5% women                                      Avg. – 2 Years
                       Half have no prior
44% 18-30 yrs old   relationship with victim
                      71% - no offline threats




                                            Source: HaltAbuse.org
Forms of Harassment

 Abusive Emails/IMs             Chat Room and Blog
                                  Posts
 Computer Attacks –
                                   Cyber smears (e.g.,
    viruses, hacking                Skanks in NYC)
   Crowding Out Benign            Disclosure of Private Facts
    Content                         (or photos)
   Cyber squatting or use of      Use/misuse of victim’s
                                    content
    identity
   Cyber Bullying
   Identity Theft
Remedies
             • Trespass
             • Fraud
Common       • Defamation
             • Invasion of Privacy/Infliction of Emotional Distress
  Law

             • Trademark/Copyright
  General    • Wire Fraud, RICO
 Statutory
 Authority

             • Anti-Cybersquatting Protection Act
             • Computer Fraud & Abuse Act
 Internet    • Identity Theft Enforcement and Restitution Act
  Crimes

             • Federal Laws Limited in Scope
             • State Cyber-Stalking and Cyber-Harassment Laws
Harassment
   Laws
Selected Federal Criminal Laws
  18 USC § 875 – prohibits       Violence Against Women
   threats to “injure the          Act Amendments (18 USC
   person” or “injure the          § 2261A) - prohibits acts
   property or reputation”         or course of conduct “with
     No private action            the intent to kill, injure,
                                   harass,” that causes
                                   “substantial emotional
  47 U.S.C. § 223 – prohibits     distress” or reasonable fear
   anonymous use of email to       of death or “serious bodily
   “annoy, abuse, harass, or       injury” to victim, family,
   threaten” (does not apply       spouse or intimate partner.
   to chat board posting)           Increased penalties for
     No private action              violating restraining order
                                    Only applies to interstate
                                     conduct
State Cyber Harassment Laws




Source: Congressional Research Service
State Cyber Stalking Laws




Source: Congressional Research Service
US v. Lori Drew
Or How a Missouri Mom Got a Trip to Disneyland
Misdemeanor Conviction Reversed
Misdemeanor Conviction Reversed
Civil v. Criminal Sanctions

 Criminal Law generally for acts offensive to
  society as a whole
   Remedy – Fine and Imprisonment
 Civil Law for remedying wrongs between
  individuals
   Remedy - Damages
 What happens when individuals cannot afford
  litigation?
  
Coach Thompson’s Garage
                                           GRRR




  IS IT SPEECH?                 IS IT A CRIME?

  IS PROPERTY DAMAGED?
  IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Coach Thompson’s Computer Screen
                                          ii sum valde
                                           iratus iam




 IS IT SPEECH?                IS IT A CRIME?

 IS PROPERTY DAMAGED?
 IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Criminal Defamation Laws




Source: First Amendment Center, Media Law Resource Center
Forgotten but not Gone




Source: Media Law Resource Center
First Amendment Issues




Source: Media Law Resource Center
Tips/Resources

 “Googling” Yourself    Use Social
   Contact Info          Networking Privacy
                          Tools
 Segregate Email
  Addresses              IC3.gov
 Key Word Alerts        HaltAbuse.org
 Trademark or Domain
  Monitor Services
Bennet Kelley
                                Bennet Kelley founded the Internet Law Center in 2007 after a
                                decade of activity in many of the hottest internet issues including
                                behavioral targeting, cyber squatting, net neutrality, privacy, spam
                                and spyware. Prior to launching the Internet Law Center, Bennet
                                worked in-house with companies such as ETM Entertainment
                                Network, SpeedyClick.com, Hi-Speed Media and ValueClick.

                                Bennet is Co-Chair of the California Bar's Cyberspace Committee
                                and has played a leading role in shaping Internet law and policy.
                                Bennet testified before the California Senate Business &
                                Professions Committee on its landmark 2003 spam legislation and
                                was praised by the House Energy & Commerce Committee for his
bkelley@internetlawcenter.net   contributions to federal spyware legislation. He also launched an
                                initiative through the Cyberspace Committee to develop a
                                cyberspace primer for incoming state legislators.

                                In addition, Bennet has extensive political experience that includes
                                serving as National Co-Chair of the Democratic National
                                Committee's Saxophone Club (its young professional fundraising
                                and outreach arm) during the Clinton era and being an award
                                winning political columnist for Huffington Post.
The Internet Law Center is dedicated to helping
                                         businesses navigate the evolving legal standards for
                                         today’s digital economy, while also contributing to the
                                         development of the policies of tomorrow. The firm
                                         serves a diverse client base that includes startups and
 WE KNOW THE INTERNET                    public companies both online and offline across North
                                         America and Asia.

Internet Law Center                      The professionals of the Internet Law Center possess
100 Wilshire Blvd., Suite 950            years of practical experience as lawyers and
Santa Monica, CA 90401
www.internetlawcenter.net                entrepreneurs with internet companies and have played
                                         a leading role in shaping Internet law and policy. This
Santa Monica Washington South Carolina
                                         unprecedented combination of business, legal and
                                         policy experience makes the Internet Law Center
                                         uniquely qualified to provide the professional advice
                                         needed to address emerging issues of internet law in
                                         an uncertain economy.

                                         Sign up for Cyber Report – our award winning newsletter
                                         which was named one of the Top 100 Internet Law
                                         Resources and re-launches this fall.

Contenu connexe

Tendances

National Campaign on Dalit Human Rights (NCDHR)
National Campaign on Dalit Human Rights (NCDHR)National Campaign on Dalit Human Rights (NCDHR)
National Campaign on Dalit Human Rights (NCDHR)Dasra
 
Social Media for Women Safety
Social Media for Women SafetySocial Media for Women Safety
Social Media for Women SafetyAmit Panchal
 
Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Talha Siddiqui
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Same Sex Marriage
Same Sex MarriageSame Sex Marriage
Same Sex MarriageEmi Loving
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Impact of social media in children's mental health
Impact of social media in children's mental healthImpact of social media in children's mental health
Impact of social media in children's mental healthKetamine Treatment
 
Presentation On Honor Killing
Presentation On Honor Killing Presentation On Honor Killing
Presentation On Honor Killing Naresh Biloniya
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibIlm Gah Foundation
 
Gender inequality (2)
Gender inequality (2)Gender inequality (2)
Gender inequality (2)Teddi Reed
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internetkramm_01
 

Tendances (20)

National Campaign on Dalit Human Rights (NCDHR)
National Campaign on Dalit Human Rights (NCDHR)National Campaign on Dalit Human Rights (NCDHR)
National Campaign on Dalit Human Rights (NCDHR)
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Social Media for Women Safety
Social Media for Women SafetySocial Media for Women Safety
Social Media for Women Safety
 
Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Safety of women, Crime Against womens.
Safety of women, Crime Against womens.
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Same Sex Marriage
Same Sex MarriageSame Sex Marriage
Same Sex Marriage
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Gender inequlity
Gender inequlityGender inequlity
Gender inequlity
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Impact of social media in children's mental health
Impact of social media in children's mental healthImpact of social media in children's mental health
Impact of social media in children's mental health
 
Presentation On Honor Killing
Presentation On Honor Killing Presentation On Honor Killing
Presentation On Honor Killing
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Intersectionality
IntersectionalityIntersectionality
Intersectionality
 
Gender inequality (2)
Gender inequality (2)Gender inequality (2)
Gender inequality (2)
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
Honor killing
Honor  killingHonor  killing
Honor killing
 

Similaire à CYBER HARASSMENT: AN OVERVIEW OF LAWS AND REMEDIES

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Similaire à CYBER HARASSMENT: AN OVERVIEW OF LAWS AND REMEDIES (20)

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 

Plus de Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Plus de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Dernier

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

CYBER HARASSMENT: AN OVERVIEW OF LAWS AND REMEDIES

  • 1. CYBER HARASSMENT Bennet Kelley ‘89 Georgetown University Law Center Reunion Weekend
  • 3. PERPETRATOR VICTIMS 63.3% men (where known) DURATION 72.5% women Avg. – 2 Years Half have no prior 44% 18-30 yrs old relationship with victim 71% - no offline threats Source: HaltAbuse.org
  • 4. Forms of Harassment  Abusive Emails/IMs  Chat Room and Blog Posts  Computer Attacks –  Cyber smears (e.g., viruses, hacking Skanks in NYC)  Crowding Out Benign  Disclosure of Private Facts Content (or photos)  Cyber squatting or use of  Use/misuse of victim’s content identity  Cyber Bullying  Identity Theft
  • 5.
  • 6. Remedies • Trespass • Fraud Common • Defamation • Invasion of Privacy/Infliction of Emotional Distress Law • Trademark/Copyright General • Wire Fraud, RICO Statutory Authority • Anti-Cybersquatting Protection Act • Computer Fraud & Abuse Act Internet • Identity Theft Enforcement and Restitution Act Crimes • Federal Laws Limited in Scope • State Cyber-Stalking and Cyber-Harassment Laws Harassment Laws
  • 7. Selected Federal Criminal Laws  18 USC § 875 – prohibits  Violence Against Women threats to “injure the Act Amendments (18 USC person” or “injure the § 2261A) - prohibits acts property or reputation” or course of conduct “with  No private action the intent to kill, injure, harass,” that causes “substantial emotional  47 U.S.C. § 223 – prohibits distress” or reasonable fear anonymous use of email to of death or “serious bodily “annoy, abuse, harass, or injury” to victim, family, threaten” (does not apply spouse or intimate partner. to chat board posting)  Increased penalties for  No private action violating restraining order  Only applies to interstate conduct
  • 8. State Cyber Harassment Laws Source: Congressional Research Service
  • 9. State Cyber Stalking Laws Source: Congressional Research Service
  • 10. US v. Lori Drew Or How a Missouri Mom Got a Trip to Disneyland
  • 13. Civil v. Criminal Sanctions  Criminal Law generally for acts offensive to society as a whole  Remedy – Fine and Imprisonment  Civil Law for remedying wrongs between individuals  Remedy - Damages  What happens when individuals cannot afford litigation? 
  • 14. Coach Thompson’s Garage GRRR IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 15. Coach Thompson’s Computer Screen ii sum valde iratus iam IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 16. Criminal Defamation Laws Source: First Amendment Center, Media Law Resource Center
  • 17. Forgotten but not Gone Source: Media Law Resource Center
  • 18. First Amendment Issues Source: Media Law Resource Center
  • 19. Tips/Resources  “Googling” Yourself  Use Social  Contact Info Networking Privacy Tools  Segregate Email Addresses  IC3.gov  Key Word Alerts  HaltAbuse.org  Trademark or Domain Monitor Services
  • 20. Bennet Kelley Bennet Kelley founded the Internet Law Center in 2007 after a decade of activity in many of the hottest internet issues including behavioral targeting, cyber squatting, net neutrality, privacy, spam and spyware. Prior to launching the Internet Law Center, Bennet worked in-house with companies such as ETM Entertainment Network, SpeedyClick.com, Hi-Speed Media and ValueClick. Bennet is Co-Chair of the California Bar's Cyberspace Committee and has played a leading role in shaping Internet law and policy. Bennet testified before the California Senate Business & Professions Committee on its landmark 2003 spam legislation and was praised by the House Energy & Commerce Committee for his bkelley@internetlawcenter.net contributions to federal spyware legislation. He also launched an initiative through the Cyberspace Committee to develop a cyberspace primer for incoming state legislators. In addition, Bennet has extensive political experience that includes serving as National Co-Chair of the Democratic National Committee's Saxophone Club (its young professional fundraising and outreach arm) during the Clinton era and being an award winning political columnist for Huffington Post.
  • 21. The Internet Law Center is dedicated to helping businesses navigate the evolving legal standards for today’s digital economy, while also contributing to the development of the policies of tomorrow. The firm serves a diverse client base that includes startups and WE KNOW THE INTERNET public companies both online and offline across North America and Asia. Internet Law Center The professionals of the Internet Law Center possess 100 Wilshire Blvd., Suite 950 years of practical experience as lawyers and Santa Monica, CA 90401 www.internetlawcenter.net entrepreneurs with internet companies and have played a leading role in shaping Internet law and policy. This Santa Monica Washington South Carolina unprecedented combination of business, legal and policy experience makes the Internet Law Center uniquely qualified to provide the professional advice needed to address emerging issues of internet law in an uncertain economy. Sign up for Cyber Report – our award winning newsletter which was named one of the Top 100 Internet Law Resources and re-launches this fall.