SlideShare a Scribd company logo
1 of 21
Download to read offline
CYBER HARASSMENT


                          Bennet Kelley ‘89
     Georgetown University Law Center Reunion Weekend
Cyber
Harassment by
the Numbers
PERPETRATOR
  VICTIMS                 63.3% men
                        (where known)               DURATION
  72.5% women                                      Avg. – 2 Years
                       Half have no prior
44% 18-30 yrs old   relationship with victim
                      71% - no offline threats




                                            Source: HaltAbuse.org
Forms of Harassment

 Abusive Emails/IMs             Chat Room and Blog
                                  Posts
 Computer Attacks –
                                   Cyber smears (e.g.,
    viruses, hacking                Skanks in NYC)
   Crowding Out Benign            Disclosure of Private Facts
    Content                         (or photos)
   Cyber squatting or use of      Use/misuse of victim’s
                                    content
    identity
   Cyber Bullying
   Identity Theft
Remedies
             • Trespass
             • Fraud
Common       • Defamation
             • Invasion of Privacy/Infliction of Emotional Distress
  Law

             • Trademark/Copyright
  General    • Wire Fraud, RICO
 Statutory
 Authority

             • Anti-Cybersquatting Protection Act
             • Computer Fraud & Abuse Act
 Internet    • Identity Theft Enforcement and Restitution Act
  Crimes

             • Federal Laws Limited in Scope
             • State Cyber-Stalking and Cyber-Harassment Laws
Harassment
   Laws
Selected Federal Criminal Laws
  18 USC § 875 – prohibits       Violence Against Women
   threats to “injure the          Act Amendments (18 USC
   person” or “injure the          § 2261A) - prohibits acts
   property or reputation”         or course of conduct “with
     No private action            the intent to kill, injure,
                                   harass,” that causes
                                   “substantial emotional
  47 U.S.C. § 223 – prohibits     distress” or reasonable fear
   anonymous use of email to       of death or “serious bodily
   “annoy, abuse, harass, or       injury” to victim, family,
   threaten” (does not apply       spouse or intimate partner.
   to chat board posting)           Increased penalties for
     No private action              violating restraining order
                                    Only applies to interstate
                                     conduct
State Cyber Harassment Laws




Source: Congressional Research Service
State Cyber Stalking Laws




Source: Congressional Research Service
US v. Lori Drew
Or How a Missouri Mom Got a Trip to Disneyland
Misdemeanor Conviction Reversed
Misdemeanor Conviction Reversed
Civil v. Criminal Sanctions

 Criminal Law generally for acts offensive to
  society as a whole
   Remedy – Fine and Imprisonment
 Civil Law for remedying wrongs between
  individuals
   Remedy - Damages
 What happens when individuals cannot afford
  litigation?
  
Coach Thompson’s Garage
                                           GRRR




  IS IT SPEECH?                 IS IT A CRIME?

  IS PROPERTY DAMAGED?
  IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Coach Thompson’s Computer Screen
                                          ii sum valde
                                           iratus iam




 IS IT SPEECH?                IS IT A CRIME?

 IS PROPERTY DAMAGED?
 IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Criminal Defamation Laws




Source: First Amendment Center, Media Law Resource Center
Forgotten but not Gone




Source: Media Law Resource Center
First Amendment Issues




Source: Media Law Resource Center
Tips/Resources

 “Googling” Yourself    Use Social
   Contact Info          Networking Privacy
                          Tools
 Segregate Email
  Addresses              IC3.gov
 Key Word Alerts        HaltAbuse.org
 Trademark or Domain
  Monitor Services
Bennet Kelley
                                Bennet Kelley founded the Internet Law Center in 2007 after a
                                decade of activity in many of the hottest internet issues including
                                behavioral targeting, cyber squatting, net neutrality, privacy, spam
                                and spyware. Prior to launching the Internet Law Center, Bennet
                                worked in-house with companies such as ETM Entertainment
                                Network, SpeedyClick.com, Hi-Speed Media and ValueClick.

                                Bennet is Co-Chair of the California Bar's Cyberspace Committee
                                and has played a leading role in shaping Internet law and policy.
                                Bennet testified before the California Senate Business &
                                Professions Committee on its landmark 2003 spam legislation and
                                was praised by the House Energy & Commerce Committee for his
bkelley@internetlawcenter.net   contributions to federal spyware legislation. He also launched an
                                initiative through the Cyberspace Committee to develop a
                                cyberspace primer for incoming state legislators.

                                In addition, Bennet has extensive political experience that includes
                                serving as National Co-Chair of the Democratic National
                                Committee's Saxophone Club (its young professional fundraising
                                and outreach arm) during the Clinton era and being an award
                                winning political columnist for Huffington Post.
The Internet Law Center is dedicated to helping
                                         businesses navigate the evolving legal standards for
                                         today’s digital economy, while also contributing to the
                                         development of the policies of tomorrow. The firm
                                         serves a diverse client base that includes startups and
 WE KNOW THE INTERNET                    public companies both online and offline across North
                                         America and Asia.

Internet Law Center                      The professionals of the Internet Law Center possess
100 Wilshire Blvd., Suite 950            years of practical experience as lawyers and
Santa Monica, CA 90401
www.internetlawcenter.net                entrepreneurs with internet companies and have played
                                         a leading role in shaping Internet law and policy. This
Santa Monica Washington South Carolina
                                         unprecedented combination of business, legal and
                                         policy experience makes the Internet Law Center
                                         uniquely qualified to provide the professional advice
                                         needed to address emerging issues of internet law in
                                         an uncertain economy.

                                         Sign up for Cyber Report – our award winning newsletter
                                         which was named one of the Top 100 Internet Law
                                         Resources and re-launches this fall.

More Related Content

What's hot

National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the laworrhanna
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulationsWAQAR AHMED
 

What's hot (19)

Digital law
Digital lawDigital law
Digital law
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Digital law
Digital lawDigital law
Digital law
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Digital law
Digital lawDigital law
Digital law
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulations
 
Wills and estates law in the digital age
Wills and estates law in the digital ageWills and estates law in the digital age
Wills and estates law in the digital age
 

Viewers also liked (10)

Outfoxed
OutfoxedOutfoxed
Outfoxed
 
Representation slideshare
Representation slideshareRepresentation slideshare
Representation slideshare
 
Unit 1 Representations
Unit 1 RepresentationsUnit 1 Representations
Unit 1 Representations
 
Representation of Women in Disney
Representation of Women in DisneyRepresentation of Women in Disney
Representation of Women in Disney
 
Dystopian Genre
Dystopian GenreDystopian Genre
Dystopian Genre
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Agenda Setting Theory
Agenda Setting TheoryAgenda Setting Theory
Agenda Setting Theory
 
Representation of gender and stereotypes
Representation of gender and stereotypesRepresentation of gender and stereotypes
Representation of gender and stereotypes
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 

Similar to Cyber Harassment

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation ManagementInternet Law Center
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxzyleflorence
 

Similar to Cyber Harassment (20)

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation Management
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 

More from Bennet Kelley

Miami Book Fair - Upcoming Interviews
Miami Book Fair - Upcoming InterviewsMiami Book Fair - Upcoming Interviews
Miami Book Fair - Upcoming InterviewsBennet Kelley
 
America: In Search of Justice
America: In Search of JusticeAmerica: In Search of Justice
America: In Search of JusticeBennet Kelley
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawBennet Kelley
 
Republican Admissions on Voter Suppression
Republican Admissions on Voter SuppressionRepublican Admissions on Voter Suppression
Republican Admissions on Voter SuppressionBennet Kelley
 
Politics of health care reform
Politics of health care reformPolitics of health care reform
Politics of health care reformBennet Kelley
 
Election 2010: Just Say No
Election 2010: Just Say NoElection 2010: Just Say No
Election 2010: Just Say NoBennet Kelley
 
Understanding Climategate
Understanding ClimategateUnderstanding Climategate
Understanding ClimategateBennet Kelley
 
Smear Factor Episode 1: Anita Dunn
Smear Factor Episode 1: Anita DunnSmear Factor Episode 1: Anita Dunn
Smear Factor Episode 1: Anita DunnBennet Kelley
 
Net Neutrality Overview
Net Neutrality OverviewNet Neutrality Overview
Net Neutrality OverviewBennet Kelley
 
Online Advt: Year of Living. Dangerously
Online Advt: Year of Living. DangerouslyOnline Advt: Year of Living. Dangerously
Online Advt: Year of Living. DangerouslyBennet Kelley
 
Why the Torture Memos Matter
Why the Torture Memos MatterWhy the Torture Memos Matter
Why the Torture Memos MatterBennet Kelley
 
Republican Myths: #1 Obama is a Socialist
Republican Myths: #1 Obama is a SocialistRepublican Myths: #1 Obama is a Socialist
Republican Myths: #1 Obama is a SocialistBennet Kelley
 
Red Meets Blue Left Rt Perspective On 2008 Election
Red Meets Blue Left Rt Perspective On 2008 ElectionRed Meets Blue Left Rt Perspective On 2008 Election
Red Meets Blue Left Rt Perspective On 2008 ElectionBennet Kelley
 

More from Bennet Kelley (20)

Miami Book Fair - Upcoming Interviews
Miami Book Fair - Upcoming InterviewsMiami Book Fair - Upcoming Interviews
Miami Book Fair - Upcoming Interviews
 
Treaty of Paris
Treaty of ParisTreaty of Paris
Treaty of Paris
 
Brazil Overview
Brazil OverviewBrazil Overview
Brazil Overview
 
America: In Search of Justice
America: In Search of JusticeAmerica: In Search of Justice
America: In Search of Justice
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet Law
 
Republican Admissions on Voter Suppression
Republican Admissions on Voter SuppressionRepublican Admissions on Voter Suppression
Republican Admissions on Voter Suppression
 
Politics of health care reform
Politics of health care reformPolitics of health care reform
Politics of health care reform
 
Election 2010: Just Say No
Election 2010: Just Say NoElection 2010: Just Say No
Election 2010: Just Say No
 
Privacy 2010
Privacy 2010Privacy 2010
Privacy 2010
 
Understanding Climategate
Understanding ClimategateUnderstanding Climategate
Understanding Climategate
 
Smear Factor Episode 1: Anita Dunn
Smear Factor Episode 1: Anita DunnSmear Factor Episode 1: Anita Dunn
Smear Factor Episode 1: Anita Dunn
 
Net Neutrality Overview
Net Neutrality OverviewNet Neutrality Overview
Net Neutrality Overview
 
2010 Overview
2010 Overview2010 Overview
2010 Overview
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
Online Advt: Year of Living. Dangerously
Online Advt: Year of Living. DangerouslyOnline Advt: Year of Living. Dangerously
Online Advt: Year of Living. Dangerously
 
PLI Can Spam
PLI Can SpamPLI Can Spam
PLI Can Spam
 
Why the Torture Memos Matter
Why the Torture Memos MatterWhy the Torture Memos Matter
Why the Torture Memos Matter
 
Amazon Sales Tax
Amazon Sales TaxAmazon Sales Tax
Amazon Sales Tax
 
Republican Myths: #1 Obama is a Socialist
Republican Myths: #1 Obama is a SocialistRepublican Myths: #1 Obama is a Socialist
Republican Myths: #1 Obama is a Socialist
 
Red Meets Blue Left Rt Perspective On 2008 Election
Red Meets Blue Left Rt Perspective On 2008 ElectionRed Meets Blue Left Rt Perspective On 2008 Election
Red Meets Blue Left Rt Perspective On 2008 Election
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Cyber Harassment

  • 1. CYBER HARASSMENT Bennet Kelley ‘89 Georgetown University Law Center Reunion Weekend
  • 3. PERPETRATOR VICTIMS 63.3% men (where known) DURATION 72.5% women Avg. – 2 Years Half have no prior 44% 18-30 yrs old relationship with victim 71% - no offline threats Source: HaltAbuse.org
  • 4. Forms of Harassment  Abusive Emails/IMs  Chat Room and Blog Posts  Computer Attacks –  Cyber smears (e.g., viruses, hacking Skanks in NYC)  Crowding Out Benign  Disclosure of Private Facts Content (or photos)  Cyber squatting or use of  Use/misuse of victim’s content identity  Cyber Bullying  Identity Theft
  • 5.
  • 6. Remedies • Trespass • Fraud Common • Defamation • Invasion of Privacy/Infliction of Emotional Distress Law • Trademark/Copyright General • Wire Fraud, RICO Statutory Authority • Anti-Cybersquatting Protection Act • Computer Fraud & Abuse Act Internet • Identity Theft Enforcement and Restitution Act Crimes • Federal Laws Limited in Scope • State Cyber-Stalking and Cyber-Harassment Laws Harassment Laws
  • 7. Selected Federal Criminal Laws  18 USC § 875 – prohibits  Violence Against Women threats to “injure the Act Amendments (18 USC person” or “injure the § 2261A) - prohibits acts property or reputation” or course of conduct “with  No private action the intent to kill, injure, harass,” that causes “substantial emotional  47 U.S.C. § 223 – prohibits distress” or reasonable fear anonymous use of email to of death or “serious bodily “annoy, abuse, harass, or injury” to victim, family, threaten” (does not apply spouse or intimate partner. to chat board posting)  Increased penalties for  No private action violating restraining order  Only applies to interstate conduct
  • 8. State Cyber Harassment Laws Source: Congressional Research Service
  • 9. State Cyber Stalking Laws Source: Congressional Research Service
  • 10. US v. Lori Drew Or How a Missouri Mom Got a Trip to Disneyland
  • 13. Civil v. Criminal Sanctions  Criminal Law generally for acts offensive to society as a whole  Remedy – Fine and Imprisonment  Civil Law for remedying wrongs between individuals  Remedy - Damages  What happens when individuals cannot afford litigation? 
  • 14. Coach Thompson’s Garage GRRR IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 15. Coach Thompson’s Computer Screen ii sum valde iratus iam IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 16. Criminal Defamation Laws Source: First Amendment Center, Media Law Resource Center
  • 17. Forgotten but not Gone Source: Media Law Resource Center
  • 18. First Amendment Issues Source: Media Law Resource Center
  • 19. Tips/Resources  “Googling” Yourself  Use Social  Contact Info Networking Privacy Tools  Segregate Email Addresses  IC3.gov  Key Word Alerts  HaltAbuse.org  Trademark or Domain Monitor Services
  • 20. Bennet Kelley Bennet Kelley founded the Internet Law Center in 2007 after a decade of activity in many of the hottest internet issues including behavioral targeting, cyber squatting, net neutrality, privacy, spam and spyware. Prior to launching the Internet Law Center, Bennet worked in-house with companies such as ETM Entertainment Network, SpeedyClick.com, Hi-Speed Media and ValueClick. Bennet is Co-Chair of the California Bar's Cyberspace Committee and has played a leading role in shaping Internet law and policy. Bennet testified before the California Senate Business & Professions Committee on its landmark 2003 spam legislation and was praised by the House Energy & Commerce Committee for his bkelley@internetlawcenter.net contributions to federal spyware legislation. He also launched an initiative through the Cyberspace Committee to develop a cyberspace primer for incoming state legislators. In addition, Bennet has extensive political experience that includes serving as National Co-Chair of the Democratic National Committee's Saxophone Club (its young professional fundraising and outreach arm) during the Clinton era and being an award winning political columnist for Huffington Post.
  • 21. The Internet Law Center is dedicated to helping businesses navigate the evolving legal standards for today’s digital economy, while also contributing to the development of the policies of tomorrow. The firm serves a diverse client base that includes startups and WE KNOW THE INTERNET public companies both online and offline across North America and Asia. Internet Law Center The professionals of the Internet Law Center possess 100 Wilshire Blvd., Suite 950 years of practical experience as lawyers and Santa Monica, CA 90401 www.internetlawcenter.net entrepreneurs with internet companies and have played a leading role in shaping Internet law and policy. This Santa Monica Washington South Carolina unprecedented combination of business, legal and policy experience makes the Internet Law Center uniquely qualified to provide the professional advice needed to address emerging issues of internet law in an uncertain economy. Sign up for Cyber Report – our award winning newsletter which was named one of the Top 100 Internet Law Resources and re-launches this fall.