SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Cyberlaw and Information
     Intermediaries
                Eddan Katz
      International Affairs Director
      Electronic Frontier Foundation
Cyberlaw

Intellectual Property
Telecommunications
Media Law
Cybercrime
Internet Jurisdiction
Netizen Rights

Freedom of Expression
Due Process
Privacy
Transparency
Consumer Protection
Access to Knowledge
Innovation
   Open Infrastructure
   Collaborative Production
Development
   Economic Growth
   Individual Autonomy
Regulating Behavior

 developing strategies to use human or institutional
 intermediaries
 indirectly regulate individual behavior by changing the
 technology itself
Traditional Gatekeeper Role

Whistleblower
Bouncer
Chaperone
Types of Information Intermediaries

Hosting Providers

Internet Service Providers   Search Engines

Domain Name Registrars       Participative Web Platforms

Financial Intermediaries     Virtual Worlds

Auction Platforms and        Distributed Computing
eCommerce actors             Social Networks
Immunity from Liability

Communications Decency Act §230 (1996)
   No provider or user of an interactive computer service shall be treated as the publisher
   or speaker of any information provided by another information content provider.

        1. The defendant must be a "provider or user" of an "interactive computer
        service."

        2. The cause of action asserted by the plaintiff must "treat" the defendant "as the
        publisher or speaker" of the harmful information at issue.

        3. The information must be "provided by another information content provider,"
        i.e., the defendant must not be the "information content provider" of the harmful
        information at issue.
Copyright Safe Harbor

Digital Millennium Copyright Act §512 (1998)
   Transitory Digital Network Communications
   System Cacheing
   Information Residing on Systems
   Information Location Tools
Notice & Takedown Procedure

Infringement Allegation Notice
   The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]

   The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an
   "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)
   (3)].

   Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].

   A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials
   complained of [512(c)(3)(A)(v)].

   A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is
   authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Counter-Notice & Putback Proecdure

Counter-Notice Requirements
    The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]

    Identification of the material and its location before removal [512(g)(3)(B)]

    A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)
    (3)(C)]

    Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)
    (D)]

Putback
    [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service
    provider is then required to restore the material to its location on its network. [512(g)(2)(C)]
Trademark Infringement

Lanham Act 32(2)
   (B) Where the infringement or violation complained of is contained in or is part of paid advertising matter in a
   newspaper, magazine, or other similar periodical or in an electronic communication as defined in section
   2510(12) of title 18, United States Code, the remedies of the owner of the right infringed or person bringing
   the action under section 43(a) [15 USC 1125(a)] as against the publisher or distributor of such newspaper,
   magazine, or other similar periodical or electronic communication shall be limited to an injunction against the
   presentation of such advertising matter in future issues of such newspapers, magazines, or other similar
   periodicals or in future transmissions of such electronic communications. The limitations of this subparagraph
   shall apply only to innocent infringers and innocent violators.
Netizen Rights (redux)

Freedom of Expression
Due Process
Privacy
Transparency
Consumer Protection
Freedom of Expression

Freedom of Speech
Right to Read
Chilling Effects
Democratic Culture
Anonymity
Due Process

Notice of Procedure
Specificity of Claims
Right to Appeal
Redress for Abuse/Misuse of Law
Privacy
Notice/Disclosure/Collection Limitation
   Mandatory Disclosure of Personal Data
Choice/Consent
Access
Security/Integrity
Enforcement/Redress
Transparency

Arbitrary Application of Law
Conflicts of Interest
Accountability
Accuracy
Consumer Protection

Anti-Competitive Behavior
False Advertising
Contracts of Adhesion/Terms of Service
Unconscionable Terms
Open Innovation
End-to-End Principle
Interoperability           Freedom to Tinker
Creative Destruction       Distributed Responsibility

Level Playing Field        Self-Organizing Community
Collaborative Production   Reputation Economies

Modularity                 Correctability
Granularity
Domestic Economic Growth

Translation
Adaptability to Local Customs
Network Effects
Open Standards
Skill Development
Thank you.
Eddan Katz
   eddan@eff.org
Danny O’Brien
   danny@eff.org

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)franciscronje
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Naavi theory regulated_anonymity
Naavi theory regulated_anonymityNaavi theory regulated_anonymity
Naavi theory regulated_anonymityVijayashankar Na
 
Information Sharing Licenses
Information Sharing LicensesInformation Sharing Licenses
Information Sharing LicensesRobbie Harris
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and CommerceEndcode_org
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesCaroline B Ncube
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Chad Gilles
 

Was ist angesagt? (20)

Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contracts
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
It act 2000
It act 2000It act 2000
It act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Naavi theory regulated_anonymity
Naavi theory regulated_anonymityNaavi theory regulated_anonymity
Naavi theory regulated_anonymity
 
Information Sharing Licenses
Information Sharing LicensesInformation Sharing Licenses
Information Sharing Licenses
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
 
E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
E contracts
E contractsE contracts
E contracts
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 

Ähnlich wie Cyberlaw and Information Intermediaries

Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1Eddan Katz
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
The Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethThe Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethJaburgWilk
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...KenfoxLaw
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009scottsicle
 
Soc Dev Camp Power Point
Soc Dev Camp Power PointSoc Dev Camp Power Point
Soc Dev Camp Power PointDaliahSaper
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Ananatu license en
Ananatu license enAnanatu license en
Ananatu license eninvirtual1
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...recoveraccount1
 
Contract for the web
Contract for the webContract for the web
Contract for the webMassa Critica
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V EsBrian Rowe
 

Ähnlich wie Cyberlaw and Information Intermediaries (20)

Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
The Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethThe Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi Speth
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Cyber law
Cyber lawCyber law
Cyber law
 
Human Resource Information System
Human Resource Information SystemHuman Resource Information System
Human Resource Information System
 
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
Takedown Notices - How Do ISPs Handle Copyright Infringement Claims in Vietna...
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Soc Dev Camp Power Point
Soc Dev Camp Power PointSoc Dev Camp Power Point
Soc Dev Camp Power Point
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Ananatu license en
Ananatu license enAnanatu license en
Ananatu license en
 
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippi...
 
Contract for the web
Contract for the webContract for the web
Contract for the web
 
Ip Enforcement In V Es
Ip Enforcement In V EsIp Enforcement In V Es
Ip Enforcement In V Es
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Mehr von Sarinee Achavanuntakul

Forest carbon credits: can it be fair without greenwashing?
Forest carbon credits: can it be fair without greenwashing? Forest carbon credits: can it be fair without greenwashing?
Forest carbon credits: can it be fair without greenwashing? Sarinee Achavanuntakul
 
How to make BCG consistent with sustainable development?
How to make BCG consistent with sustainable development?How to make BCG consistent with sustainable development?
How to make BCG consistent with sustainable development?Sarinee Achavanuntakul
 
PPP and Questions on Nam Yuam Diversion Project
PPP and Questions on Nam Yuam Diversion ProjectPPP and Questions on Nam Yuam Diversion Project
PPP and Questions on Nam Yuam Diversion ProjectSarinee Achavanuntakul
 
Future of "digital economy" in Thailand
Future of "digital economy" in ThailandFuture of "digital economy" in Thailand
Future of "digital economy" in ThailandSarinee Achavanuntakul
 
Introduction to CSR and Sustainable Business
Introduction to CSR and Sustainable BusinessIntroduction to CSR and Sustainable Business
Introduction to CSR and Sustainable BusinessSarinee Achavanuntakul
 
ESG Risks and Thai Banks: Time to Walk the Talk
ESG Risks and Thai Banks: Time to Walk the TalkESG Risks and Thai Banks: Time to Walk the Talk
ESG Risks and Thai Banks: Time to Walk the TalkSarinee Achavanuntakul
 
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้Sarinee Achavanuntakul
 
Thailand Internet Governance: from Monologue to Dialogue
Thailand Internet Governance: from Monologue to DialogueThailand Internet Governance: from Monologue to Dialogue
Thailand Internet Governance: from Monologue to DialogueSarinee Achavanuntakul
 
Pursuing retail banking with social responsibility
Pursuing retail banking with social responsibilityPursuing retail banking with social responsibility
Pursuing retail banking with social responsibilitySarinee Achavanuntakul
 
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์Sarinee Achavanuntakul
 
SDGs and Sustainable Business Trends 2016
SDGs and Sustainable Business Trends 2016SDGs and Sustainable Business Trends 2016
SDGs and Sustainable Business Trends 2016Sarinee Achavanuntakul
 
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทย
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทยจาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทย
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทยSarinee Achavanuntakul
 
The Place of Museum in the Digital Age
The Place of Museum in the Digital AgeThe Place of Museum in the Digital Age
The Place of Museum in the Digital AgeSarinee Achavanuntakul
 
Museum for Whom? Thoughts from A Museum Lover
Museum for Whom? Thoughts from A Museum LoverMuseum for Whom? Thoughts from A Museum Lover
Museum for Whom? Thoughts from A Museum LoverSarinee Achavanuntakul
 
Introducing "Sustainable Banking Network Thailand" and trends
Introducing "Sustainable Banking Network Thailand" and trendsIntroducing "Sustainable Banking Network Thailand" and trends
Introducing "Sustainable Banking Network Thailand" and trendsSarinee Achavanuntakul
 
Thai banks "green loan" for energy sector
Thai banks "green loan" for energy sectorThai banks "green loan" for energy sector
Thai banks "green loan" for energy sectorSarinee Achavanuntakul
 

Mehr von Sarinee Achavanuntakul (20)

Forest carbon credits: can it be fair without greenwashing?
Forest carbon credits: can it be fair without greenwashing? Forest carbon credits: can it be fair without greenwashing?
Forest carbon credits: can it be fair without greenwashing?
 
How to make BCG consistent with sustainable development?
How to make BCG consistent with sustainable development?How to make BCG consistent with sustainable development?
How to make BCG consistent with sustainable development?
 
PPP and Questions on Nam Yuam Diversion Project
PPP and Questions on Nam Yuam Diversion ProjectPPP and Questions on Nam Yuam Diversion Project
PPP and Questions on Nam Yuam Diversion Project
 
2021 Coal Situation & Investor View
2021 Coal Situation & Investor View2021 Coal Situation & Investor View
2021 Coal Situation & Investor View
 
Thai Household Debt & COVID-19
Thai Household Debt & COVID-19Thai Household Debt & COVID-19
Thai Household Debt & COVID-19
 
Future of "digital economy" in Thailand
Future of "digital economy" in ThailandFuture of "digital economy" in Thailand
Future of "digital economy" in Thailand
 
Introduction to CSR and Sustainable Business
Introduction to CSR and Sustainable BusinessIntroduction to CSR and Sustainable Business
Introduction to CSR and Sustainable Business
 
ESG Risks and Thai Banks: Time to Walk the Talk
ESG Risks and Thai Banks: Time to Walk the TalkESG Risks and Thai Banks: Time to Walk the Talk
ESG Risks and Thai Banks: Time to Walk the Talk
 
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้
Joseph Stiglitz กับความเหลื่อมล้ำที่เราเลือกได้
 
Thailand Internet Governance: from Monologue to Dialogue
Thailand Internet Governance: from Monologue to DialogueThailand Internet Governance: from Monologue to Dialogue
Thailand Internet Governance: from Monologue to Dialogue
 
Pursuing retail banking with social responsibility
Pursuing retail banking with social responsibilityPursuing retail banking with social responsibility
Pursuing retail banking with social responsibility
 
"Thailand 4.0" : Buzz vs. Reality
"Thailand 4.0" : Buzz vs. Reality"Thailand 4.0" : Buzz vs. Reality
"Thailand 4.0" : Buzz vs. Reality
 
Game & Social Problems
Game & Social ProblemsGame & Social Problems
Game & Social Problems
 
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์
กลไกทางการเงินในการสนับสนุนเกษตรกรให้เข้าสู่เกษตรอินทรีย์
 
SDGs and Sustainable Business Trends 2016
SDGs and Sustainable Business Trends 2016SDGs and Sustainable Business Trends 2016
SDGs and Sustainable Business Trends 2016
 
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทย
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทยจาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทย
จาก SDGs ถึง COP21: โอกาสและความท้าทายของธุรกิจไทย
 
The Place of Museum in the Digital Age
The Place of Museum in the Digital AgeThe Place of Museum in the Digital Age
The Place of Museum in the Digital Age
 
Museum for Whom? Thoughts from A Museum Lover
Museum for Whom? Thoughts from A Museum LoverMuseum for Whom? Thoughts from A Museum Lover
Museum for Whom? Thoughts from A Museum Lover
 
Introducing "Sustainable Banking Network Thailand" and trends
Introducing "Sustainable Banking Network Thailand" and trendsIntroducing "Sustainable Banking Network Thailand" and trends
Introducing "Sustainable Banking Network Thailand" and trends
 
Thai banks "green loan" for energy sector
Thai banks "green loan" for energy sectorThai banks "green loan" for energy sector
Thai banks "green loan" for energy sector
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Cyberlaw and Information Intermediaries

  • 1. Cyberlaw and Information Intermediaries Eddan Katz International Affairs Director Electronic Frontier Foundation
  • 3. Netizen Rights Freedom of Expression Due Process Privacy Transparency Consumer Protection
  • 4. Access to Knowledge Innovation Open Infrastructure Collaborative Production Development Economic Growth Individual Autonomy
  • 5. Regulating Behavior developing strategies to use human or institutional intermediaries indirectly regulate individual behavior by changing the technology itself
  • 7. Types of Information Intermediaries Hosting Providers Internet Service Providers Search Engines Domain Name Registrars Participative Web Platforms Financial Intermediaries Virtual Worlds Auction Platforms and Distributed Computing eCommerce actors Social Networks
  • 8. Immunity from Liability Communications Decency Act §230 (1996) No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. 1. The defendant must be a "provider or user" of an "interactive computer service." 2. The cause of action asserted by the plaintiff must "treat" the defendant "as the publisher or speaker" of the harmful information at issue. 3. The information must be "provided by another information content provider," i.e., the defendant must not be the "information content provider" of the harmful information at issue.
  • 9. Copyright Safe Harbor Digital Millennium Copyright Act §512 (1998) Transitory Digital Network Communications System Cacheing Information Residing on Systems Information Location Tools
  • 10. Notice & Takedown Procedure Infringement Allegation Notice The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)] The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d) (3)]. Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)]. A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)]. A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
  • 11. Counter-Notice & Putback Proecdure Counter-Notice Requirements The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)] Identification of the material and its location before removal [512(g)(3)(B)] A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g) (3)(C)] Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3) (D)] Putback [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]
  • 12. Trademark Infringement Lanham Act 32(2) (B) Where the infringement or violation complained of is contained in or is part of paid advertising matter in a newspaper, magazine, or other similar periodical or in an electronic communication as defined in section 2510(12) of title 18, United States Code, the remedies of the owner of the right infringed or person bringing the action under section 43(a) [15 USC 1125(a)] as against the publisher or distributor of such newspaper, magazine, or other similar periodical or electronic communication shall be limited to an injunction against the presentation of such advertising matter in future issues of such newspapers, magazines, or other similar periodicals or in future transmissions of such electronic communications. The limitations of this subparagraph shall apply only to innocent infringers and innocent violators.
  • 13. Netizen Rights (redux) Freedom of Expression Due Process Privacy Transparency Consumer Protection
  • 14. Freedom of Expression Freedom of Speech Right to Read Chilling Effects Democratic Culture Anonymity
  • 15. Due Process Notice of Procedure Specificity of Claims Right to Appeal Redress for Abuse/Misuse of Law
  • 16. Privacy Notice/Disclosure/Collection Limitation Mandatory Disclosure of Personal Data Choice/Consent Access Security/Integrity Enforcement/Redress
  • 17. Transparency Arbitrary Application of Law Conflicts of Interest Accountability Accuracy
  • 18. Consumer Protection Anti-Competitive Behavior False Advertising Contracts of Adhesion/Terms of Service Unconscionable Terms
  • 19. Open Innovation End-to-End Principle Interoperability Freedom to Tinker Creative Destruction Distributed Responsibility Level Playing Field Self-Organizing Community Collaborative Production Reputation Economies Modularity Correctability Granularity
  • 20. Domestic Economic Growth Translation Adaptability to Local Customs Network Effects Open Standards Skill Development
  • 21. Thank you. Eddan Katz eddan@eff.org Danny O’Brien danny@eff.org