SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Review: Code and Other laws of Cyberspace   Version 2.0  Lawrence Lessig Building Legal Institutions for Information Technology: Defining the Intellectual Commons
Structure  ,[object Object],[object Object],[object Object],[object Object],[object Object]
One ,[object Object],[object Object],[object Object],[object Object]
Two ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Themes ,[object Object],[object Object],[object Object],[object Object]
Regulability
Architectures of Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Regulating Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Regulation by Code How the architecture of the net will make it easier for traditional regulation to happen.
Cyberspaces ,[object Object],[object Object],[object Object],[object Object],[object Object]
What things regulate The key to a good policy in cyberspace is a proper mix of modalities.
[object Object],[object Object]
The limits in open code ,[object Object],[object Object],[object Object],[object Object],[object Object]
Latent Ambiguities The ambiguity that forces us to choose between two very different conceptions of the value at stake.
Translation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object]
Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Speech ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free Speech ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Competing Sovereigns As more move online, the claims of one sovereign to control speech or behavior will increasingly conflict  with others
Sovereignty ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Competition among Sovereigns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responses There are choices about how the network should evolve. We are not capable of making those choices
Problems we face ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responses ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceCheldy S, Elumba-Pableo
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?CubReporters.org
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 
Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612rswhitt1
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationInternet Law Center
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 

Was ist angesagt? (20)

Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?Internet Jurisdiction: Who controls the Internet?
Internet Jurisdiction: Who controls the Internet?
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
110 koenig
110 koenig110 koenig
110 koenig
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612Whitt a deference to protocol revised journal draft december 2012 120612
Whitt a deference to protocol revised journal draft december 2012 120612
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Polinter10
Polinter10Polinter10
Polinter10
 
Polinter11
Polinter11Polinter11
Polinter11
 
Rkcsi2012
Rkcsi2012Rkcsi2012
Rkcsi2012
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
 

Ähnlich wie Building Legal Institutions for Information Technology

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)Felipe Prado
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)Masahiro Takeda
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsShoaib Sheikh
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityFOTIOS ZYGOULIS
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 

Ähnlich wie Building Legal Institutions for Information Technology (20)

E commerce
E commerceE commerce
E commerce
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Polinter02
Polinter02Polinter02
Polinter02
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Regulating code
Regulating codeRegulating code
Regulating code
 

Mehr von Ritesh Nayak

muhive - public launch at Unpluggd
muhive - public launch at Unpluggdmuhive - public launch at Unpluggd
muhive - public launch at UnpluggdRitesh Nayak
 
Fifthelephant teaser
Fifthelephant teaserFifthelephant teaser
Fifthelephant teaserRitesh Nayak
 
Non verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tipsNon verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tipsRitesh Nayak
 
muHack - Language translation over telephony
muHack - Language translation over telephonymuHack - Language translation over telephony
muHack - Language translation over telephonyRitesh Nayak
 
Panacea - Augmented Reality
Panacea - Augmented Reality Panacea - Augmented Reality
Panacea - Augmented Reality Ritesh Nayak
 
Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...Ritesh Nayak
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyRitesh Nayak
 
The Transformation of Work in the Information Age
The Transformation of Work in the Information AgeThe Transformation of Work in the Information Age
The Transformation of Work in the Information AgeRitesh Nayak
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Review of Book by Gary Fields
Review of Book by Gary FieldsReview of Book by Gary Fields
Review of Book by Gary FieldsRitesh Nayak
 
Book Reading - Does IT Matter - Nicholas Carr
Book Reading  - Does IT Matter - Nicholas CarrBook Reading  - Does IT Matter - Nicholas Carr
Book Reading - Does IT Matter - Nicholas CarrRitesh Nayak
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyRitesh Nayak
 
The Victorian Internet
The Victorian InternetThe Victorian Internet
The Victorian InternetRitesh Nayak
 
Software Products and the software bottleneck
Software Products and the software bottleneckSoftware Products and the software bottleneck
Software Products and the software bottleneckRitesh Nayak
 
Sucess of Open Source - Steven Weber (Book Review)
Sucess of Open Source - Steven Weber  (Book Review)Sucess of Open Source - Steven Weber  (Book Review)
Sucess of Open Source - Steven Weber (Book Review)Ritesh Nayak
 
Computing History Part 1
Computing History  Part 1Computing History  Part 1
Computing History Part 1Ritesh Nayak
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2Ritesh Nayak
 

Mehr von Ritesh Nayak (20)

muhive - public launch at Unpluggd
muhive - public launch at Unpluggdmuhive - public launch at Unpluggd
muhive - public launch at Unpluggd
 
Fifthelephant teaser
Fifthelephant teaserFifthelephant teaser
Fifthelephant teaser
 
Non verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tipsNon verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tips
 
muHack - Language translation over telephony
muHack - Language translation over telephonymuHack - Language translation over telephony
muHack - Language translation over telephony
 
Panacea - Augmented Reality
Panacea - Augmented Reality Panacea - Augmented Reality
Panacea - Augmented Reality
 
MAS
MASMAS
MAS
 
Big Kahuna
Big KahunaBig Kahuna
Big Kahuna
 
Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th Century
 
The Transformation of Work in the Information Age
The Transformation of Work in the Information AgeThe Transformation of Work in the Information Age
The Transformation of Work in the Information Age
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Review of Book by Gary Fields
Review of Book by Gary FieldsReview of Book by Gary Fields
Review of Book by Gary Fields
 
Book Reading - Does IT Matter - Nicholas Carr
Book Reading  - Does IT Matter - Nicholas CarrBook Reading  - Does IT Matter - Nicholas Carr
Book Reading - Does IT Matter - Nicholas Carr
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th Century
 
The Victorian Internet
The Victorian InternetThe Victorian Internet
The Victorian Internet
 
Thinking About It
Thinking About ItThinking About It
Thinking About It
 
Software Products and the software bottleneck
Software Products and the software bottleneckSoftware Products and the software bottleneck
Software Products and the software bottleneck
 
Sucess of Open Source - Steven Weber (Book Review)
Sucess of Open Source - Steven Weber  (Book Review)Sucess of Open Source - Steven Weber  (Book Review)
Sucess of Open Source - Steven Weber (Book Review)
 
Computing History Part 1
Computing History  Part 1Computing History  Part 1
Computing History Part 1
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2
 

Kürzlich hochgeladen

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Kürzlich hochgeladen (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Building Legal Institutions for Information Technology

  • 1. Review: Code and Other laws of Cyberspace Version 2.0 Lawrence Lessig Building Legal Institutions for Information Technology: Defining the Intellectual Commons
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10. Regulation by Code How the architecture of the net will make it easier for traditional regulation to happen.
  • 11.
  • 12. What things regulate The key to a good policy in cyberspace is a proper mix of modalities.
  • 13.
  • 14.
  • 15. Latent Ambiguities The ambiguity that forces us to choose between two very different conceptions of the value at stake.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Competing Sovereigns As more move online, the claims of one sovereign to control speech or behavior will increasingly conflict with others
  • 23.
  • 24.
  • 25. Responses There are choices about how the network should evolve. We are not capable of making those choices
  • 26.
  • 27.