SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Revenge porn : punish, remove,
forget, forgive?
University of
Hertfordshire
July 2015
Lilian Edwards
Professor of E-
Governance
University of
Strathclyde, Glasgow
& Deputy Director,
CREATe
Lilian.edwards@strath.ac.uk
@lilianedwards
Pangloss blog :
http://blogscript.blogspot.co.uk/
Revenge porn
• What is revenge porn? “Bastard child of sexting”?
• Probably not new but exacerbated by smartphones, social networks,
WhatsApp, Snapchat , dedicated sites etc
• Usually ex-partners, usually images originally given consensually but
shared non consensually
• Hence preferred name: “non consensual sharing of private/intimate
images”
• Avoids confusion with illegal porn – usually child images or “extreme”
• But not always post relationship; eg threats to do a “Jennifer
Lawrence” on Emma Watson by 4chan (hoax, but still..); Ist UK case
involved lost/hacked mobile
• Gendered crime? MacAfee report 2013 – 10% of Americans had
threats of exposure of images by ex partners, 60% of threats acted on,
vast majority of victims women.
What are the harms?
• Strongly negative effects – “slut
shaming”, loss of job, depression,
wrecking future relationships,
silencing, suicide? (Hess)
• A new type of harassment? A
virtual sexual assault? Merely
“speech”? A matter for the law at
all? Cf domestic violence? A
matter for the social networks not
the police?
• Arguably art of general wave of
online misogyny and harassment:
– cf UK Criado-Perez/Creasy
cases; “I will rape you
tomorrow at 9 p.m … Shall we
meet near your house?”
– #gamergate
– “Everyday Sexism”
– “Victim blaming” ..
“Ignore the barrage of violent
threats and harassing messages
that confront you online every
day.” That’s what women are
told. But these relentless
messages are an assault on
women’s careers, their
psychological bandwidth, and
their freedom to live online. We
have been thinking about
Internet harassment all wrong.
Hess Why Women Aren’t
Welcome on the Internet
Don't let anyone take smutty pictures of you. Trying to remove it from
the Internet is like attempting to empty Loch Ness with a teaspoon.
The simple answer to this problem is not to ever give anyone a photo
that you would mind being put on the internet. No-one is under any
obligation to do such an idiotic thing after all.
How to beat it? - don't take you own boobs selfie
Rhiaden makz
29 July 2014 7:29pm
No, it is horrific that people trust each other, especially in long-term
relationships isn't it?
Victim blaming
The problem environment
• Specialist sites in US: IsAnyoneUp.com, 2010; IsAnyoneDown;
MyEx.com; Texxaan.com – often many details attached
• Seen as “free speech” so initial difficulties slotting into limited US
state harassment laws – also problems with intermediaries, see
later
• Sites earn c $10,000pcm in ads; blackmail also a revenue stream –
ugotposted.com (Cal), Kevin Bolleart sentenced 18yrs for ID
theft/extortion April 2015, 1st such conviction
• Now arriving in UK/EU since around start 2014
• More use of “mainstream” sites – FB, Twitter
• Forerunner - AMP case, 2011, FB/BitTorrent, held harassment &
injunctions granted
• “Ist” UK “revenge porn” case , Samuel, Bristol Aug 2014; Pix on FB,
(MCA 88 prosecution)
• 2nd, Luke King, 21, Nottingham, jailed Nov 14, 12 wks (harassment)
• Civil response possible – data protection, breach of confidence –
but likely unhelpful, public desire for criminal law control in UK
apparent
Legal responses : US law –
troublesome speech
• Criminal law
– Speech issues – First amendment
– Harassment laws (largely state based) usually very limiting
• Cal. “substantial emotional distress”
• Cal. “gravity of purpose and immediate prospect of execution of
the threat”
– ID theft? Extortion? Some success.
– Some dedicated revenge porn statutes – but may fall foul
of constl guarantees (but see also Israel, Victoria AUS,
Canada ..)
• Remedy of take down against host site?
– US Unless federal criminal law (eg child porn ) or IP
– => Some attempts to take down via copyright (DMCA).
Silly. What about non-selfies?!
UK: Criminal law - 1
• “Malicious communications”
1. Communications Act 2003, s 127
2. Malicious Communications Act 1988, s 1
• Both criminalise sending of comms of indecent or grossly
offensive nature” if purpose was to “cause distress or
anxiety to the recipient or to any other person “
• MCA used in Samuel case – but guilty plea.
• Issue – is revenge porn a “grossly offensive or indecent”
communication? (Not “obscene” – restricted to illegal(child) or
extreme sex images under DPP guidelines)
• Issue in revenge porn usually not extremity of content but the
distribution without consent.
• Also MCA not applic Scotland; 6mos jail max till 2015
UK: Criminal law – 2 - harassment
Protection From Harassment Act 1997 (PHA)
Not mainly designed for the Internet
Section 2: harassment involves
• a “course of conduct” (at least 2 occasions, s 7);
• which amounts to “harassment “of another; and defendant
knows, or ought to know this
• Harassment not defined but can clearly include “speech” and
non-consensual sharing of images (AMP, King)
• Section 4, 2A and 4A (“stalking”) also relevant; max 5 yrs jail
• Scotland clearly includes cyberstalking in its harassment law
Issue : what if not a “course of conduct” = at least 2 occasions, (s 7)
(will 2 photos do,2 sites?)
New UK law
• HL Select Committee on Comms – July 14; no brand new law needed; tweaks, yes.
DPP social media prosecution guidance amended to include revenge porn,
• Bespoke offence in Criminal Justice and Courts Act 2015, ss 33-35 (E&W)
– Offense to disclose “private sexual photo or film”
• Without consent
• With intention of causing that individual distress (“for the lulz?”) BUT not
“causing distress merely because that was a natural and probable
consequence of the disclosure. (?)
– Defenses: “public interest” journalism, detecting crime, previous voluntary
disclosure of image for reward (time lapse?)
– Also E-Commerce Directive defences for intermediaries – see next..
– “Private”? “Sexual”? S 35. (Objective not subjective tests).
– Max 2 years or 12 months on summary trial
• Scots consultation (March 2015) broadly follows English model with tweaks.
• Will new criminal offences make big difference? Already 5 years poss under
harassment and 2 years under CA2003 (and soon, MCA).
Is everything fixed then?
Not addressed -
• Remedy of non-judicial take down of content from site for victims??
• Already issue in US – websites protected by Communications Decency Act s
230 ( c) – no website is responsible for content authored by third party –
even after notice – so no incentive to take down
• CCJA15 does not create offence by host sites eg FB – distribution BUT
no intention to cause distress (unless blackmail site?)
• If there was primary offence, EC E-Commerce Directive art 14 creates
immunity from liability IF material taken down “expeditiously”
• Legit sites like FB will probably remove for PR - but often long delays
and hassle
– abuse teams not skilled in local UK law – enforce sites own rules
– Often understaffed for volume, non automatable complaints – promote
blocking of senders by users instead
– Home (US) ethos is usually of robust free speech not EU protectionism
– Twitter: “we suck at dealing with trolls and abuse”, Feb 15
• Rapid shift of attitudes IS happening – by March 2015, FB, Twitter and
Reddit had all changed policies to explicitly ban revenge porn from
their sites (sanctions? Lock a/c, ban user. But..)
Forget not forgive?: the “right to be
forgotten”
• EU Data Protection Directive 1995 : Right to control processing of your
personal data.
• Sexual image clearly “sensitive personal data” ie only ground for
processing it = explicit consent, withdrawable -> right to delete the info
under DP law
• “Right to be forgotten” upheld as against Google in ECJ Google Spain
case (C-131/12, 2014)– right not to have your name linked to a certain
page by search engine if breach of DP rights
• -> Easy , cheap (free), fast non judicial vanishing of content
• Also blocks searches to US sites (CDA protected) by google.eu searchers
• Issue: can find link by searching google.com (etc) as RTBF only applied in
EU by Google
• Google agreed (19 June 2015) to remove revenge porn on request and
from all domains not just .eu ones (!)
Changing the world..
• More education for users on
safety re images – UK
“Revenge Porn: be aware b4
you share”, Feb 2015 (more
than images? “doxing”?)
• Changes in policing attitudes
and training? Allegedly
social media training
underway.
• Different court remedies?
Restorative justice?
“Forgive”.
• Fundamental changes in
gender attitudes on and
offline? 

Weitere ähnliche Inhalte

Was ist angesagt?

Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and IndecencyMiriam Smith
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...University of Calgary
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipqwsny
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)OliviaBolt
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine ResponsibilitiesEmily Laidlaw
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechEmily Laidlaw
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad ideaPJG123
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy EditorsCubReporters.org
 

Was ist angesagt? (18)

Obscenity on the Web
Obscenity on the WebObscenity on the Web
Obscenity on the Web
 
Obscenity and Indecency
Obscenity and IndecencyObscenity and Indecency
Obscenity and Indecency
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
 
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
Law, Ethics, and Social Media: A Primer on Copyright Law, Fair Use, and Defam...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Social media law
Social media law Social media law
Social media law
 
Journalism law
Journalism lawJournalism law
Journalism law
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Censorship
CensorshipCensorship
Censorship
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)
 
Framing Search Engine Responsibilities
Framing Search Engine ResponsibilitiesFraming Search Engine Responsibilities
Framing Search Engine Responsibilities
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Is censorship a good or bad idea
Is censorship a good or bad ideaIs censorship a good or bad idea
Is censorship a good or bad idea
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Journalism Law for Copy Editors
Journalism Law for Copy EditorsJournalism Law for Copy Editors
Journalism Law for Copy Editors
 

Andere mochten auch

Andere mochten auch (19)

Slideshare net d_csoport
Slideshare net d_csoportSlideshare net d_csoport
Slideshare net d_csoport
 
Campanie Braila
Campanie BrailaCampanie Braila
Campanie Braila
 
Project3 iacd
Project3 iacdProject3 iacd
Project3 iacd
 
Planning my preliminary task
Planning my preliminary taskPlanning my preliminary task
Planning my preliminary task
 
All Transcripts
All Transcripts All Transcripts
All Transcripts
 
6956
69566956
6956
 
อุปกรณ์คอม
อุปกรณ์คอมอุปกรณ์คอม
อุปกรณ์คอม
 
Emplyment Tribunal Statistics
Emplyment Tribunal StatisticsEmplyment Tribunal Statistics
Emplyment Tribunal Statistics
 
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
FINANCIAL IMPLICATIONS OF DIVORCE AFTER 50
 
Best practice approach edsp 573
Best practice approach edsp 573Best practice approach edsp 573
Best practice approach edsp 573
 
Activitats tema 5
Activitats  tema 5Activitats  tema 5
Activitats tema 5
 
Social media & pr3
Social media & pr3Social media & pr3
Social media & pr3
 
Android goes reading
Android goes readingAndroid goes reading
Android goes reading
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Intellectual property and copyright law
Intellectual property and copyright lawIntellectual property and copyright law
Intellectual property and copyright law
 
дзвіночок
дзвіночокдзвіночок
дзвіночок
 
Gelert 2n c
Gelert 2n cGelert 2n c
Gelert 2n c
 
E Homes
E HomesE Homes
E Homes
 
Plan de negocios
Plan de negociosPlan de negocios
Plan de negocios
 

Ähnlich wie Revenge porn: punish, remove, forget, forgive?

What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcourssuser774ad41
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Tom Daly
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
negative effects of communication technologies
negative effects of communication technologiesnegative effects of communication technologies
negative effects of communication technologiesgabriela-technoteacher
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?Frederick Lane
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfBiproRoy3
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 

Ähnlich wie Revenge porn: punish, remove, forget, forgive? (20)

What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcour
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Privacy Law
Privacy LawPrivacy Law
Privacy Law
 
Finalproject
FinalprojectFinalproject
Finalproject
 
negative effects of communication technologies
negative effects of communication technologiesnegative effects of communication technologies
negative effects of communication technologies
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
 
Wk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdfWk_3_freedom_of_speech.pdf
Wk_3_freedom_of_speech.pdf
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 

Mehr von Lilian Edwards

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?Lilian Edwards
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyLilian Edwards
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016 Lilian Edwards
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?Lilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Lilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 

Mehr von Lilian Edwards (20)

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 

Kürzlich hochgeladen

Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 

Kürzlich hochgeladen (20)

Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 

Revenge porn: punish, remove, forget, forgive?

  • 1. Revenge porn : punish, remove, forget, forgive? University of Hertfordshire July 2015 Lilian Edwards Professor of E- Governance University of Strathclyde, Glasgow & Deputy Director, CREATe Lilian.edwards@strath.ac.uk @lilianedwards Pangloss blog : http://blogscript.blogspot.co.uk/
  • 2. Revenge porn • What is revenge porn? “Bastard child of sexting”? • Probably not new but exacerbated by smartphones, social networks, WhatsApp, Snapchat , dedicated sites etc • Usually ex-partners, usually images originally given consensually but shared non consensually • Hence preferred name: “non consensual sharing of private/intimate images” • Avoids confusion with illegal porn – usually child images or “extreme” • But not always post relationship; eg threats to do a “Jennifer Lawrence” on Emma Watson by 4chan (hoax, but still..); Ist UK case involved lost/hacked mobile • Gendered crime? MacAfee report 2013 – 10% of Americans had threats of exposure of images by ex partners, 60% of threats acted on, vast majority of victims women.
  • 3. What are the harms? • Strongly negative effects – “slut shaming”, loss of job, depression, wrecking future relationships, silencing, suicide? (Hess) • A new type of harassment? A virtual sexual assault? Merely “speech”? A matter for the law at all? Cf domestic violence? A matter for the social networks not the police? • Arguably art of general wave of online misogyny and harassment: – cf UK Criado-Perez/Creasy cases; “I will rape you tomorrow at 9 p.m … Shall we meet near your house?” – #gamergate – “Everyday Sexism” – “Victim blaming” .. “Ignore the barrage of violent threats and harassing messages that confront you online every day.” That’s what women are told. But these relentless messages are an assault on women’s careers, their psychological bandwidth, and their freedom to live online. We have been thinking about Internet harassment all wrong. Hess Why Women Aren’t Welcome on the Internet
  • 4. Don't let anyone take smutty pictures of you. Trying to remove it from the Internet is like attempting to empty Loch Ness with a teaspoon. The simple answer to this problem is not to ever give anyone a photo that you would mind being put on the internet. No-one is under any obligation to do such an idiotic thing after all. How to beat it? - don't take you own boobs selfie Rhiaden makz 29 July 2014 7:29pm No, it is horrific that people trust each other, especially in long-term relationships isn't it? Victim blaming
  • 5. The problem environment • Specialist sites in US: IsAnyoneUp.com, 2010; IsAnyoneDown; MyEx.com; Texxaan.com – often many details attached • Seen as “free speech” so initial difficulties slotting into limited US state harassment laws – also problems with intermediaries, see later • Sites earn c $10,000pcm in ads; blackmail also a revenue stream – ugotposted.com (Cal), Kevin Bolleart sentenced 18yrs for ID theft/extortion April 2015, 1st such conviction • Now arriving in UK/EU since around start 2014 • More use of “mainstream” sites – FB, Twitter • Forerunner - AMP case, 2011, FB/BitTorrent, held harassment & injunctions granted • “Ist” UK “revenge porn” case , Samuel, Bristol Aug 2014; Pix on FB, (MCA 88 prosecution) • 2nd, Luke King, 21, Nottingham, jailed Nov 14, 12 wks (harassment) • Civil response possible – data protection, breach of confidence – but likely unhelpful, public desire for criminal law control in UK apparent
  • 6. Legal responses : US law – troublesome speech • Criminal law – Speech issues – First amendment – Harassment laws (largely state based) usually very limiting • Cal. “substantial emotional distress” • Cal. “gravity of purpose and immediate prospect of execution of the threat” – ID theft? Extortion? Some success. – Some dedicated revenge porn statutes – but may fall foul of constl guarantees (but see also Israel, Victoria AUS, Canada ..) • Remedy of take down against host site? – US Unless federal criminal law (eg child porn ) or IP – => Some attempts to take down via copyright (DMCA). Silly. What about non-selfies?!
  • 7. UK: Criminal law - 1 • “Malicious communications” 1. Communications Act 2003, s 127 2. Malicious Communications Act 1988, s 1 • Both criminalise sending of comms of indecent or grossly offensive nature” if purpose was to “cause distress or anxiety to the recipient or to any other person “ • MCA used in Samuel case – but guilty plea. • Issue – is revenge porn a “grossly offensive or indecent” communication? (Not “obscene” – restricted to illegal(child) or extreme sex images under DPP guidelines) • Issue in revenge porn usually not extremity of content but the distribution without consent. • Also MCA not applic Scotland; 6mos jail max till 2015
  • 8. UK: Criminal law – 2 - harassment Protection From Harassment Act 1997 (PHA) Not mainly designed for the Internet Section 2: harassment involves • a “course of conduct” (at least 2 occasions, s 7); • which amounts to “harassment “of another; and defendant knows, or ought to know this • Harassment not defined but can clearly include “speech” and non-consensual sharing of images (AMP, King) • Section 4, 2A and 4A (“stalking”) also relevant; max 5 yrs jail • Scotland clearly includes cyberstalking in its harassment law Issue : what if not a “course of conduct” = at least 2 occasions, (s 7) (will 2 photos do,2 sites?)
  • 9. New UK law • HL Select Committee on Comms – July 14; no brand new law needed; tweaks, yes. DPP social media prosecution guidance amended to include revenge porn, • Bespoke offence in Criminal Justice and Courts Act 2015, ss 33-35 (E&W) – Offense to disclose “private sexual photo or film” • Without consent • With intention of causing that individual distress (“for the lulz?”) BUT not “causing distress merely because that was a natural and probable consequence of the disclosure. (?) – Defenses: “public interest” journalism, detecting crime, previous voluntary disclosure of image for reward (time lapse?) – Also E-Commerce Directive defences for intermediaries – see next.. – “Private”? “Sexual”? S 35. (Objective not subjective tests). – Max 2 years or 12 months on summary trial • Scots consultation (March 2015) broadly follows English model with tweaks. • Will new criminal offences make big difference? Already 5 years poss under harassment and 2 years under CA2003 (and soon, MCA).
  • 10. Is everything fixed then? Not addressed - • Remedy of non-judicial take down of content from site for victims?? • Already issue in US – websites protected by Communications Decency Act s 230 ( c) – no website is responsible for content authored by third party – even after notice – so no incentive to take down • CCJA15 does not create offence by host sites eg FB – distribution BUT no intention to cause distress (unless blackmail site?) • If there was primary offence, EC E-Commerce Directive art 14 creates immunity from liability IF material taken down “expeditiously” • Legit sites like FB will probably remove for PR - but often long delays and hassle – abuse teams not skilled in local UK law – enforce sites own rules – Often understaffed for volume, non automatable complaints – promote blocking of senders by users instead – Home (US) ethos is usually of robust free speech not EU protectionism – Twitter: “we suck at dealing with trolls and abuse”, Feb 15 • Rapid shift of attitudes IS happening – by March 2015, FB, Twitter and Reddit had all changed policies to explicitly ban revenge porn from their sites (sanctions? Lock a/c, ban user. But..)
  • 11. Forget not forgive?: the “right to be forgotten” • EU Data Protection Directive 1995 : Right to control processing of your personal data. • Sexual image clearly “sensitive personal data” ie only ground for processing it = explicit consent, withdrawable -> right to delete the info under DP law • “Right to be forgotten” upheld as against Google in ECJ Google Spain case (C-131/12, 2014)– right not to have your name linked to a certain page by search engine if breach of DP rights • -> Easy , cheap (free), fast non judicial vanishing of content • Also blocks searches to US sites (CDA protected) by google.eu searchers • Issue: can find link by searching google.com (etc) as RTBF only applied in EU by Google • Google agreed (19 June 2015) to remove revenge porn on request and from all domains not just .eu ones (!)
  • 12. Changing the world.. • More education for users on safety re images – UK “Revenge Porn: be aware b4 you share”, Feb 2015 (more than images? “doxing”?) • Changes in policing attitudes and training? Allegedly social media training underway. • Different court remedies? Restorative justice? “Forgive”. • Fundamental changes in gender attitudes on and offline? 