individual and technology
DESCRIPTION
TRANSCRIPT
THE INDIVIDUAL AND TECHNOLOGY
Section 3 - Individual and the State
1Wednesday, 20 July 2011
MAIN AREAS
2Wednesday, 20 July 2011
MAIN AREAS
misuse of interactive technologies
cyber-bullying
genetic profiling
cyberspace
privacy issues
security and surveillance
mobile phones
2Wednesday, 20 July 2011
IMPACTS OF TECHNOLOGY ON THE INDIVIDUAL
3Wednesday, 20 July 2011
IMPACTS OF TECHNOLOGY ON THE INDIVIDUAL
Technology is often at the cutting edge of development which often comes first before decisions are made on making law.
The main force changing law is the creation of the internet – Over 1.5billion users in the world.
3Wednesday, 20 July 2011
NATIONAL BROADBAND NETWORK
4Wednesday, 20 July 2011
JURISDICTION OF CYBERSPACE
‘cyberspace’ coined by William Gibson
5Wednesday, 20 July 2011
JURISDICTION OF CYBERSPACE
Cyberspace is a global interconnection of millions of computers over the internet.
No government or court can claim cyberspace as its exclusive jurisdiction (power) ‘cyberspace’ coined by
William Gibson
5Wednesday, 20 July 2011
INTERNET FILTERING IN AUSTRALIA
6Wednesday, 20 July 2011
DEBATE ON CYBERSPACE
7Wednesday, 20 July 2011
DEBATE ON CYBERSPACE
Positives Negatives
Borderless system allowing freedom of
association
Increased Fraudulent/Corrupt activity
Breaking down barriers throughout the world Difficult to enforce laws
7Wednesday, 20 July 2011
INTERNET CENSORSHIP
8Wednesday, 20 July 2011
LEGAL ISSUES IN CYBERSPACE
9Wednesday, 20 July 2011
LEGAL ISSUES IN CYBERSPACE
Three distinct features of cyberspaces and challenges for legal regulation
1.It facilitates anonymity
easy to hide your real identity, creating pseudonyms (avatars)
IP addresses can be used to identify a computer, software programs can be used to encrypt internet activity.
9Wednesday, 20 July 2011
INTERNET FILTERING Q & A
10Wednesday, 20 July 2011
11Wednesday, 20 July 2011
2. It facilitates creativity
The internet is a means of creating your own work (blogs, websites, social-networking)
3. It is global
cyberspace lacks national boundaries
online communities can be found throughout the whole world
11Wednesday, 20 July 2011
Hacking
CYBERCRIME
12Wednesday, 20 July 2011
Hacking is the unauthorised access or changing of data stored on a computer
The Cybercrime Act 2001 (Cth)
Hacking
CYBERCRIME
12Wednesday, 20 July 2011
Internet Fraud
13Wednesday, 20 July 2011
Internet fraud is the use of the internet to misrepresent or conceal information to betray, deceive or mislead
Unsolicited Email
Pyramid Selling
Phishing
Nigerian Scam
Internet Fraud
13Wednesday, 20 July 2011
Internet Spam
14Wednesday, 20 July 2011
Spam is an unsolicited commercial electronic communication, including junk emails, SMS or instant messaging.
Internet Spam
14Wednesday, 20 July 2011
WHERE DID SPAM COME FROM?
15Wednesday, 20 July 2011
INTELLECTUAL PROPERTY
16Wednesday, 20 July 2011
INTELLECTUAL PROPERTY
Intellectual property refers to the creations of the mind that have commercial value.
e.g inventions, literary works, artistic works, software programs
Intellectual property is protected under many international treaties
In order for it to be protected the idea has to be developed into something tangible – software program, essay or cd.
16Wednesday, 20 July 2011
Copyright
17Wednesday, 20 July 2011
An exclusive right to publish, copy, publicly perform, broadcast, or make an adaption of certain forms of expression, namely sounds, words or visual expression
Copyright Act 1968 (Cth)
Copyright
17Wednesday, 20 July 2011
18Wednesday, 20 July 2011
COPYRIGHT AROUND THE WORLD
19Wednesday, 20 July 2011
20Wednesday, 20 July 2011
Many new challenges are faced by Copyright laws due to further digital technology developments
File Sharing
Software Copyright infringement
20Wednesday, 20 July 2011
METALLICA AND NAPSTER
21Wednesday, 20 July 2011
Trademarks
22Wednesday, 20 July 2011
signs or symbols that give a person or corporation the legal right to use, license or sell the product or service for which it is registered
Trademarks
22Wednesday, 20 July 2011
Axis of Awesome
FOUR CHORD SONG
23Wednesday, 20 July 2011
Patents
24Wednesday, 20 July 2011
rights granted for any device, substance, method or process which is new, inventive or useful
Patents
24Wednesday, 20 July 2011
Should file sharing be legal in Australia?
Discussion Point
25Wednesday, 20 July 2011
Federal Court February 2010
IINET V AFACT
26Wednesday, 20 July 2011
PRIVACY, SAFETY AND CENSORSHIP
27Wednesday, 20 July 2011
There are a number of ways individuals are vulnerable in cyberspace:
cyberbullying
cyberstalking
racial hatred
exposure to violent, disturbing and/or illegal material
exposure to adult material
intrusions into privacy
PRIVACY, SAFETY AND CENSORSHIP
27Wednesday, 20 July 2011
CYBERBULLYING
28Wednesday, 20 July 2011
Disinhibition Effect
29Wednesday, 20 July 2011
the tendency to say and do things in cyberspace that the person wouldn’t ordinarily say or do in the face-to-face world
rude language, harsh personal criticism, or violent online games, threats, cyberbullying or cyberstalking, racial hatred
The Racial Hatred Act 1995 (Cth) protects any forms of racial online vilification
Disinhibition Effect
29Wednesday, 20 July 2011
PRIVACY CONCERNSDigital Dossier
30Wednesday, 20 July 2011
PRIVACY CONCERNS
all the types of information about a person that he or she has put onto the internet, held in multiple locations
Individuals have little control over how the most powerful search engines use their information
Digital Dossier
30Wednesday, 20 July 2011
The Privacy Act 1988 (Cth)
31Wednesday, 20 July 2011
Relates to how businesses should collect, store, use and disclose personal information
The Privacy Act needs to align itself with modern issues in protecting individuals
The Privacy Act 1988 (Cth)
31Wednesday, 20 July 2011
PRIVACY ON THE INTERNET
32Wednesday, 20 July 2011
PROTECTING CHILDREN
33Wednesday, 20 July 2011
Traditional bullying was mainly physical and occurred in the playground, classroom and walking home from school. Now it occurs at home using the internet.
Online predators enticing young people into harmful encounters
PROTECTING CHILDREN
33Wednesday, 20 July 2011
RIGHTS IN CYBERSPACE
Laissez-faire – no regulation by governments
Interventionist – Government control
• Individuals are capable of determining quality internet content
• Governments should not intervene in the marketplace of ideas
• Organisation: Electronic Frontier Foundation http://www.eff.org/
• Developing reasonable quality of websites
• Enacting legislation to impose obligation on ISPs
• Main areas of controlling: race hatred, child pornography
34Wednesday, 20 July 2011
Founded in 1990
defending free speech, privacy, innovation, and consumer rights
EFF is a donor-funded nonprofit organisation
Electronic Frontier Foundation
35Wednesday, 20 July 2011
CYBERCRIME
36Wednesday, 20 July 2011
CURRENT LEGISLATION
Currently the law can only set minimum standards
Protected under major international legislation
Right to privacy
Right to freedom of expression
Certain limits are placed on domestic enforcement of these rights
37Wednesday, 20 July 2011
CYBER CRIMINALS
38Wednesday, 20 July 2011
Crimes Act 1900 (NSW) –crimes amendment (computer offences) Act 2001 (NSW)
Section 308 – computer offences – hacking
Spam Act 2003 (Cth)
Domestic Level
39Wednesday, 20 July 2011
International Level
40Wednesday, 20 July 2011
Very few international treaties established
The United Nations – Controls issues of Intellectual Property through the agency World Intellectual Property Organisation (WIPO)
World Trade Organisation – Deals with issues of intellectual property
European Union – Convention on Cybercrime (2001) – prevention of specific cybercrimes
International Level
40Wednesday, 20 July 2011
FUTURE DIRECTIONS
41Wednesday, 20 July 2011
FUTURE DIRECTIONSGovernments are needed, to create an environment where the rule of law prevails and where law enforcement mechanisms will deter those who break the law
Governments who do not have regulated laws are discouraging big business from operating in their country
41Wednesday, 20 July 2011
EBAY SCAMS
42Wednesday, 20 July 2011
Strategies for Governments and Prosecution of Individuals
43Wednesday, 20 July 2011
Achieving perfect legal control is quite often just too expensive
Controlling content from internet service providers
Initiating financial intermediaries such as Paypal
Making arrests of individuals suspected of cybercrime
Extraditing suspects from other countries
Strategies for Governments and Prosecution of Individuals
43Wednesday, 20 July 2011
INTERNET CENSORSHIP
44Wednesday, 20 July 2011
INTERNET REVOLUTION
45Wednesday, 20 July 2011
Government Challenges with Cybercrime
46Wednesday, 20 July 2011
New technologies allow cybercrime to continue and encourage illegal activity
Only developed nations have the resources and finances to counter act upon cybercrime
The balance of freedoms vs censorship
Cybercrime laws are different from country to country
Government Challenges with Cybercrime
46Wednesday, 20 July 2011
Global Laws
47Wednesday, 20 July 2011
Transnational cybercrime is big business. Companies often will not report on the impact it has to their business e.g a bank’s internet theft problems
threats of cyberterrorism still loom. Attacks on electronically controlled infrastructure.
Council of Europe’s Convention on Cybercrime (2001) is one of the only legally binding pieces of legislation
Global Laws
47Wednesday, 20 July 2011