SlideShare una empresa de Scribd logo
1 de 11
Firesheep 101:
Legal?
and how to protect yourself
by Brian Rowe
University of Washington's iSchool
Seattle University Law
Oct 28th 2010
Demo
Legal?
To Create
Free Speech
UK or Europe
Council of Europe’s Convention on
Cybercrime
1. Each Party shall adopt such legislative and other measures
as may be necessary to establish as criminal offenses under its
domestic law, when committed intentionally and without right:
a. the production, sale, procurement for use, import, distribution
or otherwise making available of:
i. a device, including a computer program, designed or adapted
primarily for the purpose of committing any of the offences
established in accordance with Articles 2 through 5;
ii. a computer password, access code, or similar data by which
the whole or any part of a computer system is capable of being
accessed, with intent that it be used for the purpose of
committing any of the offences established in Articles 2 through
5;
To Use
300,000
More at: technoLLama & forbes
www.technollama.co.uk/is-firesheep-
illegal
blogs.forbes.com/kashmirhill/2010/10/28
/firesheep-users-may-be-breaking-the-
law/
Brian@BrianRowe.org
Twitter @Sarterus
Slides are on Slide Share
User: Sarterus

Más contenido relacionado

La actualidad más candente

Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Adwiteeya Agrawal
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 

La actualidad más candente (16)

Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
It legislation
It legislationIt legislation
It legislation
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Cyber laws of US
Cyber laws of USCyber laws of US
Cyber laws of US
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
File000146
File000146File000146
File000146
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Destacado

9 ways to kill a Slide Presentation
9 ways to kill a  Slide Presentation9 ways to kill a  Slide Presentation
9 ways to kill a Slide PresentationBrian Rowe
 
Group project information privacy law
Group project information privacy lawGroup project information privacy law
Group project information privacy lawBrian Rowe
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Gnomedex - The Geeks Shall Inherit the Earth
Gnomedex - The Geeks Shall Inherit the EarthGnomedex - The Geeks Shall Inherit the Earth
Gnomedex - The Geeks Shall Inherit the EarthBrian Rowe
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair useBrian Rowe
 
Copyright Cc WLA
Copyright Cc WLACopyright Cc WLA
Copyright Cc WLABrian Rowe
 
Summer Of Copyright
Summer Of CopyrightSummer Of Copyright
Summer Of CopyrightBrian Rowe
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 

Destacado (8)

9 ways to kill a Slide Presentation
9 ways to kill a  Slide Presentation9 ways to kill a  Slide Presentation
9 ways to kill a Slide Presentation
 
Group project information privacy law
Group project information privacy lawGroup project information privacy law
Group project information privacy law
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Gnomedex - The Geeks Shall Inherit the Earth
Gnomedex - The Geeks Shall Inherit the EarthGnomedex - The Geeks Shall Inherit the Earth
Gnomedex - The Geeks Shall Inherit the Earth
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair use
 
Copyright Cc WLA
Copyright Cc WLACopyright Cc WLA
Copyright Cc WLA
 
Summer Of Copyright
Summer Of CopyrightSummer Of Copyright
Summer Of Copyright
 
Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 

Similar a Firesheep

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfbadangayonmgb
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxRegineManuel2
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxFakeGamer390
 
BS CS 5 Week 8 lecture 1.pptx
BS CS 5 Week 8 lecture 1.pptxBS CS 5 Week 8 lecture 1.pptx
BS CS 5 Week 8 lecture 1.pptxwhoiam36
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawAbiel Abuy
 
European Treaty Series - No. 185Convention on Cybercrime.docx
European Treaty Series - No. 185Convention on Cybercrime.docxEuropean Treaty Series - No. 185Convention on Cybercrime.docx
European Treaty Series - No. 185Convention on Cybercrime.docxSANSKAR20
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxlillie234567
 

Similar a Firesheep (20)

Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
551 2006 3
551 2006 3551 2006 3
551 2006 3
 
BS CS 5 Week 8 lecture 1.pptx
BS CS 5 Week 8 lecture 1.pptxBS CS 5 Week 8 lecture 1.pptx
BS CS 5 Week 8 lecture 1.pptx
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
European Treaty Series - No. 185Convention on Cybercrime.docx
European Treaty Series - No. 185Convention on Cybercrime.docxEuropean Treaty Series - No. 185Convention on Cybercrime.docx
European Treaty Series - No. 185Convention on Cybercrime.docx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
 

Más de Brian Rowe

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBABrian Rowe
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lectureBrian Rowe
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftBrian Rowe
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix CultureBrian Rowe
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2Brian Rowe
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismBrian Rowe
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101Brian Rowe
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureBrian Rowe
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipenBrian Rowe
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy IgniteBrian Rowe
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentBrian Rowe
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Brian Rowe
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thBrian Rowe
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Brian Rowe
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Brian Rowe
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 

Más de Brian Rowe (20)

Tattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBATattoos and Intellectual Property 2023 KCBA
Tattoos and Intellectual Property 2023 KCBA
 
Evergreen 2015 lecture
Evergreen 2015 lectureEvergreen 2015 lecture
Evergreen 2015 lecture
 
Transformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - DraftTransformative Works - fair use - Geek Girl Con 2014 - Draft
Transformative Works - fair use - Geek Girl Con 2014 - Draft
 
Free Speech & Remix Culture
Free Speech & Remix CultureFree Speech & Remix Culture
Free Speech & Remix Culture
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Ecc 2013
Ecc 2013 Ecc 2013
Ecc 2013
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
 
WLA Lecture
WLA LectureWLA Lecture
WLA Lecture
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Firesheep

  • 1. Firesheep 101: Legal? and how to protect yourself by Brian Rowe University of Washington's iSchool Seattle University Law Oct 28th 2010
  • 7. Council of Europe’s Convention on Cybercrime 1. Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offenses under its domestic law, when committed intentionally and without right: a. the production, sale, procurement for use, import, distribution or otherwise making available of: i. a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5; ii. a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5;
  • 10. More at: technoLLama & forbes www.technollama.co.uk/is-firesheep- illegal blogs.forbes.com/kashmirhill/2010/10/28 /firesheep-users-may-be-breaking-the- law/
  • 11. Brian@BrianRowe.org Twitter @Sarterus Slides are on Slide Share User: Sarterus