SlideShare a Scribd company logo
1 of 39
Download to read offline
the individual
and technology
Section 3 - Individual and the State
Term 2/3 2013
Main Syllabus Points
Hint: This section connects with the theme “society
moves ahead as the law limps behind”
impacts of technology on the
individual
• Technology is often at the cutting edge of
development which often comes first before
decisions are made on making law.
• The main force changing law is the creation of the
internet – Over 1.5billion users in the world.
• Increase use of technology will raise privacy
issues e.g Google Earth Streetview
• Use of CCTV may act as a deterrent for crime
but may impede on individual privacy rights
Technology and Privacy
Click Here
• Cyberspace is a global
interconnection of millions
of computers over the
internet.
• No government or court
can claim cyberspace as its
exclusive jurisdiction
(power)
‘cyberspace’
coined by
William
Gibson
Jurisdiction of
cyberspace
Positives Negatives
Borderless system allowing
freedom of association
Increased Fraudulent/Corrupt
activity
Breaking down barriers
throughout the world
Difficult to enforce laws (cross
countries)
Debate on Cyberspace
• Should the Australian Government
introduce censorship to the internet in
the form of filtering out websites?
Discussion Point
internet filtering in australia
internet censorship
• Three distinct features of cyberspaces and challenges for legal
regulation
• 1.It facilitates anonymity
• easy to hide your real identity, creating pseudonyms
(avatars)
• IP addresses can be used to identify a computer, software
programs can be used to encrypt internet activity
Legal Issues in Cyberspace
internet filtering
• 2. It facilitates creativity
• The internet is a means of creating
your own work (blogs, websites,
social-networking)
• 3. It is global
• cyberspace lacks national
boundaries
• online communities can be found
throughout the whole world
• Internet fraud is the use of
the internet to misrepresent
or conceal information to
betray, deceive or mislead
• Unsolicited Email
• Pyramid Selling
• Phishing
• Nigerian Scam
Internet Fraud
• Spam is an unsolicited commercial
electronic communication, including
junk emails, SMS or instant messaging.
Internet Spam
Where did spam come from?
• Intellectual property refers to the creations of the mind
that have commercial value.
• e.g inventions, literary works, artistic works, software
programs
• Intellectual property is protected under many international
treaties
• In order for it to be protected the idea has to be developed
into something tangible – software program, essay or cd
Intellectual Property
• An exclusive right to
publish, copy, publicly
perform, broadcast, or make
an adaption of certain forms
of expression, namely
sounds, words or visual
expression
• Copyright Act 1968 (Cth)
Copyright
copyright around the world
• Many new challenges are
faced by Copyright laws
due to further digital
technology developments
and the enforceability of
such laws
• File Sharing
• Software Copyright
infringement
metallica and napster
• Signs or symbols that give a person or
corporation the legal right to use, license or
sell the product or service for which it is
registered
Trademarks
four chord song
• Rights granted for
any device, substance,
method or process
which is new,
inventive or useful
Patents
• Should file sharing be
legal in Australia?
Discussion Point
iinet v afact
• There are a number of ways individuals are
vulnerable in cyberspace:
• cyberbullying
• cyberstalking
• racial hatred
• exposure to violent, disturbing and/or illegal
material
• exposure to adult material
• intrusions into privacy
Privacy, safety and censorship
• The tendency to say and do things in cyberspace
that the person wouldn’t ordinarily say or do in
the face-to-face world
• rude language, harsh personal criticism, or violent
online games, threats, cyberbullying or
cyberstalking, racial hatred
• The Racial Hatred Act 1995 (Cth) protects any
forms of racial online vilification
Disinhibition Effect
Microchip technology
• All the types of information
about a person that he or she
has put onto the internet,
held in multiple locations
• Individuals have little
control over how the most
powerful search engines use
their information
Digital Dossier
privacy concerns
• Relates to how businesses should collect,
store, use and disclose personal information
• The Privacy Act needs to align itself with
modern issues in protecting individuals
The Privacy Act 1988 (Cth)
• Traditional bullying was
mainly physical and
occurred in the
playground, classroom and
walking home from school.
Now it occurs at home
using the internet.
• Online predators enticing
young people into harmful
encounters
Protecting children
cybercrime
• Currently the law can only set minimum
standards
• Protected under major international legislation
• Right to privacy
• Right to freedom of expression
• Certain limits are placed on domestic
enforcement of these rights
current legislation
• Crimes Act 1900 (NSW) –
crimes amendment
(computer offences) Act
2001 (NSW)
• Section 308 – computer
offences – hacking
• Spam Act 2003 (Cth)
Domestic Level
• Limited international treaties established
• The United Nations – Controls issues of
Intellectual Property through the agency World
Intellectual Property Organisation (WIPO)
• World Trade Organisation – Deals with issues
of intellectual property
• European Union – Convention on Cybercrime
(2001) – prevention of specific cybercrimes
International Level
• Governments are needed, to create an
environment where the rule of law prevails and
where law enforcement mechanisms will deter
those who break the law
• Governments who do not have regulated laws are
discouraging big business from operating in their
country
future directions
• Achieving perfect legal control is quite often just
too expensive
• Controlling content from internet service
providers
• Initiating financial intermediaries such as Paypal
• Making arrests of individuals suspected of
cybercrime
• Extraditing suspects from other countries
Strategies for Governments and Prosecution of
Individuals
internet revolution

More Related Content

What's hot

Issues in World Order
Issues in World OrderIssues in World Order
Issues in World Order
Mr Shipp
 
Responses to World Order
Responses to World OrderResponses to World Order
Responses to World Order
Mr Shipp
 
Issues in Family Law
Issues in Family Law Issues in Family Law
Issues in Family Law
Mr Shipp
 
Sentencing and Punishment
Sentencing and PunishmentSentencing and Punishment
Sentencing and Punishment
Mr Shipp
 
Uniform Domain Name Dispute Resolution
Uniform Domain Name Dispute ResolutionUniform Domain Name Dispute Resolution
Uniform Domain Name Dispute Resolution
libertyluver
 
Young Offenders
Young OffendersYoung Offenders
Young Offenders
Mr Shipp
 
Universal Jurisdiction
Universal JurisdictionUniversal Jurisdiction
Universal Jurisdiction
timothy park
 
2.4 the court hierarchy
2.4 the court hierarchy2.4 the court hierarchy
2.4 the court hierarchy
Alisa Stephens
 
Introduction to dispute resolution in myanmar
Introduction to dispute resolution in myanmarIntroduction to dispute resolution in myanmar
Introduction to dispute resolution in myanmar
malinpyar
 
Meaning and Scope of Space Law
Meaning and Scope of Space LawMeaning and Scope of Space Law
Meaning and Scope of Space Law
Kruti Patel
 

What's hot (20)

Issues in World Order
Issues in World OrderIssues in World Order
Issues in World Order
 
Responses to World Order
Responses to World OrderResponses to World Order
Responses to World Order
 
Issues in Family Law
Issues in Family Law Issues in Family Law
Issues in Family Law
 
Introduction to international criminal law ppt
Introduction to international criminal law pptIntroduction to international criminal law ppt
Introduction to international criminal law ppt
 
International Crime
International CrimeInternational Crime
International Crime
 
Law Reform in Action - Native Title
Law Reform in Action -  Native TitleLaw Reform in Action -  Native Title
Law Reform in Action - Native Title
 
Sentencing and Punishment
Sentencing and PunishmentSentencing and Punishment
Sentencing and Punishment
 
Criminal Law.ppt
Criminal Law.pptCriminal Law.ppt
Criminal Law.ppt
 
Uniform Domain Name Dispute Resolution
Uniform Domain Name Dispute ResolutionUniform Domain Name Dispute Resolution
Uniform Domain Name Dispute Resolution
 
Young Offenders
Young OffendersYoung Offenders
Young Offenders
 
Civil law
Civil lawCivil law
Civil law
 
Hsc2017 legal studies
Hsc2017 legal studiesHsc2017 legal studies
Hsc2017 legal studies
 
Law Reform
Law ReformLaw Reform
Law Reform
 
11LS Criminal Law
11LS Criminal Law11LS Criminal Law
11LS Criminal Law
 
Universal Jurisdiction
Universal JurisdictionUniversal Jurisdiction
Universal Jurisdiction
 
German Legal system by abhijit kumar
German Legal system  by abhijit kumarGerman Legal system  by abhijit kumar
German Legal system by abhijit kumar
 
2.4 the court hierarchy
2.4 the court hierarchy2.4 the court hierarchy
2.4 the court hierarchy
 
Introduction to dispute resolution in myanmar
Introduction to dispute resolution in myanmarIntroduction to dispute resolution in myanmar
Introduction to dispute resolution in myanmar
 
Meaning and Scope of Space Law
Meaning and Scope of Space LawMeaning and Scope of Space Law
Meaning and Scope of Space Law
 
International criminal law
International criminal lawInternational criminal law
International criminal law
 

Similar to Individual and Technology

International internet governance
International internet governanceInternational internet governance
International internet governance
Jillian York
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
RomanoGabrillo1
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
Ganesh Chindanuru
 

Similar to Individual and Technology (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaPolicy and Technical Solutions for Online Cross-Border Legal Problems in Asia
Policy and Technical Solutions for Online Cross-Border Legal Problems in Asia
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Bases for legal systems
Bases for legal systemsBases for legal systems
Bases for legal systems
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 

More from Mr Shipp

More from Mr Shipp (20)

Nature of Consumers
Nature of ConsumersNature of Consumers
Nature of Consumers
 
Sustainable biomes
Sustainable biomesSustainable biomes
Sustainable biomes
 
The Cooks River
The Cooks RiverThe Cooks River
The Cooks River
 
Ternary Graphs
Ternary GraphsTernary Graphs
Ternary Graphs
 
Biophysical Interactions and Functioning
Biophysical Interactions and FunctioningBiophysical Interactions and Functioning
Biophysical Interactions and Functioning
 
Population Geography
Population GeographyPopulation Geography
Population Geography
 
Political Geography
Political GeographyPolitical Geography
Political Geography
 
Shipp's Six Sentence Structure
Shipp's Six Sentence StructureShipp's Six Sentence Structure
Shipp's Six Sentence Structure
 
Flexible Learning Space
Flexible Learning SpaceFlexible Learning Space
Flexible Learning Space
 
Boys Conference 2018 Presentation
Boys Conference 2018  PresentationBoys Conference 2018  Presentation
Boys Conference 2018 Presentation
 
Educational Leadership
Educational LeadershipEducational Leadership
Educational Leadership
 
Our Economy
Our EconomyOur Economy
Our Economy
 
Water in the World
Water in the WorldWater in the World
Water in the World
 
Contour Lines
Contour LinesContour Lines
Contour Lines
 
Latitude and Longitude
Latitude and Longitude Latitude and Longitude
Latitude and Longitude
 
Synoptic Charts
Synoptic ChartsSynoptic Charts
Synoptic Charts
 
Area and Grid References
Area and Grid ReferencesArea and Grid References
Area and Grid References
 
Scale - Geography Skill
Scale - Geography SkillScale - Geography Skill
Scale - Geography Skill
 
Landforms and Landscapes
Landforms and LandscapesLandforms and Landscapes
Landforms and Landscapes
 
The Battle of Fromelles
The Battle of FromellesThe Battle of Fromelles
The Battle of Fromelles
 

Individual and Technology

  • 1. the individual and technology Section 3 - Individual and the State Term 2/3 2013
  • 2. Main Syllabus Points Hint: This section connects with the theme “society moves ahead as the law limps behind”
  • 3. impacts of technology on the individual • Technology is often at the cutting edge of development which often comes first before decisions are made on making law. • The main force changing law is the creation of the internet – Over 1.5billion users in the world.
  • 4. • Increase use of technology will raise privacy issues e.g Google Earth Streetview • Use of CCTV may act as a deterrent for crime but may impede on individual privacy rights Technology and Privacy Click Here
  • 5. • Cyberspace is a global interconnection of millions of computers over the internet. • No government or court can claim cyberspace as its exclusive jurisdiction (power) ‘cyberspace’ coined by William Gibson Jurisdiction of cyberspace
  • 6. Positives Negatives Borderless system allowing freedom of association Increased Fraudulent/Corrupt activity Breaking down barriers throughout the world Difficult to enforce laws (cross countries) Debate on Cyberspace
  • 7. • Should the Australian Government introduce censorship to the internet in the form of filtering out websites? Discussion Point
  • 10. • Three distinct features of cyberspaces and challenges for legal regulation • 1.It facilitates anonymity • easy to hide your real identity, creating pseudonyms (avatars) • IP addresses can be used to identify a computer, software programs can be used to encrypt internet activity Legal Issues in Cyberspace
  • 12. • 2. It facilitates creativity • The internet is a means of creating your own work (blogs, websites, social-networking) • 3. It is global • cyberspace lacks national boundaries • online communities can be found throughout the whole world
  • 13. • Internet fraud is the use of the internet to misrepresent or conceal information to betray, deceive or mislead • Unsolicited Email • Pyramid Selling • Phishing • Nigerian Scam Internet Fraud
  • 14. • Spam is an unsolicited commercial electronic communication, including junk emails, SMS or instant messaging. Internet Spam
  • 15. Where did spam come from?
  • 16. • Intellectual property refers to the creations of the mind that have commercial value. • e.g inventions, literary works, artistic works, software programs • Intellectual property is protected under many international treaties • In order for it to be protected the idea has to be developed into something tangible – software program, essay or cd Intellectual Property
  • 17. • An exclusive right to publish, copy, publicly perform, broadcast, or make an adaption of certain forms of expression, namely sounds, words or visual expression • Copyright Act 1968 (Cth) Copyright
  • 18.
  • 20. • Many new challenges are faced by Copyright laws due to further digital technology developments and the enforceability of such laws • File Sharing • Software Copyright infringement
  • 22. • Signs or symbols that give a person or corporation the legal right to use, license or sell the product or service for which it is registered Trademarks
  • 24. • Rights granted for any device, substance, method or process which is new, inventive or useful Patents
  • 25. • Should file sharing be legal in Australia? Discussion Point
  • 27. • There are a number of ways individuals are vulnerable in cyberspace: • cyberbullying • cyberstalking • racial hatred • exposure to violent, disturbing and/or illegal material • exposure to adult material • intrusions into privacy Privacy, safety and censorship
  • 28. • The tendency to say and do things in cyberspace that the person wouldn’t ordinarily say or do in the face-to-face world • rude language, harsh personal criticism, or violent online games, threats, cyberbullying or cyberstalking, racial hatred • The Racial Hatred Act 1995 (Cth) protects any forms of racial online vilification Disinhibition Effect
  • 30. • All the types of information about a person that he or she has put onto the internet, held in multiple locations • Individuals have little control over how the most powerful search engines use their information Digital Dossier privacy concerns
  • 31. • Relates to how businesses should collect, store, use and disclose personal information • The Privacy Act needs to align itself with modern issues in protecting individuals The Privacy Act 1988 (Cth)
  • 32. • Traditional bullying was mainly physical and occurred in the playground, classroom and walking home from school. Now it occurs at home using the internet. • Online predators enticing young people into harmful encounters Protecting children
  • 34. • Currently the law can only set minimum standards • Protected under major international legislation • Right to privacy • Right to freedom of expression • Certain limits are placed on domestic enforcement of these rights current legislation
  • 35. • Crimes Act 1900 (NSW) – crimes amendment (computer offences) Act 2001 (NSW) • Section 308 – computer offences – hacking • Spam Act 2003 (Cth) Domestic Level
  • 36. • Limited international treaties established • The United Nations – Controls issues of Intellectual Property through the agency World Intellectual Property Organisation (WIPO) • World Trade Organisation – Deals with issues of intellectual property • European Union – Convention on Cybercrime (2001) – prevention of specific cybercrimes International Level
  • 37. • Governments are needed, to create an environment where the rule of law prevails and where law enforcement mechanisms will deter those who break the law • Governments who do not have regulated laws are discouraging big business from operating in their country future directions
  • 38. • Achieving perfect legal control is quite often just too expensive • Controlling content from internet service providers • Initiating financial intermediaries such as Paypal • Making arrests of individuals suspected of cybercrime • Extraditing suspects from other countries Strategies for Governments and Prosecution of Individuals