SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
CYBER HARASSMENT


                          Bennet Kelley ‘89
     Georgetown University Law Center Reunion Weekend
Cyber
Harassment by
the Numbers
PERPETRATOR
  VICTIMS                 63.3% men
                        (where known)               DURATION
  72.5% women                                      Avg. – 2 Years
                       Half have no prior
44% 18-30 yrs old   relationship with victim
                      71% - no offline threats




                                            Source: HaltAbuse.org
Forms of Harassment

 Abusive Emails/IMs             Chat Room and Blog
                                  Posts
 Computer Attacks –
                                   Cyber smears (e.g.,
    viruses, hacking                Skanks in NYC)
   Crowding Out Benign            Disclosure of Private Facts
    Content                         (or photos)
   Cyber squatting or use of      Use/misuse of victim’s
                                    content
    identity
   Cyber Bullying
   Identity Theft
Remedies
             • Trespass
             • Fraud
Common       • Defamation
             • Invasion of Privacy/Infliction of Emotional Distress
  Law

             • Trademark/Copyright
  General    • Wire Fraud, RICO
 Statutory
 Authority

             • Anti-Cybersquatting Protection Act
             • Computer Fraud & Abuse Act
 Internet    • Identity Theft Enforcement and Restitution Act
  Crimes

             • Federal Laws Limited in Scope
             • State Cyber-Stalking and Cyber-Harassment Laws
Harassment
   Laws
Selected Federal Criminal Laws
  18 USC § 875 – prohibits       Violence Against Women
   threats to “injure the          Act Amendments (18 USC
   person” or “injure the          § 2261A) - prohibits acts
   property or reputation”         or course of conduct “with
     No private action            the intent to kill, injure,
                                   harass,” that causes
                                   “substantial emotional
  47 U.S.C. § 223 – prohibits     distress” or reasonable fear
   anonymous use of email to       of death or “serious bodily
   “annoy, abuse, harass, or       injury” to victim, family,
   threaten” (does not apply       spouse or intimate partner.
   to chat board posting)           Increased penalties for
     No private action              violating restraining order
                                    Only applies to interstate
                                     conduct
State Cyber Harassment Laws




Source: Congressional Research Service
State Cyber Stalking Laws




Source: Congressional Research Service
US v. Lori Drew
Or How a Missouri Mom Got a Trip to Disneyland
Misdemeanor Conviction Reversed
Misdemeanor Conviction Reversed
Civil v. Criminal Sanctions

 Criminal Law generally for acts offensive to
  society as a whole
   Remedy – Fine and Imprisonment
 Civil Law for remedying wrongs between
  individuals
   Remedy - Damages
 What happens when individuals cannot afford
  litigation?
  
Coach Thompson’s Garage
                                           GRRR




  IS IT SPEECH?                 IS IT A CRIME?

  IS PROPERTY DAMAGED?
  IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Coach Thompson’s Computer Screen
                                          ii sum valde
                                           iratus iam




 IS IT SPEECH?                IS IT A CRIME?

 IS PROPERTY DAMAGED?
 IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
Criminal Defamation Laws




Source: First Amendment Center, Media Law Resource Center
Forgotten but not Gone




Source: Media Law Resource Center
First Amendment Issues




Source: Media Law Resource Center
Tips/Resources

 “Googling” Yourself    Use Social
   Contact Info          Networking Privacy
                          Tools
 Segregate Email
  Addresses              IC3.gov
 Key Word Alerts        HaltAbuse.org
 Trademark or Domain
  Monitor Services
Bennet Kelley
                                Bennet Kelley founded the Internet Law Center in 2007 after a
                                decade of activity in many of the hottest internet issues including
                                behavioral targeting, cyber squatting, net neutrality, privacy, spam
                                and spyware. Prior to launching the Internet Law Center, Bennet
                                worked in-house with companies such as ETM Entertainment
                                Network, SpeedyClick.com, Hi-Speed Media and ValueClick.

                                Bennet is Co-Chair of the California Bar's Cyberspace Committee
                                and has played a leading role in shaping Internet law and policy.
                                Bennet testified before the California Senate Business &
                                Professions Committee on its landmark 2003 spam legislation and
                                was praised by the House Energy & Commerce Committee for his
bkelley@internetlawcenter.net   contributions to federal spyware legislation. He also launched an
                                initiative through the Cyberspace Committee to develop a
                                cyberspace primer for incoming state legislators.

                                In addition, Bennet has extensive political experience that includes
                                serving as National Co-Chair of the Democratic National
                                Committee's Saxophone Club (its young professional fundraising
                                and outreach arm) during the Clinton era and being an award
                                winning political columnist for Huffington Post.
The Internet Law Center is dedicated to helping
                                         businesses navigate the evolving legal standards for
                                         today’s digital economy, while also contributing to the
                                         development of the policies of tomorrow. The firm
                                         serves a diverse client base that includes startups and
 WE KNOW THE INTERNET                    public companies both online and offline across North
                                         America and Asia.

Internet Law Center                      The professionals of the Internet Law Center possess
100 Wilshire Blvd., Suite 950            years of practical experience as lawyers and
Santa Monica, CA 90401
www.internetlawcenter.net                entrepreneurs with internet companies and have played
                                         a leading role in shaping Internet law and policy. This
Santa Monica Washington South Carolina
                                         unprecedented combination of business, legal and
                                         policy experience makes the Internet Law Center
                                         uniquely qualified to provide the professional advice
                                         needed to address emerging issues of internet law in
                                         an uncertain economy.

                                         Sign up for Cyber Report – our award winning newsletter
                                         which was named one of the Top 100 Internet Law
                                         Resources and re-launches this fall.

Más contenido relacionado

La actualidad más candente

Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingQuirky Kid
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social mediaememdesign
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Gang Violence
Gang ViolenceGang Violence
Gang Violencecryaneghs
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Social Media: Features & Benefits
Social Media: Features & BenefitsSocial Media: Features & Benefits
Social Media: Features & BenefitsSoci@lite
 

La actualidad más candente (20)

Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Gang Violence
Gang ViolenceGang Violence
Gang Violence
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Social Media: Features & Benefits
Social Media: Features & BenefitsSocial Media: Features & Benefits
Social Media: Features & Benefits
 

Similar a Cyber Harassment

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Similar a Cyber Harassment (20)

FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 

Más de Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Más de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Cyber Harassment

  • 1. CYBER HARASSMENT Bennet Kelley ‘89 Georgetown University Law Center Reunion Weekend
  • 3. PERPETRATOR VICTIMS 63.3% men (where known) DURATION 72.5% women Avg. – 2 Years Half have no prior 44% 18-30 yrs old relationship with victim 71% - no offline threats Source: HaltAbuse.org
  • 4. Forms of Harassment  Abusive Emails/IMs  Chat Room and Blog Posts  Computer Attacks –  Cyber smears (e.g., viruses, hacking Skanks in NYC)  Crowding Out Benign  Disclosure of Private Facts Content (or photos)  Cyber squatting or use of  Use/misuse of victim’s content identity  Cyber Bullying  Identity Theft
  • 5.
  • 6. Remedies • Trespass • Fraud Common • Defamation • Invasion of Privacy/Infliction of Emotional Distress Law • Trademark/Copyright General • Wire Fraud, RICO Statutory Authority • Anti-Cybersquatting Protection Act • Computer Fraud & Abuse Act Internet • Identity Theft Enforcement and Restitution Act Crimes • Federal Laws Limited in Scope • State Cyber-Stalking and Cyber-Harassment Laws Harassment Laws
  • 7. Selected Federal Criminal Laws  18 USC § 875 – prohibits  Violence Against Women threats to “injure the Act Amendments (18 USC person” or “injure the § 2261A) - prohibits acts property or reputation” or course of conduct “with  No private action the intent to kill, injure, harass,” that causes “substantial emotional  47 U.S.C. § 223 – prohibits distress” or reasonable fear anonymous use of email to of death or “serious bodily “annoy, abuse, harass, or injury” to victim, family, threaten” (does not apply spouse or intimate partner. to chat board posting)  Increased penalties for  No private action violating restraining order  Only applies to interstate conduct
  • 8. State Cyber Harassment Laws Source: Congressional Research Service
  • 9. State Cyber Stalking Laws Source: Congressional Research Service
  • 10. US v. Lori Drew Or How a Missouri Mom Got a Trip to Disneyland
  • 13. Civil v. Criminal Sanctions  Criminal Law generally for acts offensive to society as a whole  Remedy – Fine and Imprisonment  Civil Law for remedying wrongs between individuals  Remedy - Damages  What happens when individuals cannot afford litigation? 
  • 14. Coach Thompson’s Garage GRRR IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 15. Coach Thompson’s Computer Screen ii sum valde iratus iam IS IT SPEECH? IS IT A CRIME? IS PROPERTY DAMAGED? IS IT OFFENSIVE TO SOCIETY AS A WHOLE?
  • 16. Criminal Defamation Laws Source: First Amendment Center, Media Law Resource Center
  • 17. Forgotten but not Gone Source: Media Law Resource Center
  • 18. First Amendment Issues Source: Media Law Resource Center
  • 19. Tips/Resources  “Googling” Yourself  Use Social  Contact Info Networking Privacy Tools  Segregate Email Addresses  IC3.gov  Key Word Alerts  HaltAbuse.org  Trademark or Domain Monitor Services
  • 20. Bennet Kelley Bennet Kelley founded the Internet Law Center in 2007 after a decade of activity in many of the hottest internet issues including behavioral targeting, cyber squatting, net neutrality, privacy, spam and spyware. Prior to launching the Internet Law Center, Bennet worked in-house with companies such as ETM Entertainment Network, SpeedyClick.com, Hi-Speed Media and ValueClick. Bennet is Co-Chair of the California Bar's Cyberspace Committee and has played a leading role in shaping Internet law and policy. Bennet testified before the California Senate Business & Professions Committee on its landmark 2003 spam legislation and was praised by the House Energy & Commerce Committee for his bkelley@internetlawcenter.net contributions to federal spyware legislation. He also launched an initiative through the Cyberspace Committee to develop a cyberspace primer for incoming state legislators. In addition, Bennet has extensive political experience that includes serving as National Co-Chair of the Democratic National Committee's Saxophone Club (its young professional fundraising and outreach arm) during the Clinton era and being an award winning political columnist for Huffington Post.
  • 21. The Internet Law Center is dedicated to helping businesses navigate the evolving legal standards for today’s digital economy, while also contributing to the development of the policies of tomorrow. The firm serves a diverse client base that includes startups and WE KNOW THE INTERNET public companies both online and offline across North America and Asia. Internet Law Center The professionals of the Internet Law Center possess 100 Wilshire Blvd., Suite 950 years of practical experience as lawyers and Santa Monica, CA 90401 www.internetlawcenter.net entrepreneurs with internet companies and have played a leading role in shaping Internet law and policy. This Santa Monica Washington South Carolina unprecedented combination of business, legal and policy experience makes the Internet Law Center uniquely qualified to provide the professional advice needed to address emerging issues of internet law in an uncertain economy. Sign up for Cyber Report – our award winning newsletter which was named one of the Top 100 Internet Law Resources and re-launches this fall.