SlideShare a Scribd company logo
1 of 27
Regulation of the Internet Your Logo
Barry James,  The International Herald Tribune August 5, 1996.
 
 
The New Frontier
INTERNET USER
IDENTITY THEFT :  Identity Theft and Assumption Deterrence Act . 18 U.S.C. § 1028  (1998); California Anti-Phishing Act of 2005, California Business & Professions Code §22948 IP INFRINGEMENT:  Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. §512(1998); Anti-cyber-squatting Consumer Protection Act. 15 U.S.C. §1125(d) )(1999). SPAM:  Controlling the Assault of Non-Solicited Pornography And Marketing (“CAN-SPAM”) Act of 2003,  15 U.S.C. § 7701. PRIVACY & SPYWARE:  Electronic Communications Privacy Act of 1986, 18 U.S.C.§2510; California Consumer Protection Against Computer Spyware Act, Business & Professions Code § 22947 (2004) CHILDREN:  Children's Online Privacy Protection Act of 1998 (COPPA) 15 U.S.C.§6501. VIRUSES & MALWARE:  Computer Fraud and Abuse Act, 18 U.S.C. §1030 (1986) . 1 2 3 4 5 6
 
 
Example: Spam 2000-2003 Spam grows as a threat to eco-system Technology – partial solution . Congress: spam is Constitutionally protected commercial speech –  regulate it, do not ban it . No meaningful self-regulation .
Rob McKenna  Attorney General - State of Washington (2008)  Frontier Population: 1,463,632,361 (June 2008 ) 2 Billion (2010)
 
VICTIMS 1.2 MM (2006) 72.5% women 44% 18-30 yrs old ,[object Object],[object Object],[object Object],DURATION Avg. – 2 Years
 
 
 
Criminal Defamation ,[object Object],Red – States with criminal defamation laws and prosecutions Yellow – States with law on books but no recent prosecutions
Notes from Meeting with my Lawyer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Standard for Unmasking Bloggers Standard  Higher for Political Speech Lower for Commercial Speech
Two Things You Need to Know
It’s Really Simple  (not)
 
 
Prediction: APRIL 1, 2011 Las Vegas, Nevada Prediction: APRIL 1, 2012 Las Vegas, Nevada
 

More Related Content

What's hot

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Statements Made in Opposition to SESTA
Statements Made in Opposition to SESTAStatements Made in Opposition to SESTA
Statements Made in Opposition to SESTAInternet Law Center
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallInternet Law Center
 
The Rise and fall of Sopa and pipa
The Rise and fall of Sopa and pipaThe Rise and fall of Sopa and pipa
The Rise and fall of Sopa and pipaBrian Mazurowski
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation ManagementInternet Law Center
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Airhandsomelykeepe65
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsInternet Law Center
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media EthicsTeichka Muñoz
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Act-On Software
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction PrimerGraham Smith
 

What's hot (20)

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Can Spam At 5
Can Spam At 5Can Spam At 5
Can Spam At 5
 
SOPA
SOPASOPA
SOPA
 
SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2SESTA Backgrounder Pt 2
SESTA Backgrounder Pt 2
 
Statements Made in Opposition to SESTA
Statements Made in Opposition to SESTAStatements Made in Opposition to SESTA
Statements Made in Opposition to SESTA
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly Call
 
The Rise and fall of Sopa and pipa
The Rise and fall of Sopa and pipaThe Rise and fall of Sopa and pipa
The Rise and fall of Sopa and pipa
 
my point of view
my point of viewmy point of view
my point of view
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
PIPA and SOPA
PIPA and SOPAPIPA and SOPA
PIPA and SOPA
 
Five Rules of Reputation Management
Five Rules of Reputation ManagementFive Rules of Reputation Management
Five Rules of Reputation Management
 
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot AirWhat Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
What Net Neutrality Opponents Are Saying Now — And Why It’s A Lot Of Hot Air
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial Communications
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
 
Internet Jurisdiction Primer
Internet Jurisdiction PrimerInternet Jurisdiction Primer
Internet Jurisdiction Primer
 

Similar to Evolution of US Approaches to Internet Regulation

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012Vivastream
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
All aboard the Cyber Security Rollercoaster!
All aboard the Cyber Security Rollercoaster!All aboard the Cyber Security Rollercoaster!
All aboard the Cyber Security Rollercoaster!Nick Malcolm
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forMcPhearson TVHolden
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Enviromental Scanning Class Presentation
Enviromental Scanning Class PresentationEnviromental Scanning Class Presentation
Enviromental Scanning Class PresentationKristianSnow
 
Changing Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldChanging Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldSwasti Chaturvedi
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 

Similar to Evolution of US Approaches to Internet Regulation (20)

C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
Nokia LTA Web 20 Legal Issues
Nokia LTA Web 20 Legal IssuesNokia LTA Web 20 Legal Issues
Nokia LTA Web 20 Legal Issues
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
All aboard the Cyber Security Rollercoaster!
All aboard the Cyber Security Rollercoaster!All aboard the Cyber Security Rollercoaster!
All aboard the Cyber Security Rollercoaster!
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
How to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out forHow to be a social media influencer...and the legal issues to watch out for
How to be a social media influencer...and the legal issues to watch out for
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
Chapter14
Chapter14Chapter14
Chapter14
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Enviromental Scanning Class Presentation
Enviromental Scanning Class PresentationEnviromental Scanning Class Presentation
Enviromental Scanning Class Presentation
 
Changing Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldChanging Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised World
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Evolution of US Approaches to Internet Regulation

  • 1. Regulation of the Internet Your Logo
  • 2. Barry James, The International Herald Tribune August 5, 1996.
  • 3.  
  • 4.  
  • 7. IDENTITY THEFT : Identity Theft and Assumption Deterrence Act . 18 U.S.C. § 1028 (1998); California Anti-Phishing Act of 2005, California Business & Professions Code §22948 IP INFRINGEMENT: Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. §512(1998); Anti-cyber-squatting Consumer Protection Act. 15 U.S.C. §1125(d) )(1999). SPAM: Controlling the Assault of Non-Solicited Pornography And Marketing (“CAN-SPAM”) Act of 2003, 15 U.S.C. § 7701. PRIVACY & SPYWARE: Electronic Communications Privacy Act of 1986, 18 U.S.C.§2510; California Consumer Protection Against Computer Spyware Act, Business & Professions Code § 22947 (2004) CHILDREN: Children's Online Privacy Protection Act of 1998 (COPPA) 15 U.S.C.§6501. VIRUSES & MALWARE: Computer Fraud and Abuse Act, 18 U.S.C. §1030 (1986) . 1 2 3 4 5 6
  • 8.  
  • 9.  
  • 10. Example: Spam 2000-2003 Spam grows as a threat to eco-system Technology – partial solution . Congress: spam is Constitutionally protected commercial speech – regulate it, do not ban it . No meaningful self-regulation .
  • 11. Rob McKenna Attorney General - State of Washington (2008) Frontier Population: 1,463,632,361 (June 2008 ) 2 Billion (2010)
  • 12.  
  • 13.
  • 14.  
  • 15.  
  • 16.  
  • 17.
  • 18.
  • 19.  
  • 20.  
  • 21. Standard for Unmasking Bloggers Standard Higher for Political Speech Lower for Commercial Speech
  • 22. Two Things You Need to Know
  • 24.  
  • 25.  
  • 26. Prediction: APRIL 1, 2011 Las Vegas, Nevada Prediction: APRIL 1, 2012 Las Vegas, Nevada
  • 27.