SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
HOT HOT HOT
 TOPICS IN
BEHAVIORAL TARGETING
                INTERNET LAW CENTER
310) 452-0401                   www.internetlawcenter.net
bkelley@internetlawcenter.net   @InternetLawCent
The Good
The Good
The Good?
$
The Good?
The Good?
(Jan. 2011)




              (June 2010)




      (Dec 2010)



(Dec. 2010)
Class Action Litigation
• Electronic Communications Privacy Act
• Computer Fraud and Abuse Act

Mortensen v. Bresnan Comm., CV 10-13-BLG-RFC (D. Mont. Dec. 13,
2010) (dismisses ECPA claim due to consent, CFAA claim survives)
Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW –
JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren
Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August
2009)
Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW –
JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren
Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August
2009)
Big Nose strikes again by buzusa @ flickr
Michelle Ward, aka The When I Grow Up Coach
Hogette 1 – Micki James @ Flickr

Michelle Ward, aka The When I Grow Up Coach
Our report and law enforcement action send a
clear message to industry: despite some good
actors, self-regulation of privacy has not
worked adequately and is not working
adequately for Americans consumers. We
deserve far better from the companies we
entrust our data to, and industry, as a whole,
must do better.

                    FTC Chairman Jon Leibowitz
Key Principles
Privacy by Design
Simplified Choice
Greater Transparency
Key Principles
Privacy by Design
Simplified Choice
Greater Transparency
• “The concept of do not track has not
                 been endorsed by the commission
                 or, in my judgment, even properly
                 vetted yet. . . .”
               • Has “serious questions about the
                 various do-not-track proposals. . . .”
   FTC
Commissioner
                         J. Thomas Rosch, Brand Week (Mar. 24, 2011)
• Endorses baseline commercial data
  privacy principles that would fill any
  gaps in existing U.S. law;
• Safe harbors against FTC enforcement
  for practices defined by baseline data
  privacy or self-regulatory codes;
• Limited rulemaking authority over
  certain baseline fair information privacy
  practices principles if it is established
  that market failures require prescriptive
  regulatory action; and
• National Data Breach Standards
All rise . . .




Wednesdays at 10 AM PT
   WebmasterRadio.fm
HOT HOT HOT
 TOPICS IN

Más contenido relacionado

La actualidad más candente

Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
guest70f067f
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone Privacy
Christie Dudley
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
amprivacy
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
Teichka Muñoz
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
Vivastream
 
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma PaperEth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Heather Taylor
 
Black wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA ReportBlack wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA Report
Jose Pinilla
 

La actualidad más candente (20)

Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
ILC Cyber Report - June 2018
ILC Cyber Report - June 2018ILC Cyber Report - June 2018
ILC Cyber Report - June 2018
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone Privacy
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Tech Group Announces Privacy Standards
Tech Group Announces Privacy StandardsTech Group Announces Privacy Standards
Tech Group Announces Privacy Standards
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Final presentation New Media Ethics
Final presentation New Media EthicsFinal presentation New Media Ethics
Final presentation New Media Ethics
 
How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012How Will Privacy Regulation Impact Your Business in 2012
How Will Privacy Regulation Impact Your Business in 2012
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma PaperEth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
Eth321_ Wk 2_ Heather Taylor_ Ethical Dilemma Paper
 
Black wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA ReportBlack wednesday SOPA/PIPA Report
Black wednesday SOPA/PIPA Report
 
Social Media and the Law - by Tom Cowling
Social Media and the Law - by Tom CowlingSocial Media and the Law - by Tom Cowling
Social Media and the Law - by Tom Cowling
 
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 

Destacado

Destacado (8)

Farm Concern International
Farm Concern InternationalFarm Concern International
Farm Concern International
 
Flash Game with Freeware
Flash Game with FreewareFlash Game with Freeware
Flash Game with Freeware
 
Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013Cyber Law and Business Report Year in Review: 2013
Cyber Law and Business Report Year in Review: 2013
 
ICT Observatory 2009: Introduction
ICT Observatory 2009: IntroductionICT Observatory 2009: Introduction
ICT Observatory 2009: Introduction
 
Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10Forghieri Laboratorio Ancitel 3-2-10
Forghieri Laboratorio Ancitel 3-2-10
 
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
Impact of a video’s in reinforcing use of hyphaena crinite fruits in improvin...
 
Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12Adex Benchmark 2011 (Iab Europe) -JUL12
Adex Benchmark 2011 (Iab Europe) -JUL12
 
Linking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & AsiaLinking experiences between LAM, Africa, & Asia
Linking experiences between LAM, Africa, & Asia
 

Similar a Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
YunLi
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
YunLi
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L I
YunLi
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Shawn Tuma
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 

Similar a Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising (20)

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Presentation Y U N L I
Presentation  Y U N  L IPresentation  Y U N  L I
Presentation Y U N L I
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
CASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASECASE STUDY ON MICROSOFT ANTITRUST CASE
CASE STUDY ON MICROSOFT ANTITRUST CASE
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 

Más de Internet Law Center

Más de Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Essentials of Cyberspace Law: User Generated Content, Privacy and Online Advertising

  • 1. HOT HOT HOT TOPICS IN
  • 2. BEHAVIORAL TARGETING INTERNET LAW CENTER
  • 3. 310) 452-0401 www.internetlawcenter.net bkelley@internetlawcenter.net @InternetLawCent
  • 4.
  • 7.
  • 11.
  • 12. (Jan. 2011) (June 2010) (Dec 2010) (Dec. 2010)
  • 13. Class Action Litigation • Electronic Communications Privacy Act • Computer Fraud and Abuse Act Mortensen v. Bresnan Comm., CV 10-13-BLG-RFC (D. Mont. Dec. 13, 2010) (dismisses ECPA claim due to consent, CFAA claim survives)
  • 14. Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW – JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August 2009)
  • 15. Valdez v. Quantcast Corp. Complaint (Case No. 2:10-cv-05484-GW – JCG) (quoting Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, Chris Jay Hoofnagle, “Flash Cookies and Privacy” (10 August 2009)
  • 16.
  • 17. Big Nose strikes again by buzusa @ flickr
  • 18.
  • 19. Michelle Ward, aka The When I Grow Up Coach
  • 20. Hogette 1 – Micki James @ Flickr Michelle Ward, aka The When I Grow Up Coach
  • 21.
  • 22. Our report and law enforcement action send a clear message to industry: despite some good actors, self-regulation of privacy has not worked adequately and is not working adequately for Americans consumers. We deserve far better from the companies we entrust our data to, and industry, as a whole, must do better. FTC Chairman Jon Leibowitz
  • 23. Key Principles Privacy by Design Simplified Choice Greater Transparency
  • 24. Key Principles Privacy by Design Simplified Choice Greater Transparency
  • 25.
  • 26. • “The concept of do not track has not been endorsed by the commission or, in my judgment, even properly vetted yet. . . .” • Has “serious questions about the various do-not-track proposals. . . .” FTC Commissioner J. Thomas Rosch, Brand Week (Mar. 24, 2011)
  • 27. • Endorses baseline commercial data privacy principles that would fill any gaps in existing U.S. law; • Safe harbors against FTC enforcement for practices defined by baseline data privacy or self-regulatory codes; • Limited rulemaking authority over certain baseline fair information privacy practices principles if it is established that market failures require prescriptive regulatory action; and • National Data Breach Standards
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. All rise . . . Wednesdays at 10 AM PT WebmasterRadio.fm
  • 38. HOT HOT HOT TOPICS IN