Lecture 2
Lecture 2
(CSET 260)
Speech
What does the First Amendment say about freedom of speech?
Can speech be restricted, and if so, when?
According to the article of constitutional faith, what sorts of speech are
protected, where free expression may be limited, and why “freedom of speech
is a core American belief, almost a kind of secular religious tenet.
Press
How did freedom of the press come about?
Are there restrictions on press freedom?
The ways in which this core freedom has developed in law are explained in this
overview by a First Amendment scholar.
FIRST AMENDMENTS
Religion
The First Amendment introduced bold new ideas to the world: that government
must not impose a state religion on the public, or place undue restrictions on
religious practice, but must recognize the right of the people to believe and
worship, or not, as their conscience dictates.
Assembly
Our right to gather in peaceful public protest – in marches, rallies and other
assemblies – is another core freedom guaranteed by the First Amendment.
First Amendment freedoms ring hollow if government officials can repress
expression that they fear will create a disturbance or offend.
Petition
This least-known First Amendment freedom is nevertheless crucial to our
democratic republic’s form of government.
Petition is the right to ask government at any level to right a wrong or correct a
problem.
DATA LOSS
What Is Data Loss?
Data loss occurs when valuable or sensitive information on a computer is
compromised due to theft, human error, viruses, malware, or power failure.
It may also occur due to physical damage or mechanical failure or equipment of
an edifice.
Social engineering and phishing attacks are common sources of computer viruses
and malware infections that infiltrate computers and lead to data loss.
The attackers can also encrypt data and hold it hostage until the user pays a
ransom to obtain the decryption key.
Types of Data Loss
Human error - accidental or unknowing data deletion, modification, overwrite.
File corruption - software error, virus infection.
Hardware - drive failure, controller failure, CPU failure.
Site-related - theft, fire, flood, earthquake, lightning, etc.
TRADEMARKS
What Is Trademark?
A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is
used and sometimes legally registered as a representation of a company.
Trademarks are used to keep a company’s distinctly identifying intellectual
property secure.
Trademarking company identifiers provides legal rights that prevent other
parties using the registered property.
A trademark must be distinct, identifiable and original.
Often a trademark will convey the brand essence of a product. Trademarks are
seen everywhere in modern life.
TRADEMARKS
Trademark in Cyberspace
The concept of the trademark in cyberspace has become very important as the use
of technology is growing day by day.
The Intellectual property protection in relation to trade was recognized by the
world trade organization (WTO) in the form of Trade Related Aspects of
Intellectual Property Rights (TRIPS) agreements.
The agreement is considered a landmark and complete agreement on Intellectual
property rights.
The trademark law was applicable to protect those traders who had a registered
trademarks, by providing them an exclusive right to carry on trade under that mark
and preventing any third parties from using the same.
However, with the rise of the internet and the paradigm shift from the traditional
trading process to the online platform.
Many new challenges have taken birth in relation to protection of trademark.
DEFAMATION
Defamation in Cyberspace
Cyber Defamation means using the internet as a tool to defame and malign another
person. It involves use of social media and online campaigns to tarnish the image of the
victim.
The three essentials of defamation are:
The statement must be false and defamatory,
The said statement must refer to the victim, and
The statement must be published.
A person's reputation is his or her property and sometimes even more valuable than
physical property. Thus, cyber defamation law (e.g., digital security act in Bangladesh) is
essential.
For example, a disgruntled employee of a Company may post some defamatory remarks
about the Company on a popular blog site or may send some slanderous email, defaming
the company or any of its important managerial personnel, to the clients.
PRIVACY-COMMON LAW
Common Law Right to Privacy
Privacy is the right to be let alone or to be free from misuse or abuse of one’s personality.
Specifically, Privacy is when nobody is aware of what you are doing but potentially, they
know your identity.
The common law of privacy recognizes five discrete rights of privacy.
o First, the common law affords individuals the right to sue when their seclusion or
solitude has been intruded upon in an unreasonable and highly offensive manner.
o Second, individuals have a common-law right to sue when information concerning
their private life is disclosed to the public in a highly objectionable fashion.
o Third, tort liability may be imposed on individuals or entities that publicize
information that places someone in a false light.
o Fourth, the common law forbids persons from appropriating someone's name or
likeness without his or her consent.
o Fifth, the common law prevents business competitors from engaging in unfair
Competition through the theft of trade secrets.
CONSTITUTIONAL LAW
Constitutional Law
Constitutional law is a body of law which defines the role, powers, and structure
of different entities within a state, namely, the executive, the parliament or
legislature, and the judiciary.
It also addresses the basic rights of citizens and, in federal countries such as the
United States and Canada, the relationship between the central government and
state, provincial, or territorial governments.
The Constitutional Law of Cyberspace justifies and further expands the powers of
the government to control and monitor the use of the internet without institutional
checks.
Thus, Constitutional laws can be considered second order rule making or rules
about making rules to exercise power.
Therefore, one of the key tasks of constitutions within this context is to indicate
hierarchies and relationships of power.
FEDERAL STATUS
Federal Status in Cyberspace
Cyber crimes typically rise to the level of a federal criminal offense because they involve
the internet by their very nature.
Federal agencies are subject to a variety of federal government-wide and agency-specific
laws and guidance that address cybersecurity.
Federal government-wide laws include the Federal Information Security Modernization
Act of 2014 (FISMA), the Federal Information Technology Acquisition Reform Act of
2014 (FITARA), and the Privacy Act of 1974.
Federal sentencing guidelines recommend a prison sentence of up to 20 years for those
convicted of cyber crime offenses.
If the offense results in the death of another person, then a defendant convicted of the
crime could be sentenced to life in prison. This is irrespective of the type of cyber crime.
Federal sentencing guidelines recommend a prison sentence of up to 10 years for those
first time offenders. Even still, consulting with a cyber crime lawyer can greatly reduce
your criminal liability.
ANONYMITY
Anonymity in Cyberspace
Cyber crimes typically rise to the level of a federal criminal offense because they involve
the internet by their very nature.
An anonymity network enables users to access the Web while blocking any tracking or
tracing of their identity on the Internet.
This type of online anonymity moves Internet traffic through a worldwide network of
volunteer servers.
Anonymity networks prevent traffic analysis and network surveillance - or at least make it
more difficult.
For example you could connect to an anonymizing service like 'Tor' to post a political
message under an anonymous user name in a country where this is prohibited.
In this instance, you are keeping separate from your identity while making your non-
private message.
TECHNOLOGY EXPANDING PRIVACY RIGHTS
Technology and Privacy Rights
Human beings value their privacy and the protection of their personal sphere of life. They
value some control over who knows what about them.
But recent advances in information technology threaten privacy and have reduced the
amount of control over personal data and open up the possibility of a range of negative
consequences as a result of access to personal data.
The 21st century has become the century of big data and advanced information technology
(e.g. forms of deep learning), the rise of big tech companies and the platform economy,
which comes with the storage and processing of exabytes of data.
The combination of increasing power of new technology and the declining clarity and
agreement on privacy give rise to problems concerning law, policy and ethics.
Many of these conceptual debates and issues are situated in the context of interpretation
and analysis of the General Data Protection Regulation (GDPR) that was adopted by the
EU in spring 2018 as the successor of the EU 1995 Directives, with application far
beyond the borders of the European Union.
CLASS ASSIGNMENT-2
Case Study 2: Design a Complete Software Piracy Statement/Proposal
It includes:
Definition
Regulation Issues
Copy right Issues
Piracy Issues (Different Types)
Impact/Danger of Software Piracy
License Agreement Issues
*** This Case study is individual basis: Submit as PDF file. I will not
accept any statement which are identical between two or more students.