Chapter 44: Cyberlaw

advertisement
CHAPTER FORTY-FOUR
CYBERLAW
CHAPTER OUTLINE
I.
Privacy
A. Internet Tracking
1. Of Cookies and Caches
2. The State of Privacy on the Internet
B. Self-Regulation of Online Privacy
C. The Failure of Self-Regulation
D. Government Regulation of Online Privacy
1. Children’s Online Privacy Protection Act of 1998
2. The FTC Seeks Help from Congress
3. The Role of the Courts
E. Your Hard Drive as Witness (Against You)
1. Criminal Law
2. Civil Litigation
F. E-Mail
1. Electronic Communications Privacy Act of 1986
2. Common Law Regulation of E-Mail Privacy
G. Encryption
II.
Crime on the Internet
A. Hacking
B. Fraud
1. Auctions
2. Identity Theft
3. Fighting Internet Crime
259
III.
Internet Service Providers and Web Hosts
A. Spam
1. Fraudulent Spam
2. Non-Fraudulent Spam
B. Communications Decency Act of 1996
WHAT YOU SHOULD KNOW
After reading this chapter you should understand:
what actions the Network Advertising Initiative suggests regarding personal data that Web sites
collect about individuals;
what actions are prohibited by the Children’s Online Privacy Protection Act of 1998;
what protections the Fourth Amendment of the Constitution may provide in connection with
computers;
what the Privacy Policy Act requires the government to do before taking certain actions;
what actions are prohibited by the Electronic Communications Privacy Act of 1986 and when this
Act may allow parties to disclose, monitor, or access others’ e-mail;
when intrusion into another person’s private life may constitute a tort under the common law;
when a government license is required before encryption software can be exported;
what hacking is;
what conduct is barred by the Computer Fraud and Abuse Act of 1986;
what fraud is;
what conduct is prohibited by the Identity Theft and Assumption Deterrence Act of 1998;
what spam is and when spam may violate the law; and
what the Communications Decency Act of 1996 provides regarding the liability of ISPs and Web
hosts for actions of others.
260
REVIEW OF TERMS AND PHRASES
MATCHING EXERCISE
Select the term or phrase that best matches a statement or definition stated below. Each term or phrase is the
best match for only one statement or definition.
Terms and Phrases
a. Computer Fraud and Abuse Act
e. Fraud
i. Privacy Policy Act
b. Electronic communication
f. Hacking
j. Shilling
c. Encryption
g. ISP
k. Spam
d. Federal Trademark and Dilution Act of 1995
h. Lanham Act
l. Trespass to chattels
Statements and Definitions
____ 1.
Seller either bids on his or her own goods or agrees to cross-bid with other sellers.
____ 2.
Encoding a communication in order to conceal its meaning.
____ 3.
Law that prohibits anyone from accessing a computer without authorization.
____ 4.
Federal law that forbids the false use of a trademark.
____ 5.
Common law tort that is committed when one deceives a second party for the purpose of
wrongfully obtaining money or something of value from the second party.
____ 6.
Tort committed under the common law of at least one state when a party intentionally uses
someone else’s property without authorization.
____ 7.
Unauthorized access to another’s computer system.
____ 8.
E-mail and transmissions from pagers and cellular phones.
____ 9.
Internet service provider, such as AOL.
____10.
Federal law that requires the government to obtain a warrant before searching or seizing the
papers of anyone who is engaged in publishing a newspaper, book, or broadcast.
____11.
Federal law that forbids the use of another’s trademark in a way that reduces the mark’s value.
____12.
Unsolicited commercial e-mail or unsolicited bulk e-mail.
261
REVIEW OF CONCEPTS
TRUE-FALSE QUESTIONS
Circle T for true or F for false.
T
F
1.
Federal law prohibits Web sites from placing cookies in a person’s computer unless the
person has expressly consented to such action.
T
F
2.
In general, advertising on the Web is not subject to significant government regulation.
T
F
3.
Online privacy is primarily governed by industry self-regulation rules, which have largely
failed to protect the privacy of online users.
T
F
4.
The Children’s Online Privacy Protection Act is an example of industry self-regulation
that forbids the dissemination of child pornography on the Web.
T
F
5.
The courts do not have the jurisdiction to rule on the legality or illegality of conduct on the
Web since this conduct involves interstate commerce.
T
F
6.
The Fourth Amendment may apply to governmental searches of a person’s computer.
T
F
7.
In general, relevant information that is on a person’s computer may used against that
person in civil litigation.
T
F
8.
Under the Electronic Communications Privacy Act of 1986, an intended recipient of email has the right to disclose its content to others.
T
F
9.
The government cannot access a person’s e-mail even if the government first obtains a
search warrant to do so.
T
F
10. Under the common law, the wrongful accessing of private information on another person’s
computer may constitute a tort.
262
MULTIPLE CHOICE QUESTIONS
1. ____ Charlie, who lived in Wisconsin, developed sophisticated encryption software that was virtually
impregnable. Which of the following actions by Charlie would violate U.S. Export
Administration Regulations?
a. Charlie posted a copy of the software on the Internet.
b. Charlie mailed a hardcopy of his new code to a friend in Indonesia.
c. Charlie e-mailed an electronic version of his new code to a friend in France.
d. Charlie used the software on his own computer.
2. ____ Which of the following actions would violate the federal Computer Fraud and Abuse Act of
1986?
a. Diane used her computer and the Internet to hack into the computers of Last National Bank
and to transfer $100,000 to her personal bank account.
b. Diane used her computer and the Internet to place cookies in the computers of persons who
visited her Web site that she used to advertise and sell cosmetics.
c. Diane used her computer and the Internet to plant destructive viruses on the Web sites of
competitors.
d. a and c.
3. ____ The federal Drug Enforcement Agency (DEA) suspected that Stanley was unlawfully selling and
distributing cocaine. Moreover, the DEA had reason to believe that Stanley was using his Web
site to make drug sales to people in all parts of the country. Under these facts:
a. The DEA has the unlimited right to place “dragnet” software programs on the ISP that
Stanley uses in order to intercept e-mails coming or going from Stanley’s Web site.
b. The DEA has the right to place “dragnet” software programs on the ISP that Stanley uses in
order to intercept e-mails coming or going from Stanley’s Web site only if the DEA first
obtains a warrant or court order allowing it to do so.
c. The DEA has the unlimited right to search Stanley’s computer for evidence of wrongdoing so
long as it does not require Stanley’s help in searching his computer.
d. b and c.
4. ____ In general, which of the following types of spam are unlawful under federal or state law?
a. Misty sent spam e-mails to 1,000 persons whom she thought would be interested in her new
line of clothing.
b. Misty sent spam e-mails to 1,000 persons telling them that they had each won $5,000 worth
of her new line of clothing, but each winner had to send her $200 to cover the cost of
shipping the clothing. This spam was false and Misty simply kept all of the money that was
sent to her.
c. Misty sent spam e-mails to 1,000 persons protesting the U.S. government’s refusal to
263
improve relations with certain foreign countries.
d. All of the above.
5. ____ Sam operates an Internet business that specializes in the sale of electronic games to young
children and teenagers. Sam decided to entice visitors to his Web site by letting them play one of
his games for free. Sam required all visitors, however, to first provide certain personal
information, which he intended to use internally and/or to disclose publicly. Which of the
following actions by Sam would violate the Children’s Online Privacy Protection Act of 1998?
a. Sam collected personal information from Amy, age 18, without first obtaining her parent’s
permission. Sam is using this information internally and he also plans to publicly disclose it.
b. Sam collected personal information from William, age 12, after obtaining his parent’s
consent by e-mail. Sam is using this information internally.
c. Sam collected personal information from Rachel, age 11, after obtaining her parent’s consent
by e-mail. Sam is publicly disclosing this information.
d. Sam collected personal information from Johnny, age 10, after obtaining his parent’s written
consent. Sam is publicly disclosing this information.
6. ____ Which of the following statements is correct regarding the federal Identity Theft and Assumption
Deterrence Act of 1998?
a. This Act forbids people from electronically disclosing their social security identification over
the Internet.
b. This Act forbids people from using the identification of others to commit fraud or other
crimes.
c. This Act authorizes victims to obtain restitution from persons who fraudulently used their
identification.
d. b and c.
SHORT ESSAY
1. Discuss industry self-regulation of online privacy and analyze how effective this type of regulation has
been.
CASE PROBLEM
Answer the following case problem, explaining your answer.
1. Autumn is an e-mail junkie – she communicates with everyone via e-mail. In particular, Autumn sent
the following e-mails: (a) Autumn sent an e-mail from her personal computer to John, her cousin,
disclosing that Autumn had stolen money from her church; (b) Autumn sent an e-mail from her
personal computer to Oman, an e-mail pal in a country that is hostile to the U.S.; and (c) Autumn used
her employer’s computer and e-mail system to send an e-mail to Sherry, a co-worker, stating that the
boss was a creep. Under these facts:
264
a.
b.
c.
Can John lawfully disclose the content of Autumn’s e-mail without her consent?
Can the ISP that Autumn uses lawfully disclose any information regarding her e-mail to Oman?
Can Autumn’s employer lawfully monitor her e-mail to Sherry?
Download