fbpx
Wikipedia

IT law

Information technology law (IT law) or information, communication and technology law (ICT law) (also called cyberlaw) concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of law comprises elements of various branches of law, originating under various acts or statutes of parliaments, the common and continental law and international law. Some important areas it covers are information and data, communication, and information technology, both software and hardware and technical communications technology, including coding and protocols.

It is related to legal informatics, and governs among others the digital dissemination of both (digitized) information and software, information security and crossing-border commerce. It raises specific issues of intellectual property, contract law, criminal law and fundamental rights like privacy, the right to self-determination and freedom of expression.

IT law encompasses rules and procedures for electronic discovery in legal proceedings. It governs the identification, preservation, collection, and production of electronically stored information (ESI) for use as evidence in litigation, arbitration, or regulatory investigations.

History edit

The regulation of information technology, through software coding, computing and the internet evolved out of the development of the first publicly funded networks, such as ARPANET and NSFNET in the United States or JANET in the United Kingdom.[1]

Areas of law edit

IT law does not constitute a separate area of law; rather, it encompasses aspects of contract, intellectual property, privacy and data protection laws. Intellectual property is an important component of IT law, including copyright and authors' rights, rules on fair use, rules on copy protection for digital media and circumvention of such schemes. The area of software patents has been controversial, and is still evolving in Europe and elsewhere.[2][page needed]

The related topics of software licenses, end user license agreements, free software licenses and open-source licenses can involve discussion of product liability, professional liability of individual developers, warranties, contract law, trade secrets and intellectual property.

In various countries, areas of the computing and communication industries are regulated – often strictly – by governmental bodies.

There are rules on the uses to which computers and computer networks may be put, in particular there are rules on unauthorized access, data privacy and spamming. There are also limits on the use of encryption and of equipment which may be used to defeat copy protection schemes. The export of hardware and software between certain states within the United States is also controlled.[3]

There are laws governing trade on the Internet, taxation, consumer protection, and advertising.

There are laws on censorship versus freedom of expression, rules on public access to government information, and individual access to information held on them by private bodies. There are laws on what data must be retained for law enforcement, and what may not be gathered or retained, for privacy reasons.

In certain circumstances and jurisdictions, computer communications may be used in evidence, and to establish contracts. New methods of tapping and surveillance made possible by computers have wildly differing rules on how they may be used by law enforcement bodies and as evidence in court.

Computerized voting technology, from polling machines to internet and mobile-phone voting, raise a host of legal issues.

Some states limit access to the Internet, by law as well as by technical means.

Regulation edit

Global computer-based communications cut across territorial borders; issues of regulation, jurisdiction and sovereignty have therefore quickly come to the fore in the era of the Internet. They have been solved pretty quickly as well, because cross-border communication, negotiating or ordering was nothing new; new were the massive amounts of contacts, the possibilities of hiding one's identity and sometime later the colonisation of the terrain by corporations.[4]

Jurisdiction edit

Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extraterritorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. The medium of the Internet, like electrical telegraph, telephone or radio, does not explicitly recognize sovereignty and territorial limitations.[5][page needed] There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of international treaties and contracts, or conflict of laws, particularly private international law. An example would be where the contents stored on a server located in the United Kingdom, by a citizen of France, and published on a web site, are legal in one country and illegal in another. In the absence of a uniform jurisdictional code, legal practitioners and judges have solved these kind of questions according the general rules for conflict of law; governments and supra-national bodies did design outlines for new legal frameworks.

Regulation alternatives edit

Whether to treat the Internet as if it were physical space and thus subject to a given jurisdiction's laws, or that the Internet should have a legal framework of its own has been questioned. Those who favor the latter view often feel that government should leave the Internet to self-regulate. American poet John Perry Barlow, for example, has addressed the governments of the world and stated, "Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different".[6] Another view can be read from a wiki-website with the name "An Introduction to Cybersecession",[7] that argues for ethical validation of absolute anonymity on the Internet. It compares the Internet with the human mind and declares: "Human beings possess a mind, which they are absolutely free to inhabit with no legal constraints. Human civilization is developing its own (collective) mind. All we want is to be free to inhabit it with no legal constraints. Since you make sure we cannot harm you, you have no ethical right to intrude our lives. So stop intruding!"[8] The project is defining "you" as "all governments", "we" is undefined. Some scholars argue for more of a compromise between the two notions, such as Lawrence Lessig's argument that "The problem for law is to work out how the norms of the two communities are to apply given that the subject to whom they apply may be in both places at once" (Lessig, Code 190).[citation needed]

Conflict of law edit

With the internationalism of the Internet and the rapid growth of users, jurisdiction became a more difficult area than before, and in the beginning courts in different countries have taken various views on whether they have jurisdiction over items published on the Internet, or business agreements entered into over the Internet. This can cover areas from contract law, trading standards and tax, through rules on unauthorized access, data privacy and spamming to areas of fundamental rights such as freedom of speech and privacy, via state censorship, to criminal law with libel or sedition.

The frontier idea that laws do not apply in "cyberspace" is however not true in a legal sense. In fact, conflicting laws from different jurisdictions may apply, simultaneously, to the same event. The Internet does not tend to make geographical and jurisdictional boundaries clear, but both Internet technology (hardware), the providers of services and its users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet.[9] As such, a single transaction may involve the laws of at least three jurisdictions:

  1. the laws of the state/nation in which the user resides,
  2. the laws of the state/nation that apply where the server hosting the transaction is located, and
  3. the laws of the state/nation which apply to the person or business with whom the transaction takes place.

So a user in one of the United States conducting a transaction with another user that lives in the United Kingdom, through a server in Canada, could theoretically be subject to the laws of all three countries and of international treaties as they relate to the transaction at hand.[10]

In practical terms, a user of the Internet is subject to the laws of the state or nation within which he or she goes online. Thus, in the U.S., in 1997, Jake Baker faced criminal charges for his e-conduct, and numerous users of peer-to-peer file-sharing software were subject to civil lawsuits for copyright infringement. This system runs into conflicts, however, when these suits are international in nature. Simply put, legal conduct in one nation may be decidedly illegal in another. In fact, even different standards concerning the burden of proof in a civil case can cause jurisdictional problems. For example, an American celebrity, claiming to be insulted by an online American magazine, faces a difficult task of winning a lawsuit against that magazine for libel. But if the celebrity has ties, economic or otherwise, to England, he or she can sue for libel in the English court system, where the burden of proof for establishing defamation may make the case more favorable to the plaintiff.

Internet governance is a live issue in international fora such as the International Telecommunication Union (ITU), and the role of the current US-based co-ordinating body, the Internet Corporation for Assigned Names and Numbers (ICANN) was discussed in the UN-sponsored World Summit on the Information Society (WSIS) in December 2003.

European Union edit

Copyright / authors' right edit

As of 2020, the European Union copyright law consists of 13 directives and 2 regulations, harmonising the essential rights of authors, performers, producers and broadcasters. The legal framework reduces national discrepancies, and guarantees the level of protection needed to foster creativity and investment in creativity.[11] Many of the directives reflect obligations under the Berne Convention and the Rome Convention, as well as the obligations of the EU and its Member States under the World Trade Organisation 'TRIPS' Agreement and the two 1996 World Intellectual Property Organisation (WIPO) Internet Treaties: the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty. Two other WIPO Treaties signed in 2012 and 2016, are the Beijing Treaty on the Protection of Audiovisual Performances and the Marrakesh VIP Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired or otherwise Print Disabled. Moreover, free-trade agreements, which the EU concluded with a large number of third countries, reflect many provisions of EU law.

Digital Services Act & Digital Markets Act (2023) edit

In 2022 the European Parliament did adopt landmark laws for internet platforms, the new rules will improve internet consumer protection and supervision of online platforms, the Digital Services Act (DSA) and the Digital Markets Act (DMA).

Debates around Internet law edit

The law that regulates aspects of the Internet must be considered in the context of the geographic scope of the technical infrastructure of Internet and state borders that are crossed in processing data around the globe. The global structure of the Internet raises not only jurisdictional issues, that is, the authority to make and enforce laws affecting the Internet, but made corporations and scholars raise questions concerning the nature of the laws themselves.

In their essay "Law and Borders – The Rise of Law in Cyberspace", from 2008, David R. Johnson and David G. Post argue that territorially-based law-making and law-enforcing authorities find this new environment deeply threatening and give a scientific voice to the idea that became necessary for the Internet to govern itself. Instead of obeying the laws of a particular country, "Internet citizens" will obey the laws of electronic entities like service providers. Instead of identifying as a physical person, Internet citizens will be known by their usernames or email addresses (or, more recently, by their Facebook accounts). Over time, suggestions that the Internet can be self-regulated as being its own trans-national "nation" are being supplanted by a multitude of external and internal regulators and forces, both governmental and private, at many different levels. The nature of Internet law remains a legal paradigm shift, very much in the process of development.[12]

Lawrence Lessig (1999) edit

Leaving aside the most obvious examples of governmental content monitoring and internet censorship in nations like China, Saudi Arabia, Iran, there are four primary forces or modes of regulation of the Internet derived from a socioeconomic theory referred to as Pathetic dot theory by Lawrence Lessig in his 1999 book, Code and Other Laws of Cyberspace:

  1. Law: What Lessig calls "Standard East Coast Code", from laws enacted by government in Washington D.C. This is the most self-evident of the four modes of regulation. As the numerous United States statutes, codes, regulations, and evolving case law make clear, many actions on the Internet are already subject to conventional laws, both with regard to transactions conducted on the Internet and content posted. Areas like gambling, child pornography, and fraud are regulated in very similar ways online as off-line. While one of the most controversial and unclear areas of evolving laws is the determination of what forum has subject matter jurisdiction over activity (economic and other) conducted on the internet, particularly as cross border transactions affect local jurisdictions, it is certainly clear that substantial portions of internet activity are subject to traditional regulation, and that conduct that is unlawful off-line is presumptively unlawful online, and subject to traditional enforcement of similar laws and regulations.
  2. Architecture: What Lessig calls "West Coast Code", from the programming code of the Silicon Valley. These mechanisms concern the parameters of how information can and cannot be transmitted across the Internet. Everything from internet filtering software (which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of TCP/IP protocols and user interfaces falls within this category of mainly private regulation. It is arguable that all other modes of internet regulation either rely on, or are significantly affected by, West Coast Code.
  3. Norms: As in all other modes of social interaction, conduct is regulated by social norms and conventions in significant ways. While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the Internet, or expressly prohibited by traditional governmental law, nevertheless these activities or conduct are regulated by the standards of the community in which the activity takes place, in this case internet "users". Just as certain patterns of conduct will cause an individual to be ostracized from our real world society, so too certain actions will be censored or self-regulated by the norms of whatever community one chooses to associate with on the internet.
  4. Markets: Closely allied with regulation by social norms, markets also regulate certain patterns of conduct on the Internet. While economic markets will have limited influence over non-commercial portions of the Internet, the Internet also creates a virtual marketplace for information, and such information affects everything from the comparative valuation of services to the traditional valuation of stocks. In addition, the increase in popularity of the Internet as a means for transacting all forms of commercial activity, and as a forum for advertisement, has brought the laws of supply and demand to cyberspace. Market forces of supply and demand also affect connectivity to the Internet, the cost of bandwidth, and the availability of software to facilitate the creation, posting, and use of internet content.

These forces or regulators of the Internet do not act independently of each other. For example, governmental laws may be influenced by greater societal norms, and markets affected by the nature and quality of the code that operates a particular system.

Net neutrality edit

Another major area of interest is net neutrality, which affects the regulation of the infrastructure of the Internet. Though not obvious to most Internet users, every packet of data sent and received by every user on the Internet passes through routers and transmission infrastructure owned by a collection of private and public entities, including telecommunications companies, universities, and governments. This issue has been handled in the paast for electrical telegraph, telephone and cable TV. A critical aspect is that laws in force in one jurisdiction have the potential to have effects in other jurisdictions when host servers or telecommunications companies are affected. The Netherlands became in 2013 the first country in Europe and the second in the world, after Chile, to pass law relating to it.[13][14] In U.S, on 12 March 2015, the FCC released the specific details of its new net neutrality rule. And on 13 April 2015, the FCC published the final rule on its new regulations.

Free speech on the Internet edit

Article 19 of the Universal Declaration of Human Rights calls for the protection of free opinion and expression.[15] Which includes right such as freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

In comparison to print-based media, the accessibility and relative anonymity of internet has torn down traditional barriers between an individual and his or her ability to publish. Any person with an internet connection has the potential to reach an audience of millions. These complexities have taken many forms, three notable examples being the Jake Baker incident, in which the limits of obscene Internet postings were at issue, the controversial distribution of the DeCSS code, and Gutnick v Dow Jones, in which libel laws were considered in the context of online publishing. The last example was particularly significant because it epitomized the complexities inherent to applying one country's laws (nation-specific by definition) to the internet (international by nature). In 2003, Jonathan Zittrain considered this issue in his paper, "Be Careful What You Ask For: Reconciling a Global Internet and Local Law".[16]

In the UK in 2006 the case of Keith-Smith v Williams confirmed that existing libel laws applied to internet discussions.[17]

In terms of the tort liability of ISPs and hosts of internet forums, Section 230(c) of the Communications Decency Act may provide immunity in the United States.[18]

Internet censorship edit

In many countries, speech through ICT has proven to be another means of communication which has been regulated by the government. The "Open Net Initiative" by the Harvard University Berkman Klein Center, the University of Toronto and the Canadian SecDev Group[19][20] whose mission statement is "to investigate and challenge state filtration and surveillance practices" to "...generate a credible picture of these practices," has released numerous reports documenting the filtration of internet-speech in various countries. While China has thus far (2011) proven to be the most rigorous in its attempts to filter unwanted parts of the internet from its citizens,[21] many other countries – including Singapore, Iran, Saudi Arabia, and Tunisia – have engaged in similar practices of Internet censorship. In one of the most vivid examples of information control, the Chinese government for a short time transparently forwarded requests to the Google search engine to its own, state-controlled search engines.[citation needed]

These examples of filtration bring to light many underlying questions concerning the freedom of speech. For example, do government have a legitimate role in limiting access to information? And if so, what forms of regulation are acceptable? For example, some argue that the blocking of "blogspot" and other websites in India failed to reconcile the conflicting interests of speech and expression on the one hand and legitimate government concerns on the other hand.[22]

The creation of privacy in U.S. Internet law edit

Warren and Brandeis edit

At the close of the 19th century, concerns about privacy captivated the general public, and led to the 1890 publication of Samuel Warren and Louis Brandeis: "The Right to Privacy".[23] The vitality of this article can be seen today, when examining the USSC decision of Kyllo v. United States, 533 U.S. 27 (2001) where it is cited by the majority, those in concurrence, and even those in dissent.[24]

The motivation of both authors to write such an article is heavily debated amongst scholars, however, two developments during this time give some insight to the reasons behind it. First, the sensationalistic press and the concurrent rise and use of "yellow journalism" to promote the sale of newspapers in the time following the Civil War brought privacy to the forefront of the public eye. The other reason that brought privacy to the forefront of public concern was the technological development of "instant photography". This article set the stage for all privacy legislation to follow during the 20 and 21st centuries.

Reasonable Expectation of Privacy Test and emerging technology edit

In 1967, the United States Supreme Court decision in Katz v United States, 389 U.S. 347 (1967) established what is known as the Reasonable Expectation of Privacy Test to determine the applicability of the Fourth Amendment in a given situation. The test was not noted by the majority, but instead it was articulated by the concurring opinion of Justice Harlan. Under this test, 1) a person must exhibit an "actual (subjective) expectation of privacy" and 2) "the expectation [must] be one that society is prepared to recognize as 'reasonable'".

Privacy Act of 1974 edit

Inspired by the Watergate scandal, the United States Congress enacted the Privacy Act of 1974 just four months after the resignation of then President Richard Nixon. In passing this Act, Congress found that "the privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies" and that "the increasing use of computers and sophisticated information technology, while essential to the efficient operations of the Government, has greatly magnified the harm to individual privacy that can occur from any collection, maintenance, use, or dissemination of personal information".

Foreign Intelligence Surveillance Act of 1978 edit

Codified at 50 U.S.C. §§ 1801–1811, this act establishes standards and procedures for use of electronic surveillance to collect "foreign intelligence" within the United States. §1804(a)(7)(B). FISA overrides the Electronic Communications Privacy Act during investigations when foreign intelligence is "a significant purpose" of said investigation. 50 U.S.C. § 1804(a)(7)(B) and §1823(a)(7)(B). Another interesting result of FISA, is the creation of the Foreign Intelligence Surveillance Court (FISC). All FISA orders are reviewed by this special court of federal district judges. The FISC meets in secret, with all proceedings usually also held from both the public eye and those targets of the desired surveillance.
For more information see: Foreign Intelligence Act

(1986) Electronic Communication Privacy Act edit

The ECPA represents an effort by the United States Congress to modernize federal wiretap law. The ECPA amended Title III (see: Omnibus Crime Control and Safe Streets Act of 1968) and included two new acts in response to developing computer technology and communication networks. Thus the ECPA in the domestic venue into three parts: 1) Wiretap Act, 2) Stored Communications Act, and 3) The Pen Register Act.

  • Types of Communication
    • Wire Communication: Any communication containing the human voice that travels at some point across a wired medium such as radio, satellite or cable.
    • Oral Communication:
    • Electronic Communication
  1. The Wiretap Act: For Information see Wiretap Act
  2. The Stored Communications Act: For information see Stored Communications Act
  3. The Pen Register Act: For information see Pen Register Act

(1994) Driver's Privacy Protection Act edit

The DPPA was passed in response to states selling motor vehicle records to private industry. These records contained personal information such as name, address, phone number, SSN, medical information, height, weight, gender, eye color, photograph and date of birth. In 1994, Congress passed the Driver's Privacy Protection (DPPA), 18 U.S.C. §§ 2721–2725, to cease this activity.
For more information see: Driver's Privacy Protection Act

(1999) Gramm-Leach-Bliley Act edit

-This act authorizes widespread sharing of personal information by financial institutions such as banks, insurers, and investment companies. The GLBA permits sharing of personal information between companies joined or affiliated as well as those companies unaffiliated. To protect privacy, the act requires a variety of agencies such as the SEC, FTC, etc. to establish "appropriate standards for the financial institutions subject to their jurisdiction" to "insure security and confidentiality of customer records and information" and "protect against unauthorized access" to this information. 15 U.S.C. § 6801
For more information see: Gramm-Leach-Bliley Act

(2002) Homeland Security Act edit

-Passed by Congress in 2002, the Homeland Security Act, 6 U.S.C. § 222, consolidated 22 federal agencies into what is commonly known today as the Department of Homeland Security (DHS). The HSA, also created a Privacy Office under the DoHS. The Secretary of Homeland Security must "appoint a senior official to assume primary responsibility for privacy policy." This privacy official's responsibilities include but are not limited to: ensuring compliance with the Privacy Act of 1974, evaluating "legislative and regulatory proposals involving the collection, use, and disclosure of personal information by the Federal Government", while also preparing an annual report to Congress.
For more information see: Homeland Security Act

(2004) Intelligence Reform and Terrorism Prevention Act edit

-This Act mandates that intelligence be "provided in its most shareable form" that the heads of intelligence agencies and federal departments "promote a culture of information sharing." The IRTPA also sought to establish protection of privacy and civil liberties by setting up a five-member Privacy and Civil Liberties Oversight Board. This Board offers advice to both the President of the United States and the entire executive branch of the Federal Government concerning its actions to ensure that the branch's information sharing policies are adequately protecting privacy and civil liberties.
For more information see: Intelligence Reform and Terrorism Prevention Act

Other Legal enactments – examples edit

India edit

An example of information technology law is India's Information Technology Act, 2000, which was substantially amended in 2008. The IT Act, 2000 came into force on 17 October 2000. This Act applies to whole of India, and its provisions also apply to any offense or contravention, committed even outside the territorial jurisdiction of Republic of India, by any person irrespective of his nationality. In order to attract provisions of this Act, such an offence or contravention should involve a computer, computer system, or computer network located in India. The IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of section 1(2) read with section 75. This Act has 90 sections.

India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is a modern legislation which makes acts like hacking, data theft, spreading of virus, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence. The Act is supplemented by a number of rules which includes rules for, cyber cafes, electronic service delivery, data security, blocking of websites. It also has rules for observance of due diligence by internet intermediaries (ISP's, network service providers, cyber cafes, etc.). Any person affected by data theft, hacking, spreading of viruses can apply for compensation from Adjudicator appointed under Section 46 as well as file a criminal complaint. Appeal from adjudicator lies to TDSAT

Notable cases edit

Section 66 edit
  • In February 2001, in one of the first cases, the Delhi police arrested two men running a web-hosting company. The company had shut down a website over non-payment of dues. The owner of the site had claimed that he had already paid and complained to the police. The Delhi police had charged the men for hacking under Section 66 of the IT Act and breach of trust under Section 408 of the Indian Penal Code. The two men had to spend 6 days in Tihar jail waiting for bail. Bhavin Turakhia, chief executive officer of directi.com, a webhosting firm said that this interpretation of the law would be problematic for web-hosting companies.[25]
Section 66A Removed edit

Source:[26]

  • In September 2010, a freelance cartoonist Aseem Trivedi was arrested under Section 66A of the IT Act, Section 2 of Prevention of Insults to National Honour Act, 1971 and for sedition under the Section 124 of the Indian Penal Code.[27] His cartoons depicting widespread corruption in India were considered offensive.[28]
  • On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway Minister Mukul Roy.[29] The email was sent from the email address of a housing society. Subrata Sengupta, the secretary of the housing society, was also arrested. They were charged under Section 66A and B of the IT Act, for defamation under Sections 500, for obscene gesture to a woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code.[30]
  • On 30 October 2012, a Puducherry businessman Ravi Srinivasan was arrested under Section 66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P. Chidambaram, of corruption. Karti Chidambaram had complained to the police.[31]
  • On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on Facebook criticising the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-year-old girl was arrested for "liking" the post. They were initially charged under Section 295A of the Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section 295A was replaced by Section 505(2) (promoting enmity between classes).[32] A group of Shiv Sena workers vandalised a hospital run by the uncle of one of girls.[33] On 31 January 2013, a local court dropped all charges against the girls.[34]
  • On 18 March 2015, a teenaged boy was arrested from Bareilly, Uttar Pradesh, for making a post on Facebook insulting politician Azam Khan. The post allegedly contained hate speech against a community and was falsely attributed to Azam Khan by the boy. He was charged under Section 66A of the IT Act, and Sections 153A (promoting enmity between different religions), 504 (intentional insult with intent to provoke breach of peace) and 505 (public mischief) of Indian Penal Code. After the Section 66A was repealed on 24 March, the state government said that they would continue the prosecution under the remaining charges.[35][36]

Digital evidence collection and cyber forensics remain at a very nascent stage in India with few experts and less than adequate infrastructure.[37] In recent cases, Indian Judiciary has recognized that tampering with digital evidence is very easy.[38]

Republic of Ireland edit

The Criminal Justice (Offences Relating to Information Systems) Act 2017 was introduced in May 2017 to consolidate laws on computer crime.[39][40]

United Kingdom edit

The Computer Misuse Act 1990[41] enacted by the United Kingdom on 29 June 1990, and which came into force on 29 August 1990, is an example of one of the earliest such legal enactments. This Act was enacted with an express purpose of making "provision for securing computer material against unauthorized access or modification." Certain major provisions of the Computer Misuse Act 1990 relate to:

  • "unauthorized access to computer materials",
  • "unauthorized access with intent to commit or facilitate the commission of further offences",
  • "unauthorized modification of computer material."

The act was also later amended by the Police and Justice Act 2006[42] to include the following additional provisions(among others)

  • "unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc."
  • "Making, supplying or obtaining articles for use in computer misuse offences,"

[43]

Other edit

Many Asian and Middle Eastern nations use any number of combinations of code-based regulation (one of Lessig's four methods of net regulation) to block material that their governments have deemed inappropriate for their citizens to view. PRC, Saudi Arabia and Iran are three examples of nations that have achieved high degrees of success in regulating their citizens' access to the Internet.[21][44]

Electronic signature laws edit

Information technology law edit

  1. Florida Electronic Security Act
  2. Illinois Electronic Commerce Security Act
  3. Texas Penal Code – Computer Crimes Statute
  4. Maine Criminal Code – Computer Crimes
  5. Singapore Electronic Transactions Act
  6. Malaysia Computer Crimes Act
  7. Malaysia Digital Signature Act
  8. UNCITRAL Model Law on Electronic Commerce
  9. Information Technology Act 2000 of India
  10. Thailand Computer Crimes Act B.E.2550

Information Technology Guidelines edit

  1. ABA Digital Signature Guidelines
  2. United States Office of Management and Budget

Enforcement agencies edit

The Information Technology Laws of various countries, and / or their criminal laws generally stipulate enforcement agencies, entrusted with the task of enforcing the legal provisions and requirements.

United States Federal Agencies edit

Many United States federal agencies oversee the use of information technology. Their regulations are promulgated in the Code of Federal Regulations of the United States.

Over 25 U.S. federal agencies have regulations concerning the use of digital and electronic signatures.[45]

India edit

A live example of such an enforcement agency is Cyber Crime Police Station, Bangalore,[46] India's first exclusive Cyber Crime enforcement agency.

Quotations edit

  • "In Cyberspace, the First Amendment is a local ordinance."
    John Perry Barlow, quoted by Mitchell Kapor in the foreword to The Big Dummy's Guide to the Internet
  • "National borders aren't even speed bumps on the information superhighway."
    — Tim May, signature, from 1996
  • "Some governments are seeking to regulate the commercial use of personal data without enacting clear rules governing public sector use... The hoarding of data by nations or firms may reduce data generativity and the public benefits of data analysis."
    Susan Ariel Aaronson, Digital Trade and Data Governance Hub Director, George Washington University, from Data is disruptive: How data sovereignty is challenging data governance, 2021.[49]

See also edit

Centers and groups for the study of cyberlaw and related areas

Topics related to cyberlaw

Conferences related to cyberlaw

Notes edit

  1. ^ A Murray, Information Technology Law: The Law and Society (3rd edn 2016)
  2. ^ Computer Law: Drafting and Negotiating Forms and Agreements, by Richard Raysman and Peter Brown. Law Journal Press, 1999–2008. ISBN 978-1-58852-024-1
  3. ^ "Everything You Need to Know About the California Privacy Rights Act". spark. 2022-10-13. Retrieved 2023-02-09.
  4. ^ "How Europe's new digital law will change the internet". The Economist. ISSN 0013-0613. Retrieved 2023-12-16.
  5. ^ Leuf, Bo (2002). Peer to Peer: Collaboration and Sharing Over the Internet. Addison-Wesley. ISBN 9780201767322.
  6. ^ Barlow, John P. (20 January 2016). "A Declaration of the Independence of Cyberspace".
  7. ^ "Revision history of "An Introduction to Cybersecession" - Cybersecession". editthis.info. Retrieved 2023-12-16.
  8. ^ "An Introduction to Cybersecession".
  9. ^ Trout, B. (2007). "Cyber Law: A Legal Arsenal For Online Business", New York: World Audience, Inc.
  10. ^ Emerging Technologies and the Law: Forms and Analysis, by Richard Raysman, Peter Brown, Jeffrey D. Neuburger and William E. Bandon III. Law Journal Press, 2002–2008. ISBN 1-58852-107-9
  11. ^ "The EU copyright legislation | Shaping Europe's digital future". digital-strategy.ec.europa.eu. 2023-12-15. Retrieved 2023-12-16.
  12. ^ . Cli.org. Archived from the original on 2008-05-07. Retrieved 2013-11-05.
  13. ^ Autoriteit Consument & Markt. "Netneutraliteit". www.acm.nl (in Dutch). Retrieved 2023-12-16.
  14. ^ Bundeszentrale für politische Bildung (2020-07-17). "SPACE NET – Netzneutralität". bpb.de (in German). Retrieved 2023-12-16.
  15. ^ "Universal Declaration of Human Rights - English". OHCHR.org | United Nations Department of Public Information, NY.
  16. ^ Zittrain, Jonathan (2003). "Be Careful What You Ask For: Reconciling a Global Internet and Local Law". SSRN 395300.
  17. ^ Gibson, Owen (March 23, 2006). "Warning to chatroom users after libel award for man labelled a Nazi". The Guardian.
  18. ^ Myers KS (Fall 2006). "Wikimmunity: Fitting the Communications Decency Act to Wikipedia". Harvard Journal of Law & Technology. 20: 163. SSRN 916529.
  19. ^ "opennetinitiative.net". opennetinitiative.net. Retrieved 2012-01-17.
  20. ^ "Home | OpenNet Initiative". opennet.net. Retrieved 2023-12-16.
  21. ^ a b . OpenNet Initiative. Archived from the original on 2007-09-28. Retrieved 2010-10-11.
  22. ^ Free Speech Implications Of Blocking Blog Posts In India 2014-08-18 at the Wayback Machine, taken from Aaron Kelly Internet Law Firm, Retrieved December 05, 2011.
  23. ^ Warren & Louis Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890)
  24. ^ Solove, D., Schwartz, P.. (2009). Privacy, Information, and Technology. (2nd Ed.). New York, NY: Aspen Publishers. ISBN 978-0-7355-7910-1.
  25. ^ "Cyber crime that wasn't?". Rediff. 19 February 2001. Retrieved 14 April 2015.
  26. ^ Section 66A: Punishment for sending offensive messages through communication service, etc.
  27. ^ "If Speaking The Truth Is Sedition, Then I Am Guilty". Outlook India. 10 September 2010. Retrieved 14 April 2015.
  28. ^ "Indian cartoonist Aseem Trivedi jailed after arrest on sedition charges". The Guardian. 10 September 2010. Retrieved 14 April 2015.
  29. ^ . Hindustan Times. 14 April 2012. Archived from the original on July 2, 2014. Retrieved 14 April 2015.
  30. ^ . Hindustan Times. 13 April 2012. Archived from the original on May 18, 2015. Retrieved 14 April 2015.
  31. ^ "Arrest over tweet against Chidambaram's son propels 'mango man' Ravi Srinivasan into limelight". India Today. 2 November 2012. Retrieved 14 April 2015.
  32. ^ "Mumbai shuts down due to fear, not respect". The Hindu. 19 November 2012. Retrieved 23 April 2015.
  33. ^ "FB post: 10 Sainiks arrested for hospital attack". The Hindu. 20 November 2012. Retrieved 23 April 2015.
  34. ^ "Facebook row: Court scraps charges against Palghar girls". The Hindu. 31 January 2013. Retrieved 23 April 2015.
  35. ^ "Teen arrested for Facebook post attributed to Azam Khan gets bail". The Times of India. 19 March 2015. Retrieved 6 May 2015.
  36. ^ "UP tells SC that prosecution on boy for post against Azam Khan will continue". The Indian Express. 24 April 2015. Retrieved 6 May 2015.
  37. ^ Sahu, Saswati Soumya (17 May 2014). "Cyber Forensics: law and practice in India". ipleaders.in. iPleaders. Retrieved 6 December 2014.
  38. ^ Bera, Poonam (22 September 2014). "Presentation of electronic evidence in court in light of the Supreme Court judgment in Anvar P. K. vs. P.K Basheer & ors. Read more: Presentation of electronic evidence in court in light of the Supreme Court judgment in Anvar P. K. vs. P.K Basheer & ors". ipleaders.in. iPleaders. Retrieved 6 December 2014.
  39. ^ Reidy, Diane (2019-04-15). "Away in a hack". Law Society of Ireland. Retrieved 2024-02-19.
  40. ^ Finlay, Adam; Hughes, Ruth. "iclg.com > Practice Areas > Cybersecurity > Ireland". iclg.com. Retrieved 2024-02-20.
  41. ^ . Home Office. Archived from the original on 2005-03-01. Retrieved 2012-01-17.
  42. ^ "Police and Justice Act 2006".
  43. ^ "Computer Misuse Act Legal guidance". Crown Prosecution Service. Retrieved 2020-09-01.
  44. ^ . OpenNet Initiative. Archived from the original on 2017-09-10. Retrieved 2010-10-11.
  45. ^ . Isaacbowman.com. 2009-03-16. Archived from the original on 2012-02-06. Retrieved 2012-01-17.
  46. ^ . cyberpolicebangalore.nic.in. Archived from the original on 2006-02-23. Retrieved 2012-01-17.
  47. ^ [1] December 6, 2004, at the Wayback Machine
  48. ^ . www.cidap.gov.in. Archived from the original on 25 February 2004. Retrieved 15 January 2022.
  49. ^ Aaronson, Susan (3 August 2021). "Data is disruptive: How data sovereignty is challenging data governance". Hinrich Foundation. Retrieved 2022-10-01.
  50. ^ "5G & Small Cell Deployment in USA | Complete Low-Down @VisiOneClick". VisiOneClick. 2019-07-02. Retrieved 2019-07-26.

References edit

External links edit

  • Information Technology Law India – Bare Act

this, article, lead, section, short, adequately, summarize, points, please, consider, expanding, lead, provide, accessible, overview, important, aspects, article, september, 2021, computer, redirects, here, branch, legal, informatics, computational, informatio. This article s lead section may be too short to adequately summarize the key points Please consider expanding the lead to provide an accessible overview of all important aspects of the article September 2021 Computer law redirects here For a branch of legal informatics see Computational law Information technology law IT law or information communication and technology law ICT law also called cyberlaw concerns the juridical regulation of information technology its possibilities and the consequences of its use including computing software coding artificial intelligence the internet and virtual worlds The ICT field of law comprises elements of various branches of law originating under various acts or statutes of parliaments the common and continental law and international law Some important areas it covers are information and data communication and information technology both software and hardware and technical communications technology including coding and protocols It is related to legal informatics and governs among others the digital dissemination of both digitized information and software information security and crossing border commerce It raises specific issues of intellectual property contract law criminal law and fundamental rights like privacy the right to self determination and freedom of expression IT law encompasses rules and procedures for electronic discovery in legal proceedings It governs the identification preservation collection and production of electronically stored information ESI for use as evidence in litigation arbitration or regulatory investigations Contents 1 History 2 Areas of law 3 Regulation 3 1 Jurisdiction 3 2 Regulation alternatives 3 3 Conflict of law 4 European Union 4 1 Copyright authors right 4 2 Digital Services Act amp Digital Markets Act 2023 5 Debates around Internet law 5 1 Lawrence Lessig 1999 5 2 Net neutrality 5 3 Free speech on the Internet 5 4 Internet censorship 6 The creation of privacy in U S Internet law 6 1 Warren and Brandeis 6 2 Reasonable Expectation of Privacy Test and emerging technology 6 3 Privacy Act of 1974 6 4 Foreign Intelligence Surveillance Act of 1978 6 5 1986 Electronic Communication Privacy Act 6 6 1994 Driver s Privacy Protection Act 6 7 1999 Gramm Leach Bliley Act 6 8 2002 Homeland Security Act 6 9 2004 Intelligence Reform and Terrorism Prevention Act 7 Other Legal enactments examples 7 1 India 7 1 1 Notable cases 7 1 1 1 Section 66 7 1 1 2 Section 66A Removed 7 2 Republic of Ireland 7 3 United Kingdom 7 4 Other 7 5 Electronic signature laws 7 6 Information technology law 7 7 Information Technology Guidelines 8 Enforcement agencies 8 1 United States Federal Agencies 8 2 India 9 Quotations 10 See also 11 Notes 12 References 13 External linksHistory editThe regulation of information technology through software coding computing and the internet evolved out of the development of the first publicly funded networks such as ARPANET and NSFNET in the United States or JANET in the United Kingdom 1 This section needs expansion You can help by adding to it February 2018 Areas of law editSee also Software law IT law does not constitute a separate area of law rather it encompasses aspects of contract intellectual property privacy and data protection laws Intellectual property is an important component of IT law including copyright and authors rights rules on fair use rules on copy protection for digital media and circumvention of such schemes The area of software patents has been controversial and is still evolving in Europe and elsewhere 2 page needed The related topics of software licenses end user license agreements free software licenses and open source licenses can involve discussion of product liability professional liability of individual developers warranties contract law trade secrets and intellectual property In various countries areas of the computing and communication industries are regulated often strictly by governmental bodies There are rules on the uses to which computers and computer networks may be put in particular there are rules on unauthorized access data privacy and spamming There are also limits on the use of encryption and of equipment which may be used to defeat copy protection schemes The export of hardware and software between certain states within the United States is also controlled 3 There are laws governing trade on the Internet taxation consumer protection and advertising There are laws on censorship versus freedom of expression rules on public access to government information and individual access to information held on them by private bodies There are laws on what data must be retained for law enforcement and what may not be gathered or retained for privacy reasons In certain circumstances and jurisdictions computer communications may be used in evidence and to establish contracts New methods of tapping and surveillance made possible by computers have wildly differing rules on how they may be used by law enforcement bodies and as evidence in court Computerized voting technology from polling machines to internet and mobile phone voting raise a host of legal issues Some states limit access to the Internet by law as well as by technical means Regulation editGlobal computer based communications cut across territorial borders issues of regulation jurisdiction and sovereignty have therefore quickly come to the fore in the era of the Internet They have been solved pretty quickly as well because cross border communication negotiating or ordering was nothing new new were the massive amounts of contacts the possibilities of hiding one s identity and sometime later the colonisation of the terrain by corporations 4 Jurisdiction edit Jurisdiction is an aspect of state sovereignty and it refers to judicial legislative and administrative competence Although jurisdiction is an aspect of sovereignty it is not coextensive with it The laws of a nation may have extraterritorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation The medium of the Internet like electrical telegraph telephone or radio does not explicitly recognize sovereignty and territorial limitations 5 page needed There is no uniform international jurisdictional law of universal application and such questions are generally a matter of international treaties and contracts or conflict of laws particularly private international law An example would be where the contents stored on a server located in the United Kingdom by a citizen of France and published on a web site are legal in one country and illegal in another In the absence of a uniform jurisdictional code legal practitioners and judges have solved these kind of questions according the general rules for conflict of law governments and supra national bodies did design outlines for new legal frameworks Regulation alternatives edit Whether to treat the Internet as if it were physical space and thus subject to a given jurisdiction s laws or that the Internet should have a legal framework of its own has been questioned Those who favor the latter view often feel that government should leave the Internet to self regulate American poet John Perry Barlow for example has addressed the governments of the world and stated Where there are real conflicts where there are wrongs we will identify them and address them by our means We are forming our own Social Contract This governance will arise according to the conditions of our world not yours Our world is different 6 Another view can be read from a wiki website with the name An Introduction to Cybersecession 7 that argues for ethical validation of absolute anonymity on the Internet It compares the Internet with the human mind and declares Human beings possess a mind which they are absolutely free to inhabit with no legal constraints Human civilization is developing its own collective mind All we want is to be free to inhabit it with no legal constraints Since you make sure we cannot harm you you have no ethical right to intrude our lives So stop intruding 8 The project is defining you as all governments we is undefined Some scholars argue for more of a compromise between the two notions such as Lawrence Lessig s argument that The problem for law is to work out how the norms of the two communities are to apply given that the subject to whom they apply may be in both places at once Lessig Code 190 citation needed Conflict of law edit With the internationalism of the Internet and the rapid growth of users jurisdiction became a more difficult area than before and in the beginning courts in different countries have taken various views on whether they have jurisdiction over items published on the Internet or business agreements entered into over the Internet This can cover areas from contract law trading standards and tax through rules on unauthorized access data privacy and spamming to areas of fundamental rights such as freedom of speech and privacy via state censorship to criminal law with libel or sedition The frontier idea that laws do not apply in cyberspace is however not true in a legal sense In fact conflicting laws from different jurisdictions may apply simultaneously to the same event The Internet does not tend to make geographical and jurisdictional boundaries clear but both Internet technology hardware the providers of services and its users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet 9 As such a single transaction may involve the laws of at least three jurisdictions the laws of the state nation in which the user resides the laws of the state nation that apply where the server hosting the transaction is located and the laws of the state nation which apply to the person or business with whom the transaction takes place So a user in one of the United States conducting a transaction with another user that lives in the United Kingdom through a server in Canada could theoretically be subject to the laws of all three countries and of international treaties as they relate to the transaction at hand 10 In practical terms a user of the Internet is subject to the laws of the state or nation within which he or she goes online Thus in the U S in 1997 Jake Baker faced criminal charges for his e conduct and numerous users of peer to peer file sharing software were subject to civil lawsuits for copyright infringement This system runs into conflicts however when these suits are international in nature Simply put legal conduct in one nation may be decidedly illegal in another In fact even different standards concerning the burden of proof in a civil case can cause jurisdictional problems For example an American celebrity claiming to be insulted by an online American magazine faces a difficult task of winning a lawsuit against that magazine for libel But if the celebrity has ties economic or otherwise to England he or she can sue for libel in the English court system where the burden of proof for establishing defamation may make the case more favorable to the plaintiff Internet governance is a live issue in international fora such as the International Telecommunication Union ITU and the role of the current US based co ordinating body the Internet Corporation for Assigned Names and Numbers ICANN was discussed in the UN sponsored World Summit on the Information Society WSIS in December 2003 European Union editCopyright authors right edit As of 2020 the European Union copyright law consists of 13 directives and 2 regulations harmonising the essential rights of authors performers producers and broadcasters The legal framework reduces national discrepancies and guarantees the level of protection needed to foster creativity and investment in creativity 11 Many of the directives reflect obligations under the Berne Convention and the Rome Convention as well as the obligations of the EU and its Member States under the World Trade Organisation TRIPS Agreement and the two 1996 World Intellectual Property Organisation WIPO Internet Treaties the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty Two other WIPO Treaties signed in 2012 and 2016 are the Beijing Treaty on the Protection of Audiovisual Performances and the Marrakesh VIP Treaty to Facilitate Access to Published Works for Persons who are Blind Visually Impaired or otherwise Print Disabled Moreover free trade agreements which the EU concluded with a large number of third countries reflect many provisions of EU law Digital Services Act amp Digital Markets Act 2023 edit In 2022 the European Parliament did adopt landmark laws for internet platforms the new rules will improve internet consumer protection and supervision of online platforms the Digital Services Act DSA and the Digital Markets Act DMA This section needs expansion You can help by adding to it February 2023 Debates around Internet law editThe law that regulates aspects of the Internet must be considered in the context of the geographic scope of the technical infrastructure of Internet and state borders that are crossed in processing data around the globe The global structure of the Internet raises not only jurisdictional issues that is the authority to make and enforce laws affecting the Internet but made corporations and scholars raise questions concerning the nature of the laws themselves In their essay Law and Borders The Rise of Law in Cyberspace from 2008 David R Johnson and David G Post argue that territorially based law making and law enforcing authorities find this new environment deeply threatening and give a scientific voice to the idea that became necessary for the Internet to govern itself Instead of obeying the laws of a particular country Internet citizens will obey the laws of electronic entities like service providers Instead of identifying as a physical person Internet citizens will be known by their usernames or email addresses or more recently by their Facebook accounts Over time suggestions that the Internet can be self regulated as being its own trans national nation are being supplanted by a multitude of external and internal regulators and forces both governmental and private at many different levels The nature of Internet law remains a legal paradigm shift very much in the process of development 12 Lawrence Lessig 1999 edit Leaving aside the most obvious examples of governmental content monitoring and internet censorship in nations like China Saudi Arabia Iran there are four primary forces or modes of regulation of the Internet derived from a socioeconomic theory referred to as Pathetic dot theory by Lawrence Lessig in his 1999 book Code and Other Laws of Cyberspace Law What Lessig calls Standard East Coast Code from laws enacted by government in Washington D C This is the most self evident of the four modes of regulation As the numerous United States statutes codes regulations and evolving case law make clear many actions on the Internet are already subject to conventional laws both with regard to transactions conducted on the Internet and content posted Areas like gambling child pornography and fraud are regulated in very similar ways online as off line While one of the most controversial and unclear areas of evolving laws is the determination of what forum has subject matter jurisdiction over activity economic and other conducted on the internet particularly as cross border transactions affect local jurisdictions it is certainly clear that substantial portions of internet activity are subject to traditional regulation and that conduct that is unlawful off line is presumptively unlawful online and subject to traditional enforcement of similar laws and regulations Architecture What Lessig calls West Coast Code from the programming code of the Silicon Valley These mechanisms concern the parameters of how information can and cannot be transmitted across the Internet Everything from internet filtering software which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them to encryption programs to the very basic architecture of TCP IP protocols and user interfaces falls within this category of mainly private regulation It is arguable that all other modes of internet regulation either rely on or are significantly affected by West Coast Code Norms As in all other modes of social interaction conduct is regulated by social norms and conventions in significant ways While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the Internet or expressly prohibited by traditional governmental law nevertheless these activities or conduct are regulated by the standards of the community in which the activity takes place in this case internet users Just as certain patterns of conduct will cause an individual to be ostracized from our real world society so too certain actions will be censored or self regulated by the norms of whatever community one chooses to associate with on the internet Markets Closely allied with regulation by social norms markets also regulate certain patterns of conduct on the Internet While economic markets will have limited influence over non commercial portions of the Internet the Internet also creates a virtual marketplace for information and such information affects everything from the comparative valuation of services to the traditional valuation of stocks In addition the increase in popularity of the Internet as a means for transacting all forms of commercial activity and as a forum for advertisement has brought the laws of supply and demand to cyberspace Market forces of supply and demand also affect connectivity to the Internet the cost of bandwidth and the availability of software to facilitate the creation posting and use of internet content These forces or regulators of the Internet do not act independently of each other For example governmental laws may be influenced by greater societal norms and markets affected by the nature and quality of the code that operates a particular system Net neutrality edit Another major area of interest is net neutrality which affects the regulation of the infrastructure of the Internet Though not obvious to most Internet users every packet of data sent and received by every user on the Internet passes through routers and transmission infrastructure owned by a collection of private and public entities including telecommunications companies universities and governments This issue has been handled in the paast for electrical telegraph telephone and cable TV A critical aspect is that laws in force in one jurisdiction have the potential to have effects in other jurisdictions when host servers or telecommunications companies are affected The Netherlands became in 2013 the first country in Europe and the second in the world after Chile to pass law relating to it 13 14 In U S on 12 March 2015 the FCC released the specific details of its new net neutrality rule And on 13 April 2015 the FCC published the final rule on its new regulations Free speech on the Internet edit Article 19 of the Universal Declaration of Human Rights calls for the protection of free opinion and expression 15 Which includes right such as freedom to hold opinions without interference and to seek receive and impart information and ideas through any media and regardless of frontiers In comparison to print based media the accessibility and relative anonymity of internet has torn down traditional barriers between an individual and his or her ability to publish Any person with an internet connection has the potential to reach an audience of millions These complexities have taken many forms three notable examples being the Jake Baker incident in which the limits of obscene Internet postings were at issue the controversial distribution of the DeCSS code and Gutnick v Dow Jones in which libel laws were considered in the context of online publishing The last example was particularly significant because it epitomized the complexities inherent to applying one country s laws nation specific by definition to the internet international by nature In 2003 Jonathan Zittrain considered this issue in his paper Be Careful What You Ask For Reconciling a Global Internet and Local Law 16 In the UK in 2006 the case of Keith Smith v Williams confirmed that existing libel laws applied to internet discussions 17 In terms of the tort liability of ISPs and hosts of internet forums Section 230 c of the Communications Decency Act may provide immunity in the United States 18 Internet censorship edit Main article Internet censorship In many countries speech through ICT has proven to be another means of communication which has been regulated by the government The Open Net Initiative by the Harvard University Berkman Klein Center the University of Toronto and the Canadian SecDev Group 19 20 whose mission statement is to investigate and challenge state filtration and surveillance practices to generate a credible picture of these practices has released numerous reports documenting the filtration of internet speech in various countries While China has thus far 2011 proven to be the most rigorous in its attempts to filter unwanted parts of the internet from its citizens 21 many other countries including Singapore Iran Saudi Arabia and Tunisia have engaged in similar practices of Internet censorship In one of the most vivid examples of information control the Chinese government for a short time transparently forwarded requests to the Google search engine to its own state controlled search engines citation needed These examples of filtration bring to light many underlying questions concerning the freedom of speech For example do government have a legitimate role in limiting access to information And if so what forms of regulation are acceptable For example some argue that the blocking of blogspot and other websites in India failed to reconcile the conflicting interests of speech and expression on the one hand and legitimate government concerns on the other hand 22 The creation of privacy in U S Internet law editWarren and Brandeis edit At the close of the 19th century concerns about privacy captivated the general public and led to the 1890 publication of Samuel Warren and Louis Brandeis The Right to Privacy 23 The vitality of this article can be seen today when examining the USSC decision of Kyllo v United States 533 U S 27 2001 where it is cited by the majority those in concurrence and even those in dissent 24 The motivation of both authors to write such an article is heavily debated amongst scholars however two developments during this time give some insight to the reasons behind it First the sensationalistic press and the concurrent rise and use of yellow journalism to promote the sale of newspapers in the time following the Civil War brought privacy to the forefront of the public eye The other reason that brought privacy to the forefront of public concern was the technological development of instant photography This article set the stage for all privacy legislation to follow during the 20 and 21st centuries Reasonable Expectation of Privacy Test and emerging technology edit In 1967 the United States Supreme Court decision in Katz v United States 389 U S 347 1967 established what is known as the Reasonable Expectation of Privacy Test to determine the applicability of the Fourth Amendment in a given situation The test was not noted by the majority but instead it was articulated by the concurring opinion of Justice Harlan Under this test 1 a person must exhibit an actual subjective expectation of privacy and 2 the expectation must be one that society is prepared to recognize as reasonable Privacy Act of 1974 edit Further information Privacy Act of 1974 Inspired by the Watergate scandal the United States Congress enacted the Privacy Act of 1974 just four months after the resignation of then President Richard Nixon In passing this Act Congress found that the privacy of an individual is directly affected by the collection maintenance use and dissemination of personal information by Federal agencies and that the increasing use of computers and sophisticated information technology while essential to the efficient operations of the Government has greatly magnified the harm to individual privacy that can occur from any collection maintenance use or dissemination of personal information Foreign Intelligence Surveillance Act of 1978 edit Further information Foreign Intelligence Act Codified at 50 U S C 1801 1811 this act establishes standards and procedures for use of electronic surveillance to collect foreign intelligence within the United States 1804 a 7 B FISA overrides the Electronic Communications Privacy Act during investigations when foreign intelligence is a significant purpose of said investigation 50 U S C 1804 a 7 B and 1823 a 7 B Another interesting result of FISA is the creation of the Foreign Intelligence Surveillance Court FISC All FISA orders are reviewed by this special court of federal district judges The FISC meets in secret with all proceedings usually also held from both the public eye and those targets of the desired surveillance For more information see Foreign Intelligence Act 1986 Electronic Communication Privacy Act edit Main article Electronic Communication Privacy Act The ECPA represents an effort by the United States Congress to modernize federal wiretap law The ECPA amended Title III see Omnibus Crime Control and Safe Streets Act of 1968 and included two new acts in response to developing computer technology and communication networks Thus the ECPA in the domestic venue into three parts 1 Wiretap Act 2 Stored Communications Act and 3 The Pen Register Act Types of Communication Wire Communication Any communication containing the human voice that travels at some point across a wired medium such as radio satellite or cable Oral Communication Electronic CommunicationThe Wiretap Act For Information see Wiretap Act The Stored Communications Act For information see Stored Communications Act The Pen Register Act For information see Pen Register Act dd 1994 Driver s Privacy Protection Act edit The DPPA was passed in response to states selling motor vehicle records to private industry These records contained personal information such as name address phone number SSN medical information height weight gender eye color photograph and date of birth In 1994 Congress passed the Driver s Privacy Protection DPPA 18 U S C 2721 2725 to cease this activity For more information see Driver s Privacy Protection Act 1999 Gramm Leach Bliley Act edit This act authorizes widespread sharing of personal information by financial institutions such as banks insurers and investment companies The GLBA permits sharing of personal information between companies joined or affiliated as well as those companies unaffiliated To protect privacy the act requires a variety of agencies such as the SEC FTC etc to establish appropriate standards for the financial institutions subject to their jurisdiction to insure security and confidentiality of customer records and information and protect against unauthorized access to this information 15 U S C 6801 For more information see Gramm Leach Bliley Act 2002 Homeland Security Act edit Passed by Congress in 2002 the Homeland Security Act 6 U S C 222 consolidated 22 federal agencies into what is commonly known today as the Department of Homeland Security DHS The HSA also created a Privacy Office under the DoHS The Secretary of Homeland Security must appoint a senior official to assume primary responsibility for privacy policy This privacy official s responsibilities include but are not limited to ensuring compliance with the Privacy Act of 1974 evaluating legislative and regulatory proposals involving the collection use and disclosure of personal information by the Federal Government while also preparing an annual report to Congress For more information see Homeland Security Act 2004 Intelligence Reform and Terrorism Prevention Act edit This Act mandates that intelligence be provided in its most shareable form that the heads of intelligence agencies and federal departments promote a culture of information sharing The IRTPA also sought to establish protection of privacy and civil liberties by setting up a five member Privacy and Civil Liberties Oversight Board This Board offers advice to both the President of the United States and the entire executive branch of the Federal Government concerning its actions to ensure that the branch s information sharing policies are adequately protecting privacy and civil liberties For more information see Intelligence Reform and Terrorism Prevention ActOther Legal enactments examples editIndia edit Main article Information Technology Act 2000 An example of information technology law is India s Information Technology Act 2000 which was substantially amended in 2008 The IT Act 2000 came into force on 17 October 2000 This Act applies to whole of India and its provisions also apply to any offense or contravention committed even outside the territorial jurisdiction of Republic of India by any person irrespective of his nationality In order to attract provisions of this Act such an offence or contravention should involve a computer computer system or computer network located in India The IT Act 2000 provides an extraterritorial applicability to its provisions by virtue of section 1 2 read with section 75 This Act has 90 sections India s The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws relating to information technology enacted earlier in several other countries as also various guidelines pertaining to information technology law The Act gives legal validity to electronic contracts recognition of electronic signatures This is a modern legislation which makes acts like hacking data theft spreading of virus identity theft defamation sending offensive messages pornography child pornography cyber terrorism a criminal offence The Act is supplemented by a number of rules which includes rules for cyber cafes electronic service delivery data security blocking of websites It also has rules for observance of due diligence by internet intermediaries ISP s network service providers cyber cafes etc Any person affected by data theft hacking spreading of viruses can apply for compensation from Adjudicator appointed under Section 46 as well as file a criminal complaint Appeal from adjudicator lies to TDSAT Notable cases edit Section 66 edit In February 2001 in one of the first cases the Delhi police arrested two men running a web hosting company The company had shut down a website over non payment of dues The owner of the site had claimed that he had already paid and complained to the police The Delhi police had charged the men for hacking under Section 66 of the IT Act and breach of trust under Section 408 of the Indian Penal Code The two men had to spend 6 days in Tihar jail waiting for bail Bhavin Turakhia chief executive officer of directi com a webhosting firm said that this interpretation of the law would be problematic for web hosting companies 25 Section 66A Removed edit Source 26 In September 2010 a freelance cartoonist Aseem Trivedi was arrested under Section 66A of the IT Act Section 2 of Prevention of Insults to National Honour Act 1971 and for sedition under the Section 124 of the Indian Penal Code 27 His cartoons depicting widespread corruption in India were considered offensive 28 On 12 April 2012 a Chemistry professor from Jadavpur University Ambikesh Mahapatra was arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjee and then Railway Minister Mukul Roy 29 The email was sent from the email address of a housing society Subrata Sengupta the secretary of the housing society was also arrested They were charged under Section 66A and B of the IT Act for defamation under Sections 500 for obscene gesture to a woman under Section 509 and abetting a crime under Section 114 of the Indian Penal Code 30 On 30 October 2012 a Puducherry businessman Ravi Srinivasan was arrested under Section 66A He had sent tweet accusing Karti Chidambaram son of then Finance Minister P Chidambaram of corruption Karti Chidambaram had complained to the police 31 On 19 November 2012 a 21 year old girl was arrested from Palghar for posting a message on Facebook criticising the shutdown in Mumbai for the funeral of Bal Thackeray Another 20 year old girl was arrested for liking the post They were initially charged under Section 295A of the Indian Penal Code hurting religious sentiments and Section 66A of the IT Act Later Section 295A was replaced by Section 505 2 promoting enmity between classes 32 A group of Shiv Sena workers vandalised a hospital run by the uncle of one of girls 33 On 31 January 2013 a local court dropped all charges against the girls 34 On 18 March 2015 a teenaged boy was arrested from Bareilly Uttar Pradesh for making a post on Facebook insulting politician Azam Khan The post allegedly contained hate speech against a community and was falsely attributed to Azam Khan by the boy He was charged under Section 66A of the IT Act and Sections 153A promoting enmity between different religions 504 intentional insult with intent to provoke breach of peace and 505 public mischief of Indian Penal Code After the Section 66A was repealed on 24 March the state government said that they would continue the prosecution under the remaining charges 35 36 Digital evidence collection and cyber forensics remain at a very nascent stage in India with few experts and less than adequate infrastructure 37 In recent cases Indian Judiciary has recognized that tampering with digital evidence is very easy 38 Republic of Ireland edit Main article Criminal Justice Offences Relating to Information Systems Act 2017 The Criminal Justice Offences Relating to Information Systems Act 2017 was introduced in May 2017 to consolidate laws on computer crime 39 40 United Kingdom edit The Computer Misuse Act 1990 41 enacted by the United Kingdom on 29 June 1990 and which came into force on 29 August 1990 is an example of one of the earliest such legal enactments This Act was enacted with an express purpose of making provision for securing computer material against unauthorized access or modification Certain major provisions of the Computer Misuse Act 1990 relate to unauthorized access to computer materials unauthorized access with intent to commit or facilitate the commission of further offences unauthorized modification of computer material The act was also later amended by the Police and Justice Act 2006 42 to include the following additional provisions among others unauthorised acts with intent to impair or with recklessness as to impairing operation of computer etc Making supplying or obtaining articles for use in computer misuse offences 43 Other edit Many Asian and Middle Eastern nations use any number of combinations of code based regulation one of Lessig s four methods of net regulation to block material that their governments have deemed inappropriate for their citizens to view PRC Saudi Arabia and Iran are three examples of nations that have achieved high degrees of success in regulating their citizens access to the Internet 21 44 Electronic signature laws edit Main article Electronic signature Australia Electronic Transactions Act 1999 Cth also note that there is State and Territory mirror legislation Costa Rica Digital Signature Law 8454 2005 European Union Electronic Signatures Directive 1999 93 EC Mexico E Commerce Act 2000 U S Electronic Signatures in Global and National Commerce Act ESIGN U S Government Paperwork Elimination Act GPEA U S Uniform Commercial Code UCC U S Uniform Electronic Transactions Act adopted by 46 states UK s 7 Electronic Communications Act 2000Information technology law edit Florida Electronic Security Act Illinois Electronic Commerce Security Act Texas Penal Code Computer Crimes Statute Maine Criminal Code Computer Crimes Singapore Electronic Transactions Act Malaysia Computer Crimes Act Malaysia Digital Signature Act UNCITRAL Model Law on Electronic Commerce Information Technology Act 2000 of India Thailand Computer Crimes Act B E 2550Information Technology Guidelines edit ABA Digital Signature Guidelines United States Office of Management and BudgetEnforcement agencies editThe Information Technology Laws of various countries and or their criminal laws generally stipulate enforcement agencies entrusted with the task of enforcing the legal provisions and requirements United States Federal Agencies edit Many United States federal agencies oversee the use of information technology Their regulations are promulgated in the Code of Federal Regulations of the United States Over 25 U S federal agencies have regulations concerning the use of digital and electronic signatures 45 India edit A live example of such an enforcement agency is Cyber Crime Police Station Bangalore 46 India s first exclusive Cyber Crime enforcement agency Other examples of such enforcement agencies include Cydf Crime Investigation Cell 47 of India s Mumbai Police Cyber Crime Police Station 48 of the state Government of Andhra Pradesh India This Police station has jurisdiction over the entire state of Andhra Pradesh and functions from the Hyderabad city In South India the Crime Branch of Criminal Investigation Department in Tamil Nadu India has a Cyber Crime Cell at Chennai In East India Cyber Crime Cells have been set up by the Kolkata Police as well as the Criminal Investigation Department West Bengal Quotations edit In Cyberspace the First Amendment is a local ordinance John Perry Barlow quoted by Mitchell Kapor in the foreword to The Big Dummy s Guide to the Internet National borders aren t even speed bumps on the information superhighway Tim May signature from 1996 Some governments are seeking to regulate the commercial use of personal data without enacting clear rules governing public sector use The hoarding of data by nations or firms may reduce data generativity and the public benefits of data analysis Susan Ariel Aaronson Digital Trade and Data Governance Hub Director George Washington University from Data is disruptive How data sovereignty is challenging data governance 2021 49 See also editBerkman Center for Internet amp Society Bernstein v United States and Junger v Daley on free speech protection of software Computer forensics Computer crime Cultural lag Data localization Digital Millennium Copyright Act DMCA Electronic Communications Privacy Act Export of cryptography Glossary of legal terms in technology Software patent debate Universal v Reimerdes test of DMCA Ouellette v Viacom International Inc DMCA and ADA Wassenaar Arrangement Doe v 2themart com Inc First Amendment right to speak anonymously United States v Ivanov Applying United States cyber law to a foreign national operating outside the USCenters and groups for the study of cyberlaw and related areas Berkman Center for Internet and Society at Harvard Law School Centre for Internet and Society in Bangalore India Institute for Information Telecommunication and Media Law in Munster Germany Institute of Space and Telecommunications Law IDEST at University of Paris Sud Master s degree in Space Activities and Telecommunications Law Norwegian Research Center for Computers and Law Stanford Center for Internet and Society at Stanford Law SchoolTopics related to cyberlaw Copyright especially the Digital Millennium Copyright Act in the United States and similar laws in other countries Cyber defamation law Digital Rights Management Intellectual property Internet censorship Stop Online Piracy Act Spamming The Law of Cyber Space book FCC and state by state legislation 50 about 5G citation needed and Small Cell Deployment in the U SConferences related to cyberlaw State of Play a conference series put on by the Institute for Information Law amp Policy at New York Law School concerning the intersection of virtual worlds games and the law Notes edit A Murray Information Technology Law The Law and Society 3rd edn 2016 Computer Law Drafting and Negotiating Forms and Agreements by Richard Raysman and Peter Brown Law Journal Press 1999 2008 ISBN 978 1 58852 024 1 Everything You Need to Know About the California Privacy Rights Act spark 2022 10 13 Retrieved 2023 02 09 How Europe s new digital law will change the internet The Economist ISSN 0013 0613 Retrieved 2023 12 16 Leuf Bo 2002 Peer to Peer Collaboration and Sharing Over the Internet Addison Wesley ISBN 9780201767322 Barlow John P 20 January 2016 A Declaration of the Independence of Cyberspace Revision history of An Introduction to Cybersecession Cybersecession editthis info Retrieved 2023 12 16 An Introduction to Cybersecession Trout B 2007 Cyber Law A Legal Arsenal For Online Business New York World Audience Inc Emerging Technologies and the Law Forms and Analysis by Richard Raysman Peter Brown Jeffrey D Neuburger and William E Bandon III Law Journal Press 2002 2008 ISBN 1 58852 107 9 The EU copyright legislation Shaping Europe s digital future digital strategy ec europa eu 2023 12 15 Retrieved 2023 12 16 Law and Borders The Rise of Law in Cyberspace Cli org Archived from the original on 2008 05 07 Retrieved 2013 11 05 Autoriteit Consument amp Markt Netneutraliteit www acm nl in Dutch Retrieved 2023 12 16 Bundeszentrale fur politische Bildung 2020 07 17 SPACE NET Netzneutralitat bpb de in German Retrieved 2023 12 16 Universal Declaration of Human Rights English OHCHR org United Nations Department of Public Information NY Zittrain Jonathan 2003 Be Careful What You Ask For Reconciling a Global Internet and Local Law SSRN 395300 Gibson Owen March 23 2006 Warning to chatroom users after libel award for man labelled a Nazi The Guardian Myers KS Fall 2006 Wikimmunity Fitting the Communications Decency Act to Wikipedia Harvard Journal of Law amp Technology 20 163 SSRN 916529 opennetinitiative net opennetinitiative net Retrieved 2012 01 17 Home OpenNet Initiative opennet net Retrieved 2023 12 16 a b All Content related to China OpenNet Initiative Archived from the original on 2007 09 28 Retrieved 2010 10 11 Free Speech Implications Of Blocking Blog Posts In India Archived 2014 08 18 at the Wayback Machine taken from Aaron Kelly Internet Law Firm Retrieved December 05 2011 Warren amp Louis Brandeis The Right to Privacy 4 Harv L Rev 193 1890 Solove D Schwartz P 2009 Privacy Information and Technology 2nd Ed New York NY Aspen Publishers ISBN 978 0 7355 7910 1 Cyber crime that wasn t Rediff 19 February 2001 Retrieved 14 April 2015 Section 66A Punishment for sending offensive messages through communication service etc If Speaking The Truth Is Sedition Then I Am Guilty Outlook India 10 September 2010 Retrieved 14 April 2015 Indian cartoonist Aseem Trivedi jailed after arrest on sedition charges The Guardian 10 September 2010 Retrieved 14 April 2015 Professor arrested for poking fun at Mamata Hindustan Times 14 April 2012 Archived from the original on July 2 2014 Retrieved 14 April 2015 Cartoon a conspiracy prof an offender Mamata Hindustan Times 13 April 2012 Archived from the original on May 18 2015 Retrieved 14 April 2015 Arrest over tweet against Chidambaram s son propels mango man Ravi Srinivasan into limelight India Today 2 November 2012 Retrieved 14 April 2015 Mumbai shuts down due to fear not respect The Hindu 19 November 2012 Retrieved 23 April 2015 FB post 10 Sainiks arrested for hospital attack The Hindu 20 November 2012 Retrieved 23 April 2015 Facebook row Court scraps charges against Palghar girls The Hindu 31 January 2013 Retrieved 23 April 2015 Teen arrested for Facebook post attributed to Azam Khan gets bail The Times of India 19 March 2015 Retrieved 6 May 2015 UP tells SC that prosecution on boy for post against Azam Khan will continue The Indian Express 24 April 2015 Retrieved 6 May 2015 Sahu Saswati Soumya 17 May 2014 Cyber Forensics law and practice in India ipleaders in iPleaders Retrieved 6 December 2014 Bera Poonam 22 September 2014 Presentation of electronic evidence in court in light of the Supreme Court judgment in Anvar P K vs P K Basheer amp ors Read more Presentation of electronic evidence in court in light of the Supreme Court judgment in Anvar P K vs P K Basheer amp ors ipleaders in iPleaders Retrieved 6 December 2014 Reidy Diane 2019 04 15 Away in a hack Law Society of Ireland Retrieved 2024 02 19 Finlay Adam Hughes Ruth iclg com gt Practice Areas gt Cybersecurity gt Ireland iclg com Retrieved 2024 02 20 Internet Crime The Computer Misuse Act 1990 Home Office Archived from the original on 2005 03 01 Retrieved 2012 01 17 Police and Justice Act 2006 Computer Misuse Act Legal guidance Crown Prosecution Service Retrieved 2020 09 01 All Content related to Saudi Arabia OpenNet Initiative Archived from the original on 2017 09 10 Retrieved 2010 10 11 Federal Agency Digital and Electronic Signature Regulations Isaacbowman com 2009 03 16 Archived from the original on 2012 02 06 Retrieved 2012 01 17 cyberpolicebangalore nic in cyberpolicebangalore nic in Archived from the original on 2006 02 23 Retrieved 2012 01 17 1 Archived December 6 2004 at the Wayback Machine Cyber Crimes www cidap gov in Archived from the original on 25 February 2004 Retrieved 15 January 2022 Aaronson Susan 3 August 2021 Data is disruptive How data sovereignty is challenging data governance Hinrich Foundation Retrieved 2022 10 01 5G amp Small Cell Deployment in USA Complete Low Down VisiOneClick VisiOneClick 2019 07 02 Retrieved 2019 07 26 References editA Murray Information Technology Law The Law and Society 3rd edn 2016 Code and Other Laws of Cyberspace The Future of Ideas and Free Culture by Lawrence Lessig Cyber Rights by Mike Godwin E Commerce and Internet Law Treatise with Forms 2d edition by Ian C BallonExternal links editInformation Technology Law India Bare Act Internet Law Resources Retrieved from https en wikipedia org w index php title IT law amp oldid 1215481403, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.