major issues with internet public policy

Views:
 
Category: Education
     
 

Presentation Description

Group project

Comments

Presentation Transcript

Major Internet Public Policy Issues : 

Major Internet Public Policy Issues Dan Rosenblum Gabriela Berrido Andrew Chen Julian Gonzalez

Talking Internet Public Policy… : 

There are four major issues: Privacy Intellectual Property Rights Governance Public Safety and Welfare Talking Internet Public Policy… Advances in computer technology and the Internet have changed the way America works, learns, and communicates.  The Internet has become an integral part of America's economic, political, and social life.  ~Bill Clinton

Talking Internet Public Policy… : 

The way the internet has infiltrated our lives has given people reason to raise pervasive ethical, social, and political issues that have been at the root of our society for the past 10-20 years. Talking Internet Public Policy… The Internet is becoming the town square for the global village of tomorrow.  ~Bill Gates The internet affects the economy in 8 specific ways. These ways are: Ubiquity Global reach Universal Standards Richness Interactivity Information density Personalization/Customization Social technology

Privacy Issues : 

Privacy Issues

Privacy Issues : 

The moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Information Privacy- includes both the claim that certain information should not be collected at all by governments or business firms, and the claim of individuals to control the use of whatever information that is collected about them. Privacy Issues

Types of Threats to Privacy : 

Private sector - how much personal information is collected by commercial web sites and how it will be used? Public sector - how much personal information federal, state, and local government authorities collect, and how they use it? Types of Threats to Privacy

Collecting Information at E-Commerce Sites : 

Information collected about us are identifiable as two different types: Personally identifiable information (PII) Used to identify, locate or contact individuals. Anonymous Information Demographic and behavioral information. Collecting Information at E-Commerce Sites

Major Information Gathering Tools : 

Companies can collect our information in a number of ways. They compromise of: Advertising networks Social networks Cookies and Third-party cookies Spyware Search engine behavioral targeting Deep packet inspection Shopping carts Forms Site transaction logs Search Engines Digital wallets Digital Rights Management Trusted Computing Environments Major Information Gathering Tools

Profiling : 

With the information gathered, companies create digital images that characterize online individual and group behavior. There are two different types: Anonymous profiles – highly specific and targeted groups. Personal profiles – personal e-mail address, postal address, phone number, etc. Profiling

Government Invasions of Privacy : 

Today, the e-commerce behavior, profiles, and transactions of consumers are routinely available to a wide range of government agencies and law enforcement authorities. E-Commerce Surveillance: Communications Assistance for Law Enforcement Act USA Patriot Act Cyber Security Enhancement Act Homeland Security Act All abovementioned acts give government agencies the ability to monitor internet users without their consent. Government Invasions of Privacy

Informed consent : 

The concept of informed consent also plays an important role in protecting privacy. There are traditionally two models for informed consent: Opt-in Opt-out Informed consent

The Federal Trade Commission : 

Leader in conducting research on online privacy and recommending legislation to Congress. For example, in July 2000, the FTC recommended legislation to congress to protect online consumer privacy from the threat posed by advertising networks. Fair Information Practice (FIP) principles – set the ground rules for what constitutes due process privacy protection procedures at e-commerce and all other web sites. Notice/Awareness Choice/Consent Access/Participation Security Enforcement The Federal Trade Commission

Technological Protections for Online Privacy : 

Spyware blockers Pop-up blockers Secure e-mail Anonymous remailers Anonymous surfing Cookie managers Disk/file erasing programs Policy generators Privacy Policy Reader Public Key Encryption Technological Protections for Online Privacy

Intellectual Property Rights : 

General rule – The creator of intellectual property owns it. Once intellectual works become digital, it becomes difficult to control access, use, distribution, and copying. Major critical issue - how we should treat property that belongs to others? Types of intellectual property protection: Copyright Patent Trademark The goal of intellectual property law is to balance two competing interests – public and private. Intellectual Property Rights

Intellectual Property LawCopyright & Trademark Laws : 

Digital Millennium Copyright Act of 1998 This is the first major effort to adjust the copyright laws to the internet age. It includes four titles: WIPO copyright and performances and phonograms treaties implementation Online copyright infringement liability limitation Computer maintenance competition assurance Miscellaneous provisions Intellectual Property LawCopyright & Trademark Laws Trademark Terms: Cybersquatting Cyberpiracy Metatagging Keywords Linking Framing

Governance : 

Has to do with social control: who will control the internet? who will control e-commerce? what elements will be controlled? and how the controls will be implemented? The Evolution of Governance of E-Commerce: Government Control 1970-1994 Privatization 1995-1998 Self-Regulation 1995-Present Governmental Regulation 1998-Present Governance

Public Safety and Welfare : 

Public Safety and Welfare Protecting Children: Communications Decency Act of 1996- criminal offense to use any telecommunications device to transmit “any comment, request, suggestion, proposal, image or other communications which is obscene, lewd, lascivious, filthy, or indecent” to anyone, and in particular to children under the age of 18 years. Children’s Online Protection Act of 1998- criminal offense to communicate for “commercial purposes” “any material harmful to minors.” The Protect Act of 2003- prevent child abuse that includes prohibitions against computer generated child pornography.

Recent Internet Related News : 

Google's new Location service Recent Internet Related News

Recent Internet Related News : 

FTC’s “do not track” plan For more information about the plan, visit FTC’s website at http://ftc.gov/opa/2010/12/privacyreport.shtm Recent Internet Related News

Recent Internet Related News : 

FCC’s Net Neutrality Recent Internet Related News

Recent Internet Related News : 

First lawsuit targeting “history sniffing” Recent Internet Related News

Recent Internet Related News : 

Obama’s Web Tracking Plan Recent Internet Related News

Analysis/Conclusion : 

One thing is clear about public policy and the internet; That it is still being fiercely debated about. The laws governing America are hundreds of years old and they are still being changed as we speak. The internet was just created, the time for setting the foundation begins now. The first major issue regarded intellectual property. This can be demonstrated by the lawsuits brought about against Napster and Kazaa. Ultimately, the record executives won, and now it is illegal to share music freely. The next hurdle the internet faces is privacy issues. As seen with Google’s and Facebook’s (among others) growing lawsuits about tracing peoples browsing trends. This issue at hand, just doesn’t effect one industry, but the entire online e-commerce world. It is how the online business makes money. When will this be solved? Who knows, and if it is, what will the internet bring next? Analysis/Conclusion

Bibliography : 

In Addition to the information we gathered from the text book. We also used: http://www.wired.com/epicenter/2009/02/google-latitude/ http://money.cnn.com/2010/12/02/technology/ftc_do_not_track/index.htm http://news.cnet.com/8301-30686_3-10357411-266.html http://online.wsj.com/article/SB10001424052748704767804575654910216593180.html?mod=WSJ_hp_LEFTWhatsNewsCollection http://www.washingtonpost.com/wp-dyn/content/article/2009/08/10/AR2009081002743.html Bibliography

authorStream Live Help