Cyber law

Cyber law

Cyber law (also referred to as Cyberlaw) describes the legal issues related to use of inter-networked information technology. It is less a distinct field of law in the way that property or contract are, as it is a domain covering many areas of law and regulation. Some leading topics include intellectual property, privacy, freedom of expression, and jurisdiction.

Jurisdiction and sovereignty

Issues of jurisdiction and sovereignty have quickly come to the fore in the era of the Internet. The Internet does not tend to make geographical and jurisdictional boundaries clear, but Internet users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet. As such, a single transaction may involve the laws of at least three jurisdictions: 1) the laws of the state/nation in which the user resides, 2) the laws of the state/nation that apply where the server hosting the transaction is located, and 3) the laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the United States conducting a transaction with another user in Britain through a server in Canada could theoretically be subject to the laws of all three countries as they relate to the transaction at hand.

Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extra-territorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of conflict of laws, particularly private international law. An example would be where the contents of a web site are legal in one country and illegal in another. In the absence of a uniform jurisdictional code, legal practitioners are generally left with a conflict of law issue.

Another major problem of cyber law lies in whether to treat the Internet as if it were physical space (and thus subject to a given jurisdiction's laws) or to act as if the Internet is a world unto itself (and therefore free of such restraints). Those who favor the latter view often feel that government should leave the Internet community to self-regulate. John Perry Barlow, for example, has addressed the governments of the world and stated, "Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract . This governance will arise according to the conditions of our world, not yours. Our world is different" (Barlow, A Declaration of the Independence of Cyberspace [http://homes.eff.org/~barlow/Declaration-Final.html] ). A more balanced alternative is the Declaration of Cybersecession: "Human beings possess a mind, which they are absolutely free to inhabit with no legal constraints. Human civilization is developing its own (collective) mind. All we want is to be free to inhabit it with no legal constraints. Since you make sure we cannot harm you, you have no ethical right to intrude our lives. So stop intruding!" [http://editthis.info/cybersecession/An_Introduction_to_Cybersecession] . Other scholars argue for more of a compromise between the two notions, such as Lawrence Lessig's argument that "The problem for law is to work out how the norms of the two communities are to apply given that the subject to whom they apply may be in both places at once" (Lessig, Code 190).

Though rhetorically attractive, cybersecession initiatives have had little real impact on the Internet or the laws governing it. In practical terms, a user of the Internet is subject to the laws of the state or nation within which he or she goes online. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were subject to civil lawsuits for copyright infringement. This system runs into conflicts, however, when these suits are international in nature. Simply put, legal conduct in one nation may be decidedly illegal in another. In fact, even different standards concerning the burden of proof in a civil case can cause jurisdictional problems. For example, an American celebrity, claiming to be insulted by an online American magazine, faces a difficult task of winning a lawsuit against that magazine for libel. But if the celebrity has ties, economic or otherwise, to England, he or she can sue for libel in the British court system, where the standard of “libelous speech” is far lower.

2. Architecture: West Coast Code: these mechanisms concern the parameters of how information can and cannot be transmitted across the internet. Everything from internet filtering software (which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of TCP/IP protocol, falls within this category of regulation. It is arguable that all other modes of regulation either rely on, or are significantly supported by, regulation via West Coast Code.

3. Norms: As in all other modes of social interaction, conduct is regulated by social norms and conventions in significant ways. While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the internet, or expressly prohibited by applicable law, nevertheless these activities or conduct will be invisibly regulated by the inherent standards of the community, in this case the internet “users.” And just as certain patterns of conduct will cause an individual to be ostracized from our real world society, so too certain actions will be censored or self-regulated by the norms of whatever community one chooses to associate with on the internet.

4. Markets: Closely allied with regulation by virtue of social norms, markets also regulate certain patterns of conduct on the internet. While economic markets will have limited influence over non-commercial portions of the internet, the internet also creates a virtual marketplace for information, and such information affects everything from the comparative valuation of services to the traditional valuation of stocks. In addition, the increase in popularity of the internet as a means for transacting all forms of commercial activity, and as a forum for advertisement, has brought the laws of supply and demand in cyberspace.

Internet regulation in other countries

While there is some United States law that does restrict access to materials on the internet, it does not truly filter the internet. Many Asian and Middle Eastern nations use any number of combinations of code-based regulation (one of Lessig's four methods of net regulation) to block material that their governments have deemed inappropriate for their citizens to view. China and Saudi Arabia are two excellent examples of nations that have achieved high degrees of success in regulating their citizens access to the internet (for further reading, please see ONI's studies on both: http://www.opennetinitiative.net/studies/saudi/ and http://www.opennetinitiative.net/studies/china/)

ee also

*Berkman Center for Internet and Society
*Norwegian Research Center for Computers and Law

References

Further reading

* [http://www.worldlii.org/catalog/284.html WorldLII Cyberspace Law]
* [http://www.cyberlawtimes.com Cyber Law World]
* [http://www.crime-research.org/ Computer Crime Research Center]
* [http://gstj.org/Cyber%20Censor.pdf Global School of Tech Juris White Paper on Censoring The Indian Cyberspace]
* [http://gstj.org/Cyber%20Voyeurism.pdf Global School of Tech Juris White Paper on Cyber Voyeurism Perverts Dot Com]
*"Code and Other Laws of Cyberspace," "The Future of Ideas," and "Free Culture" by Lawrence Lessig
* [http://www.asianlaws.org/cyberlaw/library/index.htm ASCL Cyber Law Library]
* [http://epublications.bond.edu.au/law_pubs/16 Borders on, or border around – the future of the Internet]

External links

* [http://www.cyberlawsindia.net Cyber Law In India]
* [http://www.cyberlaw.ro Cyberlaw.ro Romanian IT law articles and news]
* [http://cyberlaw.stanford.edu/cyberlaw-clinic Stanford Law School Cyberlaw Clinic]
* [http://www.cyberclinicpr.org/ University of Puerto Rico Law School Cyberlaw Clinic]
* [http://www.gstj.org Global School of Tech Juris]
* [http://www.techlawforum.net/category/internet-policy/ Santa Clara University School of Law Tech LawForum]
* [http://www.cyberlawtimes.com/forums Cyber Law Discussion Forum]
* [http://www.netlitigation.com Netlitigation: Internet Law]
* [http://www.cybertelecom.org/ Cybertelecom :: Federal Internet Policy]
* [http://www.nacpec.org/en/ North American Consumer Project on Electronic Commerce NACPEC]
* [http://www.internetlibrary.com Internet Library of Law and Court Decisions] Internet Law Case Digest
* [http://www.alfa-redi.org Alfa-Redi] (About Cyberlaw in Latin America and Caribbean)


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • cyber law — UK US noun [U] INTERNET, LAW ► laws or rules about how people should use computers, especially the internet: »Credit card and transaction fraud are rampant in the country as there is no cyber law at present …   Financial and business terms

  • Cyber Rights —   Book cover, 2003 edition …   Wikipedia

  • Cyber defamation law — Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others. The cyber defamation law that the Korean government tries to make is intended to capture such criminal activities by… …   Wikipedia

  • Cyber City Oedo 808 — Cover of the European DVD サイバーシティ OEDO 808 Genre Cyberpunk …   Wikipedia

  • Cyber Operations — (CO) is a classification of military operations that use of Computer Network Attack (CNA), Computer Network Defense (CND), Computer Network Exploitation (CNE) against an enemy to achieve military objectives.[1] Contents 1 History 2 Activities …   Wikipedia

  • Cyber-bullying — Cyberbully redirects here. It is not to be confused with Cyberbully (film). Cyberbullying hurts logo Cyber bullying is the use of the Internet and related technologies …   Wikipedia

  • Cyber War — Zweiter Weltkrieg: Frankreich. Nachrichtenhelferinnen an Vermittlungspult/Telefonanlage: PK KBK Lw zbV (Deutsche Wehrmacht; Bild: Bundesarchiv) Cyberwar ist ein Kofferwort aus den englischen Wörtern …   Deutsch Wikipedia

  • Cyber-security regulation — In the United States government, cyber security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber security regulation is to… …   Wikipedia

  • Cyber security and countermeasure — Cybercrime (or computer crime) refers to any crime that involves a computer and a network.[1] In general, a countermeasure is a measure or action taken to counter or offset another one. In computer security a countermeasure is an action, device,… …   Wikipedia

  • Cyber-Bullying — Dieser Artikel oder Abschnitt bedarf einer Überarbeitung. Näheres ist auf der Diskussionsseite angegeben. Hilf mit, ihn zu verbessern, und entferne anschließend diese Markierung. Unter Cyber Mobbing, auch Cyber Bullying oder Cyber Stalking,… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”