Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of
information technology
Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
, its possibilities and the consequences of its use, including
computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, hardware and softw ...
, software coding,
artificial intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
, the
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
and virtual worlds. The ICT field of law comprises elements of various branches of law, originating under various acts or statutes of parliaments, the common and continental law and international law. Some important areas it covers are information and data, communication, and information technology, both software and hardware and technical communications technology, including coding and protocols.
Due to the shifting and adapting nature of the technological industry, the nature, source and derivation of this information legal system and ideology changes significantly across borders, economies and in time. As a base structure, Information technology law is related to primarily governing dissemination of both (
digitized) information and
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
,
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
and crossing-border
commerce
Commerce is the organized Complex system, system of activities, functions, procedures and institutions that directly or indirectly contribute to the smooth, unhindered large-scale exchange (distribution through Financial transaction, transactiona ...
. It raises specific issues of
intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
,
contract
A contract is an agreement that specifies certain legally enforceable rights and obligations pertaining to two or more parties. A contract typically involves consent to transfer of goods, services, money, or promise to transfer any of thos ...
law,
criminal law
Criminal law is the body of law that relates to crime. It proscribes conduct perceived as threatening, harmful, or otherwise endangering to the property, health, safety, and Well-being, welfare of people inclusive of one's self. Most criminal l ...
and
fundamental rights like
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
, the
right to self-determination and
freedom of expression
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
. Information technology law has also been heavily invested of late in issues such as obviating risks of
data breaches and
artificial intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
.
Information technology law can also relate directly to dissemination and utlilzation of information within the legal industry, dubbed
legal informatics. The nature of this utilisation of data and information technology platform is changing heavily with the advent of
Artificial Intelligence
Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
systems, with major lawfirms in the
United States of America
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 states and a federal capital district, Washington, D.C. The 48 contiguo ...
,
Australia
Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller isl ...
,
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
, and the
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
reporting pilot programs of Artificial Intelligence programs to assist in practices such as legal research, drafting and document review.
Areas of law
IT law does not constitute a separate area of law; rather, it encompasses aspects of contract, intellectual property, privacy and data protection laws.
Intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
is an important component of IT law, including
copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
and
authors' rights
"Authors' rights" is a term frequently used in connection with Intellectual property, laws about intellectual property.
The term is considered as a direct translation of the French language, French term (also German language, German ). It was fi ...
, rules on
fair use
Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
, rules on
copy protection
Copy protection, also known as content protection, copy prevention and copy restriction, is any measure to enforce copyright by preventing the reproduction of software, films, music, and other media.
Copy protection is most commonly found on vid ...
for digital media and circumvention of such schemes. The area of
software patent
A software patent is a patent on a piece of software, such as a computer program, library, user interface, or algorithm. The validity of these patents can be difficult to evaluate, as software is often at once a product of engineering, something ...
s has been
controversial, and is still evolving in Europe and elsewhere.
The related topics of
software license
A software license is a legal instrument governing the use or redistribution of software.
Since the 1970s, software copyright has been recognized in the United States. Despite the copyright being recognized, most companies prefer to sell lic ...
s,
end user license agreements,
free software licenses and
open-source license
Open-source licenses are software licenses that allow content to be used, modified, and shared. They facilitate free and open-source software (FOSS) development. Intellectual property (IP) laws restrict the modification and sharing of creative ...
s can involve discussion of product liability, professional liability of individual developers, warranties, contract law, trade secrets and intellectual property.
In various countries, areas of the computing and communication industries are regulated – often strictly – by governmental bodies.
There are rules on the uses to which computers and computer networks may be put, in particular there are rules on
unauthorized access,
data privacy and
spamming
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose (especially phishing), or si ...
. There are also limits on the use of
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
and of equipment which may be used to defeat copy protection schemes. The export of hardware and software between certain states within the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
is also controlled.
There are laws governing trade on the Internet, taxation,
consumer protection
Consumer protection is the practice of safeguarding buyers of goods and services, and the public, against unfair practices in the marketplace. Consumer protection measures are often established by law. Such laws are intended to prevent business ...
, and advertising.
There are laws on
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
versus freedom of expression, rules on public access to government information, and individual access to information held on them by private bodies. There are laws on what data must be retained for law enforcement, and what may not be gathered or retained, for privacy reasons.
In certain circumstances and jurisdictions, computer communications may be used in evidence, and to establish contracts.
New methods of tapping and surveillance made possible by computers have wildly differing rules on how they may be used by law enforcement bodies and as evidence in court.
Computerized voting technology, from polling machines to internet and mobile-phone voting, raise a host of legal issues.
Some states limit access to the Internet, by law as well as by technical means.
Regulation
Global computer-based communications cut across territorial borders; issues of regulation,
jurisdiction
Jurisdiction (from Latin 'law' and 'speech' or 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, the concept of jurisdiction applies at multiple level ...
and
sovereignty
Sovereignty can generally be defined as supreme authority. Sovereignty entails hierarchy within a state as well as external autonomy for states. In any state, sovereignty is assigned to the person, body or institution that has the ultimate au ...
have therefore quickly come to the fore in the era of the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. They have been solved pretty quickly as well, because cross-border communication, negotiating or ordering was nothing new; new were the massive amounts of contacts, the possibilities of hiding one's identity and sometime later the
colonisation
475px, Map of the year each country achieved List of sovereign states by date of formation, independence.
Colonization (British English: colonisation) is a process of establishing occupation of or control over foreign territories or peoples f ...
of the terrain by corporations.
Jurisdiction
Jurisdiction is an aspect of
state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extraterritorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. The medium of the Internet, like
electrical telegraph
Electrical telegraphy is point-to-point distance communicating via sending electric signals over wire, a system primarily used from the 1840s until the late 20th century. It was the first electrical telecommunications system and the most wid ...
,
telephone
A telephone, colloquially referred to as a phone, is a telecommunications device that enables two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most ...
or
radio
Radio is the technology of communicating using radio waves. Radio waves are electromagnetic waves of frequency between 3 hertz (Hz) and 300 gigahertz (GHz). They are generated by an electronic device called a transmitter connec ...
, does not explicitly recognize sovereignty and territorial limitations. There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of international treaties and contracts, or
conflict of laws
Conflict of laws (also called private international law) is the set of rules or laws a jurisdiction applies to a Legal case, case, Transactional law, transaction, or other occurrence that has connections to more than one jurisdiction."Conflict o ...
, particularly private international law. An example would be where the contents stored on a server located in the United Kingdom, by a citizen of France, and published on a web site, are legal in one country and illegal in another. In the absence of a uniform jurisdictional code, legal practitioners and judges have solved these kind of questions according the general rules for conflict of law; governments and supra-national bodies did design outlines for new legal frameworks.
Regulation alternatives
Whether to treat the Internet as if it were physical space and thus subject to a given jurisdiction's laws, or that the Internet should have a legal framework of its own has been questioned. Those who favor the latter view often feel that government should leave the Internet to self-regulate. American poet
John Perry Barlow, for example, has addressed the governments of the world and stated, "Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different". Another view can be read from a
wiki
A wiki ( ) is a form of hypertext publication on the internet which is collaboratively edited and managed by its audience directly through a web browser. A typical wiki contains multiple pages that can either be edited by the public or l ...
-website with the name "An Introduction to Cybersecession", that argues for ethical validation of absolute anonymity on the Internet. It compares the Internet with the human mind and declares: "Human beings possess a mind, which they are absolutely free to inhabit with no legal constraints. Human civilization is developing its own (collective) mind. All we want is to be free to inhabit it with no legal constraints. Since you make sure we cannot harm you, you have no ethical right to intrude our lives. So stop intruding!" The project is defining "you" as "all governments", "we" is undefined. Some scholars argue for more of a compromise between the two notions, such as
Lawrence Lessig
Lester Lawrence "Larry" Lessig III (born June 3, 1961) is an American legal scholar and political activist. He is the Roy L. Furman Professor of Law at Harvard Law School and the former director of the Edmond J. Safra Center for Ethics at Harvar ...
's argument that "The problem for law is to work out how the norms of the two communities are to apply given that the subject to whom they apply may be in both places at once."
Conflict of law
With the internationalism of the Internet and the rapid growth of users,
jurisdiction
Jurisdiction (from Latin 'law' and 'speech' or 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, the concept of jurisdiction applies at multiple level ...
became a more difficult area than before, and in the beginning courts in different countries have taken various views on whether they have jurisdiction over items published on the Internet, or business agreements entered into over the Internet. This can cover areas from contract law, trading standards and tax, through rules on
unauthorized access,
data privacy and
spamming
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose (especially phishing), or si ...
to areas of fundamental rights such as freedom of speech and privacy, via state censorship, to criminal law with libel or sedition.
The frontier idea that laws do not apply in "cyberspace" is however not true in a legal sense. In fact, conflicting laws from different jurisdictions may apply, simultaneously, to the same event. The Internet does not tend to make geographical and jurisdictional boundaries clear, but both Internet technology (hardware), the providers of services and its users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet. As such, a single transaction may involve the laws of at least three jurisdictions:
# the laws of the state/nation in which the user resides,
# the laws of the state/nation that apply where the server hosting the transaction is located, and
# the laws of the state/nation which apply to the person or business with whom the transaction takes place.
So a user in one of the United States conducting a transaction with another user that lives in the
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, through a server in Canada, could theoretically be subject to the laws of all three countries and of international treaties as they relate to the transaction at hand.
In practical terms, a user of the Internet is subject to the laws of the state or nation within which he or she goes online. Thus, in the U.S., in 1997,
Jake Baker faced criminal charges for his e-conduct, and numerous users of peer-to-peer
file-sharing software were subject to civil lawsuits for
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
. This system runs into conflicts, however, when these suits are international in nature. Simply put, legal conduct in one nation may be decidedly illegal in another. In fact, even different standards concerning the
burden of proof in a civil case can cause jurisdictional problems. For example, an American celebrity, claiming to be insulted by an online American magazine, faces a difficult task of winning a lawsuit against that magazine for
libel
Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
. But if the celebrity has ties, economic or otherwise, to England, he or she can sue for libel in the English court system, where the
burden of proof for establishing defamation may make the case more favorable to the plaintiff.
Internet governance
Internet governance is the effort by governments, the private sector, civil society, and technical actors to develop and apply shared principles, norms, rules, and decision-making procedures that shape the evolution and use of the Internet. This ...
is a live issue in international fora such as the
International Telecommunication Union
The International Telecommunication Union (ITU)In the other common languages of the ITU:
*
* is a list of specialized agencies of the United Nations, specialized agency of the United Nations responsible for many matters related to information ...
(ITU), and the role of the current US-based co-ordinating body, the
Internet Corporation for Assigned Names and Numbers
The Internet Corporation for Assigned Names and Numbers (ICANN ) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several dat ...
(ICANN) was discussed in the UN-sponsored
World Summit on the Information Society (WSIS) in December 2003.
European Union
Directives, Regulations and other laws regulating information technology (including the internet, e-commerce, social media and data privacy) in the EU include:
*
General Data Protection Regulation
The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
*
ePrivacy Directive
*
Data Retention Directive (since declared invalid)
*
Database Directive
Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases is a directive of the European Union in the field of copyright law, made under the internal market provisions of the Tre ...
, which affords IP protections on databases
*
Artificial Intelligence Act
*
Digital Services Act
*
Digital Markets Act
*
Cyber Resilience Act
*
Data Governance Act (proposed)
*
Digital Fairness Act (proposed)
Copyright / authors' right
As of 2020, the
European Union
The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
law consists of 13 directives and 2 regulations, harmonising the essential rights of authors, performers, producers and broadcasters. The legal framework reduces national discrepancies, and guarantees the level of protection needed to foster creativity and investment in creativity. Many of the directives reflect obligations under the
Berne Convention and the
Rome Convention, as well as the obligations of the EU and its Member States under the World Trade Organisation '
TRIPS' Agreement and the two 1996 World Intellectual Property Organisation (WIPO) Internet Treaties: the
WIPO Copyright Treaty and the
WIPO Performances and Phonograms Treaty. Two other WIPO Treaties signed in 2012 and 2016, are the
Beijing Treaty on the Protection of Audiovisual Performances and the
Marrakesh VIP Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired or otherwise Print Disabled. Moreover, free-trade agreements, which the EU concluded with a large number of third countries, reflect many provisions of EU law.
Digital Services Act & Digital Markets Act (2023)
In 2022 the
European Parliament
The European Parliament (EP) is one of the two legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it ...
did adopt landmark laws for
internet platforms, the new rules will improve internet consumer protection and supervision of online platforms, the
Digital Services Act (DSA) and the
Digital Markets Act (DMA).
Debates around Internet law
The
law
Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a science and as the ar ...
that regulates aspects of the Internet must be considered in the context of the geographic scope of the technical infrastructure of Internet and state borders that are crossed in processing data around the globe. The global structure of the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
raises not only jurisdictional issues, that is, the authority to make and enforce laws affecting the Internet, but made corporations and scholars raise questions concerning the nature of the laws themselves.
In their essay "Law and Borders – The Rise of Law in Cyberspace", from 2008,
David R. Johnson
David R. Johnson is an American lawyer specializing in computer communications. He is a senior fellow at Center for Democracy and Technology, and a former chairman of the Electronic Frontier Foundation.
Career
Johnson graduated from Yale Colleg ...
and
David G. Post argue that territorially-based law-making and law-enforcing authorities find this new environment deeply threatening and give a scientific voice to the idea that became necessary for the Internet to govern itself. Instead of obeying the laws of a particular country, "Internet citizens" will obey the laws of electronic entities like service providers. Instead of identifying as a physical person, Internet citizens will be known by their usernames or email addresses (or, more recently, by their Facebook accounts). Over time, suggestions that the Internet can be self-regulated as being its own trans-national "nation" are being supplanted by a multitude of external and internal regulators and forces, both governmental and private, at many different levels. The nature of Internet law remains a legal
paradigm shift, very much in the process of development.
Lawrence Lessig (1999)
Leaving aside the most obvious examples of governmental content monitoring and
internet censorship in nations like
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
,
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
,
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, there are four primary forces or modes of regulation of the Internet derived from a socioeconomic theory referred to as
Pathetic dot theory by
Lawrence Lessig
Lester Lawrence "Larry" Lessig III (born June 3, 1961) is an American legal scholar and political activist. He is the Roy L. Furman Professor of Law at Harvard Law School and the former director of the Edmond J. Safra Center for Ethics at Harvar ...
in his 1999 book, ''
Code and Other Laws of Cyberspace'':
#Law: What Lessig calls "Standard East Coast Code", from laws enacted by government in Washington D.C. This is the most self-evident of the four modes of regulation. As the numerous United States statutes, codes, regulations, and evolving case law make clear, many actions on the Internet are already subject to conventional laws, both with regard to transactions conducted on the Internet and content posted. Areas like gambling, child pornography, and fraud are regulated in very similar ways online as off-line. While one of the most controversial and unclear areas of evolving laws is the determination of what forum has subject matter jurisdiction over activity (economic and other) conducted on the internet, particularly as cross border transactions affect local jurisdictions, it is certainly clear that substantial portions of internet activity are subject to traditional regulation, and that conduct that is unlawful off-line is presumptively unlawful online, and subject to traditional enforcement of similar laws and regulations.
#Architecture: What Lessig calls "West Coast Code", from the programming code of the
Silicon Valley
Silicon Valley is a region in Northern California that is a global center for high technology and innovation. Located in the southern part of the San Francisco Bay Area, it corresponds roughly to the geographical area of the Santa Clara Valley ...
. These mechanisms concern the parameters of how information can and cannot be transmitted across the Internet. Everything from internet filtering software (which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of TCP/IP protocols and user interfaces falls within this category of mainly private regulation. It is arguable that all other modes of internet regulation either rely on, or are significantly affected by, West Coast Code.
#Norms: As in all other modes of social interaction, conduct is regulated by social norms and conventions in significant ways. While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the Internet, or expressly prohibited by traditional governmental law, nevertheless these activities or conduct are regulated by the standards of the community in which the activity takes place, in this case internet "users". Just as certain patterns of conduct will cause an individual to be ostracized from our real world society, so too certain actions will be censored or self-regulated by the norms of whatever community one chooses to associate with on the internet.
#Markets: Closely allied with regulation by social norms, markets also regulate certain patterns of conduct on the Internet. While economic markets will have limited influence over non-commercial portions of the Internet, the Internet also creates a virtual marketplace for information, and such information affects everything from the comparative valuation of services to the traditional valuation of stocks. In addition, the increase in popularity of the Internet as a means for transacting all forms of commercial activity, and as a forum for advertisement, has brought the laws of supply and demand to cyberspace. Market forces of supply and demand also affect connectivity to the Internet, the cost of bandwidth, and the availability of software to facilitate the creation, posting, and use of internet content.
These forces or regulators of the Internet do not act independently of each other. For example, governmental laws may be influenced by greater societal norms, and markets affected by the nature and quality of the code that operates a particular system.
Net neutrality
Another major area of interest is
net neutrality
Net neutrality, sometimes referred to as network neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, offering User (computing), users and online content providers consistent tra ...
, which affects the regulation of the infrastructure of the Internet. Though not obvious to most Internet users, every packet of data sent and received by every user on the Internet passes through routers and transmission infrastructure owned by a collection of private and public entities, including telecommunications companies, universities, and governments. This issue has been handled in the paast for electrical telegraph, telephone and cable TV. A critical aspect is that laws in force in one jurisdiction have the potential to have effects in other jurisdictions when host servers or telecommunications companies are affected.
The Netherlands became in 2013 the first country in Europe and the second in the world, after Chile, to pass law relating to it. In the U.S, on 12 March 2015, the FCC released the specific details of its new net neutrality rule. On 13 April 2015, the FCC published the final rule on its new regulations.
Free speech on the Internet
Article 19 of the
Universal Declaration of Human Rights
The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal D ...
calls for the protection of
free opinion and expression. Which includes right such as freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
In comparison to print-based media, the accessibility and relative anonymity of internet has torn down traditional barriers between an individual and his or her ability to publish. Any person with an internet connection has the potential to reach an audience of millions.
These complexities have taken many forms, three notable examples being the
Jake Baker incident, in which the limits of obscene Internet postings were at issue, the controversial distribution of the
DeCSS code, and
Gutnick v Dow Jones, in which libel laws were considered in the context of online publishing. The last example was particularly significant because it epitomized the complexities inherent to applying one country's laws (nation-specific by definition) to the internet (international by nature). In 2003,
Jonathan Zittrain
Jonathan L. Zittrain (born December 24, 1969) is an American professor of cyber law, Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of co ...
considered this issue in his paper, "Be Careful What You Ask For: Reconciling a Global Internet and Local Law".
In the UK in 2006 the case of
Keith-Smith v Williams confirmed that existing
libel
Defamation is a communication that injures a third party's reputation and causes a legally redressable injury. The precise legal definition of defamation varies from country to country. It is not necessarily restricted to making assertions ...
laws applied to internet discussions.
In terms of the
tort
A tort is a civil wrong, other than breach of contract, that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with cri ...
liability of ISPs and hosts of internet forums, Section 230(c) of the
Communications Decency Act may provide immunity in the United States.
Internet censorship
In many countries, speech through ICT has proven to be another means of communication which has been regulated by the government. The "Open Net Initiative" by the
Harvard University
Harvard University is a Private university, private Ivy League research university in Cambridge, Massachusetts, United States. Founded in 1636 and named for its first benefactor, the History of the Puritans in North America, Puritan clergyma ...
Berkman Klein Center, the
University of Toronto
The University of Toronto (UToronto or U of T) is a public university, public research university whose main campus is located on the grounds that surround Queen's Park (Toronto), Queen's Park in Toronto, Ontario, Canada. It was founded by ...
and the Canadian SecDev Group whose mission statement is "to investigate and challenge state filtration and surveillance practices" to "...generate a credible picture of these practices," has released numerous reports documenting the filtration of internet-speech in various countries. While
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
has thus far (2011) proven to be the most rigorous in its attempts to filter unwanted parts of the internet from its citizens,
many other countries – including
Singapore
Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree ...
,
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
,
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
, and
Tunisia
Tunisia, officially the Republic of Tunisia, is a country in the Maghreb region of North Africa. It is bordered by Algeria to the west and southwest, Libya to the southeast, and the Mediterranean Sea to the north and east. Tunisia also shares m ...
– have engaged in similar practices of
Internet censorship. In one of the most vivid examples of information control, the Chinese government for a short time transparently forwarded requests to the
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
search engine to its own, state-controlled search engines.
These examples of filtration bring to light many underlying questions concerning the freedom of speech. For example, do government have a legitimate role in limiting access to information? And if so, what forms of regulation are acceptable? For example, some argue that the blocking of "
blogspot" and other websites in
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
failed to reconcile the conflicting interests of speech and expression on the one hand and legitimate government concerns on the other hand.
The creation of privacy in U.S. Internet law
Warren and Brandeis
At the close of the 19th century, concerns about
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
captivated the general public, and led to the 1890 publication of Samuel Warren and Louis Brandeis: "The Right to Privacy". The vitality of this article can be seen today, when examining the USSC decision of ''
Kyllo v. United States'', 533 U.S. 27 (2001) where it is cited by the majority, those in concurrence, and even those in dissent.
[Solove, D., Schwartz, P.. (2009). Privacy, Information, and Technology. (2nd Ed.). New York, NY: Aspen Publishers. .]
The motivation of both authors to write such an article is heavily debated amongst scholars, however, two developments during this time give some insight to the reasons behind it. First, the sensationalistic press and the concurrent rise and use of "
yellow journalism
In journalism, yellow journalism and the yellow press are American newspapers that use eye-catching headlines and sensationalized exaggerations for increased sales. This term is chiefly used in American English, whereas in the United Kingdom, ...
" to promote the sale of newspapers in the time following the Civil War brought privacy to the forefront of the public eye. The other reason that brought privacy to the forefront of public concern was the technological development of "
instant photography". This article set the stage for all privacy legislation to follow during the 20 and 21st centuries.
Reasonable Expectation of Privacy Test and emerging technology
In 1967, the United States Supreme Court decision in ''Katz v United States'', 389 U.S. 347 (1967) established what is known as the Reasonable Expectation of Privacy Test to determine the applicability of the Fourth Amendment in a given situation. The test was not noted by the majority, but instead it was articulated by the concurring opinion of Justice Harlan. Under this test, 1) a person must exhibit an "actual (subjective) expectation of privacy" and 2) "the expectation
ustbe one that society is prepared to recognize as 'reasonable'".
Privacy Act of 1974
Inspired by the
Watergate scandal
The Watergate scandal was a major political scandal in the United States involving the Presidency of Richard Nixon, administration of President Richard Nixon. The scandal began in 1972 and ultimately led to Resignation of Richard Nixon, Nix ...
, the
United States Congress
The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
enacted the Privacy Act of 1974 just four months after the resignation of then President
Richard Nixon
Richard Milhous Nixon (January 9, 1913April 22, 1994) was the 37th president of the United States, serving from 1969 until Resignation of Richard Nixon, his resignation in 1974. A member of the Republican Party (United States), Republican ...
. In passing this Act, Congress found that "the privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies" and that "the increasing use of computers and sophisticated information technology, while essential to the efficient operations of the Government, has greatly magnified the harm to individual privacy that can occur from any collection, maintenance, use, or dissemination of personal information".
Foreign Intelligence Surveillance Act of 1978
Codified at 50 U.S.C. §§ 1801–1811, this act establishes standards and procedures for use of electronic surveillance to collect "foreign intelligence" within the United States. §1804(a)(7)(B). FISA overrides the Electronic Communications Privacy Act during investigations when foreign intelligence is "a significant purpose" of said investigation. (a)(7)(B) and §1823(a)(7)(B). Another interesting result of FISA, is the creation of the Foreign Intelligence Surveillance Court (FISC). All FISA orders are reviewed by this special court of federal district judges. The FISC meets in secret, with all proceedings usually also held from both the public eye and those targets of the desired surveillance.
(1986) Electronic Communication Privacy Act
The ECPA represents an effort by the United States Congress to modernize federal wiretap law. The ECPA amended Title III (see:
Omnibus Crime Control and Safe Streets Act of 1968) and included two new acts in response to developing computer technology and communication networks. Thus the ECPA in the domestic venue into three parts: 1) Wiretap Act, 2) Stored Communications Act, and 3) The Pen Register Act.
::*Types of Communication
::** Wire Communication: Any communication containing the human voice that travels at some point across a wired medium such as radio, satellite or cable.
::** Oral Communication:
::** Electronic Communication
::# The Wiretap Act: For Information see
Wiretap Act
::# The Stored Communications Act: For information see
Stored Communications Act
::# The Pen Register Act: For information see
Pen Register Act
(1994) Driver's Privacy Protection Act
The DPPA was passed in response to states selling motor vehicle records to private industry. These records contained personal information such as name, address, phone number, SSN, medical information, height, weight, gender, eye color, photograph and date of birth. In 1994, Congress passed the Driver's Privacy Protection (DPPA), 18 U.S.C. §§ 2721–2725, to cease this activity.
(1999) Gramm-Leach-Bliley Act
This act authorizes widespread sharing of personal information by financial institutions such as banks, insurers, and investment companies. The GLBA permits sharing of personal information between companies joined or affiliated as well as those companies unaffiliated. To protect privacy, the act requires a variety of agencies such as the SEC, FTC, etc. to establish "appropriate standards for the financial institutions subject to their jurisdiction" to "insure security and confidentiality of customer records and information" and "protect against unauthorized access" to this information.
(2002) Homeland Security Act
Passed by Congress in 2002, the Homeland Security Act, , consolidated 22 federal agencies into what is commonly known today as the Department of Homeland Security (DHS). The HSA, also created a Privacy Office under the DoHS. The Secretary of Homeland Security must "appoint a senior official to assume primary responsibility for privacy policy." This privacy official's responsibilities include but are not limited to: ensuring compliance with the Privacy Act of 1974, evaluating "legislative and regulatory proposals involving the collection, use, and disclosure of personal information by the Federal Government", while also preparing an annual report to Congress.
(2004) Intelligence Reform and Terrorism Prevention Act
This Act mandates that intelligence be "provided in its most shareable form" that the heads of intelligence agencies and federal departments "promote a culture of information sharing." The IRTPA also sought to establish protection of privacy and civil liberties by setting up a five-member Privacy and Civil Liberties Oversight Board. This Board offers advice to both the President of the United States and the entire executive branch of the Federal Government concerning its actions to ensure that the branch's information sharing policies are adequately protecting privacy and civil liberties.
See also
*
Berkman Center for Internet & Society
The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
* ''
Bernstein v. United States'' and ''
Junger v. Daley'' – on free speech protection of software
*
Computer forensics
*
Computer crime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exp ...
*
Cultural lag
*
Data localization
*
Digital Millennium Copyright Act (DMCA)
*
Electronic Communications Privacy Act
*
Export of cryptography
*
Glossary of legal terms in technology
*
Software patent debate
The software patent debate is the argument about the extent to which, as a matter of public policy, it should be possible to patent software and computer-implemented inventions. Policy debate on software patents has been active for years. The op ...
* ''
Universal v. Reimerdes'' – test of DMCA
* ''
Ouellette v. Viacom International Inc.'' (DMCA and ADA)
*
Wassenaar Arrangement
* ''
Doe v. 2themart.com Inc.'' – First Amendment right to speak anonymously
* ''
United States v. Ivanov'' – Applying United States cyber-law to a foreign national operating outside the US
Centers and groups for the study of cyberlaw and related areas
*
Berkman Center for Internet and Society at
Harvard Law School
Harvard Law School (HLS) is the law school of Harvard University, a Private university, private research university in Cambridge, Massachusetts. Founded in 1817, Harvard Law School is the oldest law school in continuous operation in the United ...
*
Centre for Internet and Society, in Bangalore, India.
*
Institute for Information, Telecommunication and Media Law in Münster, Germany
*
Institute of Space and Telecommunications Law (IDEST) at
University of Paris-Sud
Paris-Sud University (), also known as the University of Paris — XI (or as the Orsay Faculty of Sciences, University of Paris before 1971), was a French research university distributed among several campuses in the southern suburbs of Paris, ...
, Master's degree in Space Activities and Telecommunications Law
*
Norwegian Research Center for Computers and Law
*
Stanford Center for Internet and Society
The Center for Internet and Society (CIS) is a public interest technology law and policy program founded in 2000 by Lawrence Lessig at Stanford Law School and a part of Law, Science and Technology Program at Stanford Law School. CIS brings toget ...
, at
Stanford Law School
Stanford Law School (SLS) is the Law school in the United States, law school of Stanford University, a Private university, private research university near Palo Alto, California. Established in 1893, Stanford Law had an acceptance rate of 6.28% i ...
Topics related to cyberlaw
*
Copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
, especially the
Digital Millennium Copyright Act in the United States, and similar laws in other countries
*
Cyber defamation law
*
Digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
*
Intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
*
Internet censorship
*
Stop Online Piracy Act
*
Spamming
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose (especially phishing), or si ...
Notes
References
*A Murray, ''Information Technology Law: The Law and Society'' (3rd edn 2016)
*''
Code and Other Laws of Cyberspace,'' ''
The Future of Ideas,'' and ''
Free Culture'' by
Lawrence Lessig
Lester Lawrence "Larry" Lessig III (born June 3, 1961) is an American legal scholar and political activist. He is the Roy L. Furman Professor of Law at Harvard Law School and the former director of the Edmond J. Safra Center for Ethics at Harvar ...
*''
Cyber Rights'' by
Mike Godwin
*''E-Commerce and Internet Law: Treatise with Forms 2d edition,'' by
Ian C. Ballon
External links
Information Technology Law India – Bare ActInternet Law Resources
{{Authority control
Computer law
Thai legislation
de:Rechtsinformatik