Internet Privacy Act
   HOME

TheInfoList



OR:

The Internet Privacy Act is a non-existent and fictitious
law Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior,Robertson, ''Crimes against humanity'', 90. with its precise definition a matter of longstanding debate. It has been vario ...
cited by websites that conduct illegal activities in order to deter organizations that look to prosecute such activities. Networks which share music, films and software, for example, often display the fictitious act in an attempt to protect themselves from arrest by being able to claim entrapment in court. In the statement, websites claim that it prevents organizations which may be associated with anti-P2P or government organizations from entering the site or network as it would breach the terms of the act. Internet Privacy Act 431.322.12
According to the statement which many sites display, it was signed by
Bill Clinton William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
in 1995, but in reality he never signed the act as it never existed. Using this and other such "disclaimers" would actually make it easier for such a site to be found via the major search engines. The text notice on these sites are usually as follows, but can vary:


History of usage

The false act was first displayed during the late 1990s on many sites that engaged in illegal activities, such as the promotion and distribution of "knock-off" ( counterfeit) materials. Over time, the paragraph was picked up and copied and pasted with the exception of a few minor variations to match the content of the containing website. An example is provided below: Through the turn of the century, thousands of web,
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
, and other sites used the statement in an attempt to deter authorities. It is sometimes still seen in modern file sharing networks and protocols. Other reasons for it might have been to reassure the visiting public that their actions and data would be somehow protected.


References

{{Refend File sharing Urban legends Copyright infringement Fictional laws