1 / 12

A Course Summary

A Course Summary. Or, a coarse summary. Topics Covered:. Internet Structure and Governance Theories of Internet Regulation Jurisdiction Domain Names Privacy Encryption Ecrime Content Regulation Consumer Transactions. Internet Structure and Governance. Packet Switching Network

sonora
Download Presentation

A Course Summary

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Course Summary Or, a coarse summary

  2. Topics Covered: • Internet Structure and Governance • Theories of Internet Regulation • Jurisdiction • Domain Names • Privacy • Encryption • Ecrime • Content Regulation • Consumer Transactions

  3. Internet Structure and Governance • Packet Switching Network • Protocols, Code and Hardware • Standards bodiesIEEE W3C

  4. Theories of Regulation • John Perry Barlow“Internet Utopian” • Laurence Lessig“Code and other Laws”

  5. Jurisdiction • Private International Law“Conflict of Laws” • Differences in Contract, Tort etc • Gutnick Defamation TrialIs the Internet different?

  6. Domain Names • Heirachical DNS System • ICANN control, auDA control • Dispute Resolution policies • Court decisions Trade mark law?

  7. Privacy • State and Federal Legislation • Privacy Principles • Privacy Commissioner • Co-Regulation

  8. Encryption • Old symetric system, new public key asymetric system • Digital Certificates and PKI • Gateway and Identrus systems • What legal responsibilities and liabilities do players in a PKI system have?

  9. Electronic Transactions Acts • Technology Neutral • Functional Equivalence • Defines: • Signing • Writing • Keeping records • Jurisdiction

  10. E-Crime • Amendments to Criminal Code (Cth) and Crimes Act (NSW) covering hacking etc • Other serious e-crimes covered by other legislation, eg Cyber-stalking, Prohibited Content etc

  11. Content Regulation • Co-Regulatory Scheme • ABA Take-Down notices • X and RC material • R material without access restriction

  12. Consumer Transactions • Mistaken pricing structures • Trust Enhancing techniques • Internet payment mechanisms • Codes of conduct

More Related