Hacking: Rights, Hacktivism, and Counterhacking

Size: px
Start display at page:

Download "Hacking: Rights, Hacktivism, and Counterhacking"

Transcription

1 Hacking: Rights, Hacktivism, and Counterhacking Kenneth Einar Himma acknowledges that hacker once had a positive connotation, but reserves the term hacking to refer to acts in which one person gains unauthorized entry to the computers of another person (191-2) Himma s views (in some contrast to Wilson s!) are a good deal more skeptical about what, if anything, might morally justify hacking. 1

2 The Prima Facie Case Defined as a species of unauthorized entry, it seems obvious that hacking is prima facie morally wrong: Hacking is analogous to trespass; trespass onto physical property is wrong (whether or not it gives rise to harm) since it violates the owner s property rights; similarly, digital trespass is wrong since it violates the computer owner s right to exclude others from the use of her property. But, the trespass analogy is imperfect 1. Not all trespass is morally wrong; infringement of property rights can sometimes be justified (e.g., venturing onto private property in order to apprehend a fleeing murderer). So, hacking could be morally justified if it brings about a good that outweighs the evil that it creates. 2. Hacking does not (except trivially e.g., by consuming electricity, bandwidth, computing cycles) involve the kind of physical intrusion associated with trespass. 2

3 So perhaps we can supplement property rights considerations with privacy rights considerations: My computer is not only my (physical) property, it is also a space in which I have a legitimate expectation of privacy. a private space in which I may store sensitive information. Unauthorized access intrudes on this expectation. But privacy rights too hold only prima facie (e.g., intrusion into a terrorist s computer to prevent an imminent attack) Benign Hacking: Social Benefits So infringement of rights can sometimes justified; the onus presumably then lies with the hacker to show that specific instances of hacking are justified and so morally permissible. Can benign motivations based on social benefits, such as testing systems for security or drawing attention to security flaws ( Wilson s research and security hackers ) serve to justify hacking? 3

4 Himma: No, since these social benefits could be achieved without infringing property or privacy rights. More importantly: If privacy and property are genuine moral rights, then we cannot justify their infringement simply on the grounds that doing so would be beneficial: rights trump consequences (Dworkin) This, I d say, approaches question-begging. Compare stealing $1B from Bill Gates (in order to do good) with taxing him the same amount (in order to support welfare rights). Benign Hacking: Preventing Waste Himma: This is at least the right kind of argument (in that it seeks to identify a principle [i.e., a countervailing right] that could justify infringing property/privacy rights) But again, according to Himma, the argument fails; essentially on the same grounds as above: A property right is a right to exclude. The fact that I m not using my bike doesn t justify you borrowing it; ditto when it comes to my computing resources or software. 4

5 Benign Hacking: Free Flow of Content Perhaps a right to freedom of expression is strong/important enough to justify infringement of property/privacy rights (and so to justify hacking)? Himma: If a right to freedom of expression is held to entail that therer can be no legitimate restrictions on the free flow of content, then a) the very idea of privacy rights becomes untenable and b) this would be inconsistent with the idea of moral IPRs (e.g., copyright) (I m not sure that even the most rabid defender of an IP anarchist view would make a claim quite that strong) Still, Himma larger point is worth considering: Just because some has a right (e.g., to freedom of expression), this does not entail that she can do whatever she likes to exercise that right. Assume I have a right to certain information on your computer. This does not justify me breaking into your home to access this information. This again may verge onto question-begging, however: Never? Not if, say, I m your parent or a professional with whom you have a fiduciary relationship? This would still be an infringement of property rights, but acting to exercise a right to information might still at least be mitigating. 5

6 Hactivism & Civil Disobedience As we ve seen, some benign hacking (e.g., a DoS directed toward a wicked organization) is purported to be justified on political grounds. So perhaps civil disobedience can provide a justification for at least some forms/instances of hacking? Civil Disobedience (CD) 1. open 2. knowing 3. commission of some nonviolent act 4. that violates law L 5. for the expressive purpose of protesting or calling attention to the injustice of L, some other law, or the legal system as a whole (195, approximately in keeping with Rawls, 1971) 6

7 Himma: CD involves expression but it should not be adequated to expression; it is primarily conduct rather than a pure speech act (and so demands a higher standard of moral justification) In a decent democratic society, justified CD will presumably be relatively rare, since citizens have other means available to express their views (197). Nonetheless, CD is at least sometimes morally justified. Hacktivism vs. Cyberterrorism In justifying CD, actors should consider that there are moral limits on the costs one can impose on innocent third parties on the strength of even a laudable motivation (198, emphasis added). Defacement of a web site will presumably cause only relatively minor harm to third parties; a sustained DoS attack (say, on a private commercial web site) may cause very considerable harm. (Though we might want to ask whether third parties are always necessarily innocent third parties.) 7

8 Also: Himma (and others) assert that agents must be willing to accept responsibility for CD as a necessary (but not sufficient) condition for justification. Acting anonymously, clandestinely, shades into cyberterrorism and/or ordinary vandalism. Proper hactivism should show itself to be ethically motivated. Accepting responsibility as a group (as terrorists often do), Himma suggests, is not sufficient, since it allows the individual hacktivist to avoid facing the consequences of her action. Also: the motivating agenda behind electronic CD may be less transparent in cases of ordinary CD (204). A DDos against Amazon could mean many things, not all of them appropriately political. Moreover, even when the motivating agenda is clear, it may be morally inadequate or unacceptable. See his discussion of the Hacker Ethic and MilwOrm (205-6) So, in sum, hacking-as-cd might be justifiable, but most actual CD hackers fail to offer an adequate justification. 8

9 Counterhacking Is active response either cause harm to hackers or identify them morally justified? 1. Digitally-based (as opposed to, e.g., physical assault) 2. Implemented after intrusion has been detected, for investigative, defensive or punitive purposes 3. Non-cooperative implemented without the consent of at least one of the parties involved or affected 4. Have causal impacts on remote systems Nonstarters: Retaliation and Punishment Retaliation is morally wrong in that is motivated simply by a desire to even the score, for revenge, and is not responsive to justice or desert. In a society with a functioning legitimate government it is morally impermissible for private persons to punish those powers are monopolized by governments. (I.e., Himma is presuming the context of judicial punishment if, e.g., parents have the moral prerogative to punish their children, this would be an important exception to his assertion.) 9

10 The Defense Principle We general accept that persons have a moral right to use force in self-defence, provided that the force used is i) proportional, ii) necessary, and iii) directed only toward the immediate source of the threat. In view of iii) the Defense Principle will not justify force used against an innocent bystander (i.e., third party) The Necessity Principle It is also (fairly) commonly accepted that it is morally acceptable to infringe (as opposed to violate) rights in order to bring about a significantly greater good. This will be the case when i) the value of the right being infringed < the value of the good being secured and ii) there is no other way to bring about the good being secured except through infringement of the right. The Necessity Principle could justify infringement of the rights of innocent bystanders (e.g., shoving a bystander out of the way in order to save a life) 10

11 Aggressive (i.e., harm directing) responses will generally be ruled by out the Defense Principle in that they are a) not necessary and b) will (often) involve harm to third parties (e.g., owners of malware-infected computers used in DDoS attack) They will also generally be ruled by the Necessity Principle in that the unpredictable harms created by an aggressive response may well outweigh the moral good that the response intended to produce. Benign responses intended to identify an attacker (e.g., tracebacks) cannot be justified by the Defense Principle (since they do not defend against attacks), but might be justified under the Necessity principle (e.g., to secure the good of brining wrongdoers to justice ) But even benign responses can potentially infringe the rights of innocent third parties (e.g., they may identify the wrong party, in the case of a sophisticated, multi-layer attack and, in any case, involve accessing the third party s computer with her permission). 11

12 Inadequacy of Law Enforcement Perhaps active response can be justified on the grounds that i) digital intrusion is the sort of thing that the state ought to protect us from and ii) the state is doing an inadequate job of it, so, iii) private parties are entitled to use active measures to protect themselves. ii) is likely correct: law-enforcement agencies typically lack sufficient resources for digital crime investigations, which both highly labour-intensive and may involve jurisdictional complexities. Himma: Nonetheless, this argument falls short. It assumes that private parties will be able to do for themselves what the state has failed to do, but this is usually just factually in correct. Moreover, aggressive countermeasures are not only unlikely to succeed in protecting against attack, they may simply result in escalation. 12

Ethics in the age of Informatics, Big Data and AI

Ethics in the age of Informatics, Big Data and AI Ethics in the age of Informatics, Big Data and AI Professor dr. May Thorseth, Dept. of Philosophy and Religious Studies, NTNU Director of Programme for Applied Ethics, NTNU Email: may.thorseth@ntnu.no

More information

Criminal Justice Without Moral Responsibility: Addressing Problems with Consequentialism Dane Shade Hannum

Criminal Justice Without Moral Responsibility: Addressing Problems with Consequentialism Dane Shade Hannum 51 Criminal Justice Without Moral Responsibility: Addressing Problems with Consequentialism Dane Shade Hannum Abstract: This paper grants the hard determinist position that moral responsibility is not

More information

Consistency with the New Zealand Bill of Rights Act 1990: Conservation (Infringement System) Bill

Consistency with the New Zealand Bill of Rights Act 1990: Conservation (Infringement System) Bill LEGAL ADVICE LPA 01 01 21 1 February 2017 Hon Christopher Finlayson QC, Attorney-General Consistency with the New Zealand Bill of Rights Act 1990: Conservation (Infringement System) Bill Purpose 1. We

More information

Elliston and Martin: Whistleblowing

Elliston and Martin: Whistleblowing Elliston and Martin: Whistleblowing Elliston: Whistleblowing and Anonymity With Michalos and Poff we ve been looking at general considerations about the moral independence of employees. In particular,

More information

YMCA NSW Whistle Blower Policy

YMCA NSW Whistle Blower Policy 1. Document control Overview A whistle-blower is any employee, volunteer, contractor or people associated with the YMCA NSW that detects wrongdoing, or has reasonable grounds for suspecting wrongdoing

More information

TORTS SPECIFIC TORTS NEGLIGENCE

TORTS SPECIFIC TORTS NEGLIGENCE TORTS A tort is a private civil wrong. It is prosecuted by the individual or entity that was wronged against the wrongdoer. One aim of tort law is to provide compensation for injuries. The goal of the

More information

The Limits of Self-Defense

The Limits of Self-Defense The Limits of Self-Defense Jeff McMahan Necessity Does not Require the Infliction of the Least Harm 1 According to the traditional understanding of necessity in self-defense, a defensive act is unnecessary,

More information

CCPA Analysis Of Bill C-36 An Act To Combat Terrorism

CCPA Analysis Of Bill C-36 An Act To Combat Terrorism research analysis solutions CCPA Analysis Of Bill C-36 An Act To Combat Terrorism INTRODUCTION The Canadian government has a responsibility to protect Canadians from actual and potential human rights abuses

More information

Combatants, non-combatants and opportunistic killings. Helen Frowe Stockholm University

Combatants, non-combatants and opportunistic killings. Helen Frowe Stockholm University Combatants, non-combatants and opportunistic killings Helen Frowe Stockholm University Introduction In my work on just war theory, I adopt a reductive individualist approach to war. This approach is reductivist

More information

Hacktivism and the Future of Political Participation. A thesis presented by. Alexandra Whitney Samuel

Hacktivism and the Future of Political Participation. A thesis presented by. Alexandra Whitney Samuel A thesis presented by Alexandra Whitney Samuel to the Department of Government in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Political Science Harvard

More information

Kenneth Einar Himma Winter 2014 (Tuesday & Thursday, Room 441, 1:30 p.m. 3:20 p.m. Friday, April 12, April 26, 1:30 p.m. 10:20 p.m.

Kenneth Einar Himma Winter 2014 (Tuesday & Thursday, Room 441, 1:30 p.m. 3:20 p.m. Friday, April 12, April 26, 1:30 p.m. 10:20 p.m. PHILOSOPHY OF LAW Law E519 Kenneth Einar Himma Winter 2014 (Tuesday & Thursday, Room 441, 1:30 p.m. 3:20 p.m. Friday, April 12, April 26, 1:30 p.m. 10:20 p.m.) Office Hours and Contact Information Office:

More information

Lecture 7 Act and Rule Utilitarianism. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Lecture 7 Act and Rule Utilitarianism. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Lecture 7 Act and Rule Utilitarianism Participation Quiz Is she spinning clockwise (A) or counter-clockwise (B)? Imperfect Duties We asked last time: what distinguishes an imperfect duty from something

More information

Directors' Duties in Guernsey

Directors' Duties in Guernsey Directors' Duties in Guernsey March 2018 1. OVERVIEW 1.1 This note provides a brief synopsis of the common law duties owed by directors of companies ("companies") incorporated in the Island of Guernsey

More information

Social Studies Power, Active Citizenship, and Change. Outcome 12

Social Studies Power, Active Citizenship, and Change. Outcome 12 Social Studies 1211 Power, Active Citizenship, and Change Outcome 12 DOING NOTHING If you witnessed a stranger in danger, would you help him or her? Why? Kitty Genovese, a young women in New York City,

More information

U.S. Department of Justice. Criminal Division 13-CR-B. September 18,2013

U.S. Department of Justice. Criminal Division 13-CR-B. September 18,2013 U.S. Department of Justice Criminal Division 13-CR-B Assistant Attorney General Washington, D.C. 20530 September 18,2013 The Honorable Reena Raggi Chair, Advisory Committee on the Criminal Rules 704S United

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA MOTOWN RECORD COMPANY, L.P. a California limited partnership; UMG RECORDINGS, INC., a Delaware corporation; SONY BMG MUSIC ENTERTAINMENT, a

More information

IN THE DISTRICT COURT OF JOHNSON COUNTY, KANSAS CRIMINAL COURT DEPARTMENT. No. 14CR853 Div. 17 STATE S MOTION IN LIMINE REGARDING NECESSITY DEFENSE

IN THE DISTRICT COURT OF JOHNSON COUNTY, KANSAS CRIMINAL COURT DEPARTMENT. No. 14CR853 Div. 17 STATE S MOTION IN LIMINE REGARDING NECESSITY DEFENSE IN THE DISTRICT COURT OF JOHNSON COUNTY, KANSAS CRIMINAL COURT DEPARTMENT STATE OF KANSAS, Plaintiff, VS. FRAZIER GLENN CROSS, JR., Defendant. No. 14CR853 Div. 17 STATE S MOTION IN LIMINE REGARDING NECESSITY

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

CSE 3482 Introduction to Computer Security. Law & Ethics

CSE 3482 Introduction to Computer Security. Law & Ethics CSE 3482 Introduction to Computer Security Law & Ethics Instructor: N. Vlajic, Winter 2017 Learning Objectives Upon completion of this material, you should be able to: Differentiate between law and ethics.

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

D R A F T : N O T F O R D I S T R I B U T I O N

D R A F T : N O T F O R D I S T R I B U T I O N D R A F T : N O T F O R D I S T R I B U T I O N Internet Anonymity, Reputation, and Freedom of Speech: the US Legal Landscape John N. Gathegi School of Information, University of South Florida Introduction

More information

California Bar Examination

California Bar Examination California Bar Examination Essay Question: Remedies And Selected Answers The Orahte Group is NOT affiliated with The State Bar of California PRACTICE PACKET p.1 Question Paul owns a 50-acre lot in the

More information

Ethics Handout 18 Rawls, Classical Utilitarianism and Nagel, Equality

Ethics Handout 18 Rawls, Classical Utilitarianism and Nagel, Equality 24.231 Ethics Handout 18 Rawls, Classical Utilitarianism and Nagel, Equality The Utilitarian Principle of Distribution: Society is rightly ordered, and therefore just, when its major institutions are arranged

More information

Ethics of Information Security

Ethics of Information Security Ethics of Information Security Sara Afshar Professional Ethics Course MRTC/Mälardalen University 10 May 2016 1 Ethics Ø Distinguishing right from wrong, and good from bad Ø It analyzes the morality of

More information

CED: An Overview of the Law

CED: An Overview of the Law Torts BY: Edwin Durbin, B.Comm., LL.B., LL.M. of the Ontario Bar Part II Principles of Liability Click HERE to access the CED and the Canadian Abridgment titles for this excerpt on Westlaw Canada II.1.(a):

More information

Responsible Victims and (Partly) Justified Offenders

Responsible Victims and (Partly) Justified Offenders Responsible Victims and (Partly) Justified Offenders R. A. Duff VERA BERGELSON, VICTIMS RIGHTS AND VICTIMS WRONGS: COMPARATIVE LIABILITY IN CRIMINAL LAW (Stanford University Press 2009) If you negligently

More information

Hacking and the Law. John MacKenzie

Hacking and the Law. John MacKenzie Hacking and the Law John MacKenzie john.mackenzie@pinsentmasons.com Introduction About Pinsent Masons Hacking The Law Individual rights and responsibilities Employee rights and responsibilities Directors

More information

Damages in Tort 6. Damages in Contract 18. Restitution 27. Rescission 32. Specific Performance 38. Account of Profits 40.

Damages in Tort 6. Damages in Contract 18. Restitution 27. Rescission 32. Specific Performance 38. Account of Profits 40. LW401 REMEDIES Damages in Tort 6 Damages in Contract 18 Restitution 27 Rescission 32 Specific Performance 38 Account of Profits 40 Injunctions 43 Mareva Orders and Anton Piller Orders 49 Rectification

More information

STATE OF KANSAS v. ANTHONY A. ALLEN. No. 74,639 SUPREME COURT OF KANSAS. 260 Kan. 107 (1996)

STATE OF KANSAS v. ANTHONY A. ALLEN. No. 74,639 SUPREME COURT OF KANSAS. 260 Kan. 107 (1996) STATE OF KANSAS v. ANTHONY A. ALLEN No. 74,639 SUPREME COURT OF KANSAS 260 Kan. 107 (1996) LARSON, J.: In this first impression case, we are presented with the question of whether a person's telephonic

More information

THE IRAQ WAR OF 2003: A RESPONSE TO GABRIEL PALMER-FERNANDEZ

THE IRAQ WAR OF 2003: A RESPONSE TO GABRIEL PALMER-FERNANDEZ THE IRAQ WAR OF 2003: A RESPONSE TO GABRIEL PALMER-FERNANDEZ Judith Lichtenberg University of Maryland Was the United States justified in invading Iraq? We can find some guidance in seeking to answer this

More information

Civil Disobedience and the Duty to Obey the Law: A Critical Assessment of Lefkowitz's View

Civil Disobedience and the Duty to Obey the Law: A Critical Assessment of Lefkowitz's View Georgia State University ScholarWorks @ Georgia State University Philosophy Theses Department of Philosophy 8-7-2018 Civil Disobedience and the Duty to Obey the Law: A Critical Assessment of Lefkowitz's

More information

Immigration. Our individual rights are (in general) much more secure and better protected

Immigration. Our individual rights are (in general) much more secure and better protected Immigration Some Stylized Facts People in the developed world (e.g., the global North ) are (in general) much better off than people who live in less-developed nation-states. Our individual rights are

More information

KNOWLEDGE GURU. Player s License Agreement

KNOWLEDGE GURU. Player s License Agreement KNOWLEDGE GURU Player s License Agreement Please read this entire document carefully, because it will become a binding agreement if you accept it. Bottom Line Performance Incorporated and its affiliates

More information

THE PERSONAL DATA PROTECTION BILL, 2018: A SUMMARY

THE PERSONAL DATA PROTECTION BILL, 2018: A SUMMARY July 30, 2018 THE PERSONAL DATA PROTECTION BILL, 2018: A SUMMARY The report issued by the Committee of Experts under the Chairmanship of Justice B.N. Srikrishna (Report) 1 and the draft of the Personal

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

Data protection and journalism: a guide for the media

Data protection and journalism: a guide for the media Data protection Data protection and journalism: a guide for the media DRAFT FOR CONSULTATION * Contents Foreword 3 About this guide 4 Purpose of the guide 4 Who the guide is for 5 Status of the guide 5

More information

Unit 1 Research Project. Eddie S. Jackson. Kaplan University. IT590 Legal and Ethical Issues in IT. Professor Linnea Hall, JD, MSBA

Unit 1 Research Project. Eddie S. Jackson. Kaplan University. IT590 Legal and Ethical Issues in IT. Professor Linnea Hall, JD, MSBA Running head: UNIT 1 RESEARCH PROJECT 1 Unit 1 Research Project Eddie S. Jackson Kaplan University IT590 Legal and Ethical Issues in IT Professor Linnea Hall, JD, MSBA 12/23/2014 UNIT 1 RESEARCH PROJECT

More information

Justifying Uncivil Disobedience. Ten-Herng Lai PhD Student Australian National University

Justifying Uncivil Disobedience. Ten-Herng Lai PhD Student Australian National University JUSTIFYING UNCIVIL DISOBEDIENCE Ten-Herng Lai 1 Justifying Uncivil Disobedience Ten-Herng Lai PhD Student Australian National University ten-herng.lai@anu.edu.au Prepublication draft. Forthcoming in Oxford

More information

Global Economic Crime Survey Italian Addendum 2016

Global Economic Crime Survey Italian Addendum 2016 Global Economic Crime Survey Italian Addendum 2016 www.pwc.com/it 2016: Economic crime evolution PwC's Economic Crime Survey 2016 shows a significant awareness of companies on issues relating to economic

More information

The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State

The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State House of Lords Select Committee on the Constitution June 2007 1. How has the range and

More information

Legal Ethics of Metadata or Mining for Data About Data

Legal Ethics of Metadata or Mining for Data About Data Legal Ethics of Metadata or Mining for Data About Data Peter L. Ostermiller Attorney at Law 239 South Fifth Street Suite 1800 Louisville, KY 40202 peterlo@ploesq.com www.ploesq.com Overview What is Metadata?

More information

COURT OF APPEAL FOR ONTARIO

COURT OF APPEAL FOR ONTARIO BETWEEN COURT OF APPEAL FOR ONTARIO CITATION: Downer v. The Personal Insurance Company, 2012 ONCA 302 Ryan M. Naimark, for the appellant Lang, LaForme JJ.A. and Pattillo J. (ad hoc) John W. Bruggeman,

More information

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at Mind Association Liberalism and Nozick's `Minimal State' Author(s): Geoffrey Sampson Source: Mind, New Series, Vol. 87, No. 345 (Jan., 1978), pp. 93-97 Published by: Oxford University Press on behalf of

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA Civil Action No. 5:08-CV D

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA Civil Action No. 5:08-CV D IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA Civil Action No. 5:08-CV-00131-D SONY BMG MUSIC ENTERTAINMENT, Inc., UMG RECORDINGS Inc., ELECTRA ENTERTAINMENT GROUP, Inc.,

More information

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Northern Territory Police Submission to the Senate Legal and Constitutional Affairs Committee March 2014

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

ORGANISATION OF EASTERN CARIBBEAN STATES

ORGANISATION OF EASTERN CARIBBEAN STATES ORGANISATION OF EASTERN CARIBBEAN STATES ELECTRONIC TRANSACTIONS BILL (FIRST DRAFT) Prepared by: LEGISLATIVE DRAFTING FACILITY LEGAL UNIT May, 2004 JUSTIFICATION FOR HARMONIZED ELECTRONIC TRANSACTIONS

More information

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995 DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

More information

Jus in Bello through the Lens of Individual Moral Responsibility: McMahan on Killing in War

Jus in Bello through the Lens of Individual Moral Responsibility: McMahan on Killing in War (2010) 1 Transnational Legal Theory 121 126 Jus in Bello through the Lens of Individual Moral Responsibility: McMahan on Killing in War David Lefkowitz * A review of Jeff McMahan, Killing in War (Oxford

More information

EDITORIAL POLICY GUIDANCE NOTE PRIVACY AND FACTUAL ENTERTAINMENT

EDITORIAL POLICY GUIDANCE NOTE PRIVACY AND FACTUAL ENTERTAINMENT EDITORIAL POLICY GUIDANCE NOTE PRIVACY AND FACTUAL ENTERTAINMENT (Last updated: October 2010) EDITORIAL GUIDELINES ISSUES This guidance note should be considered in conjunction with the following Editorial

More information

Chapter 1: Computer Forensics and Investigations as a Profession

Chapter 1: Computer Forensics and Investigations as a Profession Chapter 1: Computer Forensics and Investigations as a Profession Download Full Test Bank for guide to computer forensics and investigations 5th edition at https://getbooksolutions.com/download/test-bank-for-guide-to-computer-forensics-andinvestigations-5th-edition

More information

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses Chapter 6 Business Torts and Online Crimes and Torts Disparagement of Property Slander of Title Slander of Quality (Trade Libel) Defenses Disparagement of Property Disparagement of property occurs when

More information

LAWS1100 Final Exam Notes

LAWS1100 Final Exam Notes LAWS1100 Final Exam Notes Topic 4&5: Tort Law and Business (*very important) Relevant chapter: Ch.3 Applicable law: - Law of torts law of negligence (p.74) Torts (p.70) - The word tort meaning twisted

More information

How to Use Torts Tactically in Employment Litigation

How to Use Torts Tactically in Employment Litigation How to Use Torts Tactically in Employment Litigation Ty Hyderally, Esq. Hyderally & Associates, P.C. 33 Plymouth Street, Suite 202 Montclair, NJ 07042 tyh@employmentlit.com www.employmentlit.com O- (973)

More information

The Internet and the Tragedy of the Commons

The Internet and the Tragedy of the Commons The Internet and the Tragedy of the Commons Jan. 4, 2017 The expectation of anonymity online has become extreme. By George Friedman The tragedy of the commons is a concept developed by a British economist

More information

Borland v. Sanders Lead Co. 369 So. 2d 523 (Ala. 1979) Case Analysis Questions

Borland v. Sanders Lead Co. 369 So. 2d 523 (Ala. 1979) Case Analysis Questions Borland v. Sanders Lead Co. 369 So. 2d 523 (Ala. 1979) Case Analysis Questions CA Q. 1 What court decided this case? The Supreme Court of Alabama. CA Q. 2 What are the facts in this case? The Defendant

More information

NC General Statutes - Chapter 36F 1

NC General Statutes - Chapter 36F 1 Chapter 36F. Revised Uniform Fiduciary Access to Digital Assets Act. 36F-1. Short title. This Chapter may be cited as the Revised Uniform Fiduciary Access to Digital Assets Act. (2016-53, s. 1.) 36F-2.

More information

Varieties of Contingent Pacifism in War

Varieties of Contingent Pacifism in War Varieties of Contingent Pacifism in War Saba Bazargan 1. Introduction According to the most radical prohibition against war, there are no circumstances in which it is morally permissible to wage a war.

More information

FILED to the ALPR data sought in this case. APR

FILED to the ALPR data sought in this case. APR ELECTRONIC FRONTIER FOUNDATION Protecting Rights and Promoting Freedom on the Electronic Frontier April 17, 2017 Honorable Chief Justice Tani Gorre Cantil-Sakauye and Honorable Associate Justices California

More information

REVISOR PMM/NB A

REVISOR PMM/NB A 1.1 Senator... moves to amend S.F. No. 893 as follows: 1.2 Delete everything after the enacting clause and insert: 1.3 "ARTICLE 1 1.4 REVISED UNIFORM LAW ON NOTARIAL ACTS 1.5 Section 1. [358.51] SHORT

More information

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE Whereas, the City Council finds it is essential to have an informed public debate as early as possible about decisions related to surveillance technology;

More information

Phil 290, February 22, 2011 Christiano, The Constitution of Equality, Ch. 7

Phil 290, February 22, 2011 Christiano, The Constitution of Equality, Ch. 7 Phil 290, February 22, 2011 Christiano, The Constitution of Equality, Ch. 7 Limits to democratic authority: When the democratic assembly (positively) makes a decision that encroaches on: 1. democratic

More information

Free Speech on the Internet Jeremy D. Mishkin

Free Speech on the Internet Jeremy D. Mishkin Free Speech on the Internet 2019 Jeremy D. Mishkin jmishkin@mmwr.com Topics The limits on free speech: Defamation Crimes Fighting words Privacy IP Ethics for lawyers or, more interestingly Stacy Parks

More information

Oxford Handbooks Online

Oxford Handbooks Online Oxford Handbooks Online Proportionality and Necessity in Jus in Bello Jeff McMahan The Oxford Handbook of Ethics of War Edited by Seth Lazar and Helen Frowe Online Publication Date: Apr 2016 Subject: Philosophy,

More information

GUIDANCE FOR CASE EXAMINERS The purpose of this guidance 1. The General Optical Council (GOC) recognises that it is important that patients, registrants, professional and representative organisations,

More information

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry

@ On computers and other networks by the cyber criminals using authorized or unauthorized entry UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation

More information

Examinable excerpts of. Bail Act as at 30 September 2018 PART 1 PRELIMINARY

Examinable excerpts of. Bail Act as at 30 September 2018 PART 1 PRELIMINARY Examinable excerpts of Bail Act 1977 as at 30 September 2018 1A Purpose PART 1 PRELIMINARY The purpose of this Act is to provide a legislative framework for the making of decisions as to whether a person

More information

Damages Actions for Breach of the EC Antitrust Rules

Damages Actions for Breach of the EC Antitrust Rules European Commission DG Competition Unit A 5 Damages for breach of the antitrust rules B-1049 Brussels Stockholm, 14 July 2008 Damages Actions for Breach of the EC Antitrust Rules White Paper COM(2008)

More information

Mendocino Community Network Services Contract

Mendocino Community Network Services Contract Mendocino Community Network Services Contract This agreement (this Agreement ) by and between the individual or entity listed below in the signature block ( Subscriber ) and the Mendocino Community Network

More information

Q. What do the Law Commission and the Ministry of Justice recommend?

Q. What do the Law Commission and the Ministry of Justice recommend? Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government

More information

Introduction to Criminal Law

Introduction to Criminal Law Introduction to Criminal Law CHAPTER CONTENTS Introduction 2 Crimes versus Civil Wrongs 2 Types of Criminal Offences 3 General Principles of Criminal Law 4 Accessories and Parties to Crimes 5 Attempted

More information

Litigation Options For Post-Cyberattack 'Active Defense'

Litigation Options For Post-Cyberattack 'Active Defense' Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Litigation Options For Post-Cyberattack 'Active

More information

Submission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department

Submission of the. New South Wales Council for Civil Liberties. to the. Commonwealth Attorney-General s Department Submission of the New South Wales Council for Civil Liberties to the Commonwealth Attorney-General s Department on Australia s proposed accession to the Council of Europe Convention on Cybercrime Authors:

More information

1. The physical element of a crime is the a. mens rea b. actus reus c. offence d. intention

1. The physical element of a crime is the a. mens rea b. actus reus c. offence d. intention 1) 11 CHOOSE THE BEST CHOICE AND MARK IT ON YOUR ANSWER SHEET. Part A: Fill in the Blanks 1. The physical element of a crime is the a. mens rea b. actus reus c. offence d. intention. A person is where

More information

Bradley v. American Smelting & Refining Co.,

Bradley v. American Smelting & Refining Co., Bradley v. American Smelting & Refining Co., 709 P. 2d 782 (Wash. 1984) Case Analysis Questions CA Q. 1 What court decided this case? The Washington Supreme Court. CA Q. 2 Is this an appeal from a lower

More information

The Honorable Reena Raggi Chair, Advisory Committee on Criminal Rules

The Honorable Reena Raggi Chair, Advisory Committee on Criminal Rules U.S. Department of Justice Criminal Division Office of the Assistant Attorney General Washington, D.C. 20530 December 22, 2014 MEMORANDUM TO: The Honorable Reena Raggi Chair, Advisory Committee on Criminal

More information

Discuss the George Zimmerman case. What defense he is expected to claim, and why may he qualify under the facts and circumstances?

Discuss the George Zimmerman case. What defense he is expected to claim, and why may he qualify under the facts and circumstances? CHAPTER 5 JUSTIFICATIONS AS DEFENSES CHAPTER OUTLINE I. Introduction II. Types of Defenses III. The Nature of Defenses IV. Justification as a Defense A. Necessity B. Self Defense C. Defense of Others D.

More information

BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures

BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures Version History and Document Approval Version History: Version Date Author Reason 1.0 31 st December 2017 Barry Wilson Document

More information

INFORMATION BULLETIN

INFORMATION BULLETIN INFORMATION BULLETIN #18 THE DUTY OF FAIR REPRESENTATION I. INTRODUCTION When a union becomes the exclusive bargaining agent for a unit of employees, it normally negotiates a collective agreement with

More information

WHISTLE BLOWING AND EMPLOYEE LOYALTY DUSKA

WHISTLE BLOWING AND EMPLOYEE LOYALTY DUSKA WHISTLE BLOWING AND EMPLOYEE LOYALTY DUSKA Industrial espionage, whistle blowing or professional responsibility it is another tactic for spreading disunity and creating conflict Bowie claims that whistle

More information

IN THE HIGH COURT OF NEW ZEALAND WELLINGTON REGISTRY CIV [2014] NZHC NICOLAS ALFRED HAGER Applicant

IN THE HIGH COURT OF NEW ZEALAND WELLINGTON REGISTRY CIV [2014] NZHC NICOLAS ALFRED HAGER Applicant IN THE HIGH COURT OF NEW ZEALAND WELLINGTON REGISTRY CIV-2014-485-011344 [2014] NZHC 3293 UNDER the Judicature Amendment Act 1972, Part 30 of the High Court Rules, the Bill of Rights Act 1990 and the Search

More information

9th Circ.'s Expansive Standard For Standing In Breach Case

9th Circ.'s Expansive Standard For Standing In Breach Case Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 9th Circ.'s Expansive Standard For Standing

More information

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)]

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)] H.R. 3162 The 2001 Anti-Terrorism Legislation [Pub. L. No. 107-56 (Oct. 26, 2001)] Abridged Provisions Relating to Obtaining Electronic Evidence and Others of Interest to State & Local Law Enforcers With

More information

MORAL responsibility for an unjust threat, or a threat of wrongful harm, is,

MORAL responsibility for an unjust threat, or a threat of wrongful harm, is, The Journal of Political Philosophy Debate: Justification and Liability in War* Jeff McMahan Philosophy, Rutgers University I. THE CHALLENGE MORAL responsibility for an unjust threat, or a threat of wrongful

More information

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Contact Persons Janet Anderson-Bidois Chief Legal Adviser New Zealand Human Rights Commission

More information

OFFICIAL POLICY. Policy Statement

OFFICIAL POLICY. Policy Statement OFFICIAL POLICY 11.5.1 COLLEGE OF CHARLESTON POLICY ON UNIFORM ELECTRONIC TRANSACTIONS ACT 7/26/2016 Policy Statement It is the Policy of the College to use and accept Electronic Records and Electronic

More information

Accountability Report Card Summary 2018 South Dakota. South Dakota has the worst state whistleblower laws in the country:

Accountability Report Card Summary 2018 South Dakota. South Dakota has the worst state whistleblower laws in the country: Accountability Report Card Summary 2018 South Dakota South Dakota has the worst state whistleblower laws in the country: Scoring 23 out of a possible 100; Ranking 51 st out of 51 (50 states and the District

More information

Corporate Litigation: Standing to Bring Consumer Data Breach Claims

Corporate Litigation: Standing to Bring Consumer Data Breach Claims Corporate Litigation: Standing to Bring Consumer Data Breach Claims Joseph M. McLaughlin * Simpson Thacher & Bartlett LLP April 14, 2015 Security experts say that there are two types of companies in the

More information

IC ARTICLE 39. REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT

IC ARTICLE 39. REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT IC 32-39 ARTICLE 39. REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT IC 32-39-1 Chapter 1. Application and Definitions IC 32-39-1-1 Applicability of article Sec. 1. (a) This article applies to the

More information

Rawls versus the Anarchist: Justice and Legitimacy

Rawls versus the Anarchist: Justice and Legitimacy Rawls versus the Anarchist: Justice and Legitimacy Walter E. Schaller Texas Tech University APA Central Division April 2005 Section 1: The Anarchist s Argument In a recent article, Justification and Legitimacy,

More information

BINDING EFFECT OF DECISIONS ADOPTED BY NATIONAL COMPETITION AUTHORITIES

BINDING EFFECT OF DECISIONS ADOPTED BY NATIONAL COMPETITION AUTHORITIES BINDING EFFECT OF DECISIONS ADOPTED BY NATIONAL COMPETITION AUTHORITIES Luciano Panzani 1, 2 1. INTRODUCTION It s recognized that the private enforcement of competition law interacts with the public enforcement

More information

FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided.

FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided. FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided. DO NOT MARK ON THIS TEST 1. The security guard/proprietary private security officer s role BEFORE a violation has been committed

More information

Running Head: The Consequentialism Debate 1. The Consequentialism Debate. Student s Name. Course Name. Course Title. Instructors name.

Running Head: The Consequentialism Debate 1. The Consequentialism Debate. Student s Name. Course Name. Course Title. Instructors name. Running Head: The Consequentialism Debate 1 The Consequentialism Debate Student s Name Course Name Course Title Instructors name Due Date The Consequentialism Debate 2 The Consequentialism Debate The Consequentialist

More information

Public Consultation on the Smart Borders Package

Public Consultation on the Smart Borders Package Case Id: 8bfe0a99-7887-4411-93ba-8149ed1964c4 Date: 29/10/2015 17:06:40 Public Consultation on the Smart Borders Package Fields marked with are mandatory. Questions to all contributors You are responding

More information

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

Transnational Radical Party (TRP) FILLING THE DEMOCRATIC DIGITAL DIVIDE Document WSIS/PC-2/CONTR/51-E 6 January 2003 English only Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE" A. Introduction 1. The main objective of the Second Preparatory Committee

More information

MODULE 5: unlawfulness

MODULE 5: unlawfulness MODULE 5: unlawfulness [Snyman 95-144] 1. Legality 2. Conduct 3. Causation 4.Unlawfulness 5. Criminal accountability 6. Fault De Wet and Swanepoel state that conduct is unlawful if: 1. It is contrary to

More information

Bowie City Police Department - General Orders

Bowie City Police Department - General Orders Bowie City Police Department - General Orders TITLE: VIDEO RECORDING OF POLICE ACTIVITY Activity EFFECTIVE DATE: 4/20/12 NUMBER: 448 REVIEW DATE: X NEW _ AMENDS _ RESCINDS DATE: AUTHORITY Chief John K.

More information

Slide 1. Slide 2 Basic denial defence which is used when the accused claims that he or she was not present at the time of the offence.

Slide 1. Slide 2 Basic denial defence which is used when the accused claims that he or she was not present at the time of the offence. Slide 1 (including Excuses and Justifications) Slide 2 Basic denial defence which is used when the accused claims that he or she was not present at the time of the offence. Independent evidence supporting

More information