Computer Ethics, Spring 2017
Comm 010, 4:15-6:45 Thursdays
Class 6
Week 6 Readings
Feb 23
Read Chapter 3, on Speech
News
It turns out the site mp3toys.xyz has a huge number of takedown notices, but
very little traffic: https://torrentfreak.com/pirate-site-with-no-traffic-attracts-49m-mainly-bogus-dmca-notices-170219.
At least it does appear to be a file-sharing site.
Do you have to decrypt your stuff if the government has a warrant?
Production of documents is not protected by the Fifth Amendment,
so maybe. But a magistrate judge in Chicago recently struck from a warrant
the feds' request that everyone at the site be compelled to unlock their
iPhones with their fingerprint: washingtonpost.com/news/volokh-conspiracy/wp/2017/02/23/judge-rejects-warrant-provision-allowing-compelled-thumbprints-to-unlock-iphones/?utm_term=.94573a23aff4.
The New Zealand High Court ruled that Kim Dotcom can be extradited to the
US: theguardian.com/world/2017/feb/20/kim-dotcom-eligible-for-extradition-to-us-new-zealand-high-court-rules.
Here's the catch: Dotcom can not be extradited for
criminal copyright infringement, because NZ does not recognize that as a
criminal offense. The court ruled that he can be extradited for
fraud, however. But the fraud charge only makes sense if megaupload.com was
engaging in criminal activity, which, if infringement was not criminal, it
was not doing. Stay tuned.
Fred Benenson searched the web for an A/C part. A week later he got an email
from Sears asking if he was still interested. The catch: he'd never given
Sears his email address. Or anyone else, either, during the searchprocess.
See artplusmarketing.com/browsing-your-website-does-not-mean-i-want-your-spam-3821267e902?gi=7093e0346cbb.
See also Criteo.com/privacy.
If you want your papers encrypted when I return them, let me know. You'll
need to install GPG, and send me your
public key. I'll use that to encrypt your paper before
returning it.
A key is created with
gpg --gen-key. It may take some time. You'll be asked to enter your
email address as your identifier.
To export your own public key, use gpg
--export your_email_addr. Add the -a option for easier
manageability as text. You'll need to send this public key to me.
Paper 1 notes
Sampling
I don't want standard legal advice; I want what should be. Credit
and permission are separate ideas; you can talk about both, but don't
confuse them with one another. The core question: can sampling be acceptable
without permission?
DMCA
The core question is whether the OCILLA safe harbor should be made less safe
to large sites.
End of class 5: just got to Warshak.