Computer Ethics, Spring 2017


Comm 010, 4:15-6:45 Thursdays
Class 6

Week 6 Readings

Feb 23
Read Chapter 3, on Speech


News

It turns out the site mp3toys.xyz has a huge number of takedown notices, but very little traffic: https://torrentfreak.com/pirate-site-with-no-traffic-attracts-49m-mainly-bogus-dmca-notices-170219. At least it does appear to be a file-sharing site.


Do you have to decrypt your stuff if the government has a warrant? Production of documents is not protected by the Fifth Amendment, so maybe. But a magistrate judge in Chicago recently struck from a warrant the feds' request that everyone at the site be compelled to unlock their iPhones with their fingerprint: washingtonpost.com/news/volokh-conspiracy/wp/2017/02/23/judge-rejects-warrant-provision-allowing-compelled-thumbprints-to-unlock-iphones/?utm_term=.94573a23aff4.


The New Zealand High Court ruled that Kim Dotcom can be extradited to the US: theguardian.com/world/2017/feb/20/kim-dotcom-eligible-for-extradition-to-us-new-zealand-high-court-rules.

Here's the catch: Dotcom can not be extradited for criminal copyright infringement, because NZ does not recognize that as a criminal offense. The court ruled that he can be extradited for fraud, however. But the fraud charge only makes sense if megaupload.com was engaging in criminal activity, which, if infringement was not criminal, it was not doing. Stay tuned.


Fred Benenson searched the web for an A/C part. A week later he got an email from Sears asking if he was still interested. The catch: he'd never given Sears his email address. Or anyone else, either, during the searchprocess. See artplusmarketing.com/browsing-your-website-does-not-mean-i-want-your-spam-3821267e902?gi=7093e0346cbb. See also Criteo.com/privacy.



If you want your papers encrypted when I return them, let me know. You'll need to install GPG, and send me your public key. I'll use that to encrypt your paper before returning it.

A key is created with gpg --gen-key. It may take some time. You'll be asked to enter your email address as your identifier.
To export your own public key, use gpg --export your_email_addr. Add the -a option for easier manageability as text. You'll need to send this public key to me.



Paper 1 notes
Sampling
I don't want standard legal advice; I want what should be. Credit and permission are separate ideas; you can talk about both, but don't confuse them with one another. The core question: can sampling be acceptable without permission?

DMCA
The core question is whether the OCILLA safe harbor should be made less safe to large sites.



End of class 5: just got to Warshak.