ACRL

40
From Soup to Nuts: Copyright, Social Networking and Electronic Surveillance Tracy Mitrano Cornell University

Transcript of ACRL

Page 1: ACRL

From Soup to Nuts: Copyright, Social Networking and Electronic Surveillance

Tracy Mitrano

Cornell University

Page 2: ACRL

Copyright: Let’s Review

• The law and technology are out of sync with current business models and social norms– Google Library Project and the fair use question– Viacom Sues YouTube/Google for 1 billion – Peer to peer technologies, including web based

products such as BitTorrent• 85% of allegedly copyright protected material transmitted

over commodity networks

Because the protocols are free, who controls the pipes and content controls the Internet

Page 3: ACRL

Higher Education: Academic Delivery

• American Association of Publishers pre-litigation letter to Cornell University– Two letters from the provost to all faculty advising

them of compliance • 70% less use of e-Reserve Materials• If it is behind authentication, does that make it okay?

– Cornell Electronic Course Content Copyright Guidelines

• http://www.copyright.cornell.edu/policy/Copyright_Guidelines.pdf

– Fair use checklist and faculty sign-off with input into course management systems.

Page 4: ACRL

Berkman Center White Paper

The Digital Learning Challenge: Obstacles to Educational Uses of

Copyright Material in the Digital Age

http://cyber.law.harvard.edu/media/files/copyrightandeducation.html

Page 5: ACRL

Recording Industry Association of American

(RIAA)• Digital Millennium Copyright Act Notices

– Conduit– Safe Harbor

• Settlement Letters– To forward or not to forward, that is the question…

• Preservation Notices– On the basis of what law rests compliance?

• http://www.cit.cornell.edu/policy/memos/riaa.html

• Intellectual Property and Free Speech • http://fairusenetwork.org/resources/OSPreport-2007.pdf

Page 6: ACRL

What’s going on…

• Waitin’ on the new business model– “We designed the CD to last 10 years…”

• Carey Sherman, President of the RIAA, 2003

• In the meantime, have the means become the end?– Taking a page out of patent law’s

playbook, has intellectual property become the business model instead of the product in the entertainment arena?

Page 7: ACRL

Why is Higher Education in the Bull’s Eye of the Target?

• Object lesson for commercial ISPs?– Bruised by Verizon v. RIAA, gearing up for

another session?

• Who among US Congress will defend us?– Follow the money…

• Because they are looking for the deep pocket?– What does “knowledge” mean in DMCA?

• Because we actually care about our students and missions?– Citizenship, appropriate use and code of conduct

Page 8: ACRL

Social Networking Technologies: Let’s Begin

Who said, “e-mail is …

… for old people.”

…for formal communications.”

…lame.”

?

Page 9: ACRL

The Choices Are:

• My undergraduate student, 22 years old.

• My son, Nikko, 15 years old.

• The Chronicle of Higher Education.

• A vice president of EDUCAUSE.

Page 10: ACRL

Who among us …

• … has a page on Facebook?

• … uses some form of social networking technology for their work?

• … has forbidden their son or daughter to use one?

Page 11: ACRL

Web 2.0

• Examples– http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

– http://en.wikipedia.org/wiki/Web_2

– http://www.facebook.com/

• YouTube– http://www.youtube.com/watch?v=6gmP4nk0EOE&eurl

Page 12: ACRL

Pew Internet and American Life Project

• 55% of online teens have created a personal profile online, and 55% have used social networking sites like MySpace or Facebook.

• 66% of teens who have created a profile say that their profile is not visible to all internet users. They limit access to their profiles.

• 48% of teens visit social networking websites daily or more often; 26% visit once a day, 22% visit several times a day.

Page 13: ACRL

January 2007 Report:• 91% of all social networking teens say they

use the sites to stay in touch with friends they see frequently, while 82% use the sites to stay in touch with friends they rarely see in person.

• 72% of all social networking teens use the sites to make plans with friends; 49% use the sites to make new friends.

• Older boys who use social networking sites (ages 15-17) are more likely than girls of the same age to say that they use social networking sites to make new friends (60% vs. 46%).

Page 14: ACRL

And now narcissism?

• Self-esteem movement + technology =– Excessive vanity– Sense of entitlement– Lack of empathy– Aggression when insulted– Ignoring the needs of others?

• According to Jean M. Twenge, “Why Today’s Young Americans are More Confident, Assertive, Entitled -- and More Miserable Than Ever Before”

Page 15: ACRL

Countered by William Strauss…

• Of “Millennials Rising” fame, would suggests that Twenge’s characterizations are “harsh, unfair and unsupported by data…”

• Anyone remember Christopher Lasch and the “Culture of Narcissism” in the 1970’s?

Page 16: ACRL

If there is really nothing too new under the sun…

What is interesting is how technology influences human development studies,

including now debates about the relative *narcissism* of every

adolescent generation.

Page 17: ACRL

What is all the fuss about?

• Criminals push the technological envelope– Pedophiles and MySpace

• Private concerns hire high profile *security* officers– N.B. Some confusion over/between physical and

technological security

• Public– Bush-Gonzalez-F.B.I. focus

» Communications On-line Protection Act 1996» Overruled» Communications Decency Act» Provisions about pornography overruled

» Child Online Protection Privacy Act: in effect, parental permission for any personally identifiable information of persons under 13 years of age

Page 18: ACRL

Early Press

• Remember the Columbia University student arrested after on-line sexual fantasy date turns bad?– Hot wax…

– Eventually overturned and now he is suing NYC for false arrest…

– Poor judgment on the part of the girl date?

Page 19: ACRL

What is it about a computer that lowers inhibitions?

• Absence of physical social cues that consciously and unconsciously keep behavior in check.

• Deeply personal relationship with computers, not unlike an analyst-analyzand relationship, allows for unimpeded expression.

• Human-computer interaction for impulsive and/or innovative people generates additional excitement and encouragement for expression.

Page 20: ACRL

Reason to make the technology illegal?

• H.R. 5319– Would render all social networking technologies

illegal• Passed by entire House 2006!• Died at the end of the session, but, notwithstanding

grandstanding politics, a window into the mindset of Congress on the relationship of technology to social order.

“This guy voted against a bill to stop pedophilia!!”

Page 21: ACRL

Dawning of Facebook

• Original technological settings to .edu domain– Early press reports of debauched and crude

behavior;– Illegal activity with respect to underage drinking

and illegal drugs;– Libelous, defamatory or uncivil discourse

“Tracy, what are you going to do about Facebook?”

Page 22: ACRL

Thoughts on Facebook Cornell University 2006

• Physical safety and personal privacy– “Like to be available, but not announced!”– “Didn’t like people looking at me when I wasn’t

there!”• Different expectations for a new generation but not none

at all?

• Marketability– Branding

• Try on a new identity– Nikki’s story– Bonnie’s story– Hillary’s story…marketing for whom?

Page 23: ACRL

Thoughts on Facebook Cornell University 2006

• Architecture:– .edu includes more than your fraternity brothers!– New friends and communities: networking is both

social and technological– New business model based on privacy settings

• In response to push announcements about changes on an individual’s page in Fall 2006

• Have to be a friend or join a group or community• How many degrees of separation now?

• Appropriate use and privacy policy• Anonymized sale of data

Page 24: ACRL

Law …

• Communications Decency Act– Section 230: I.S.P. Immunity

• Is Facebook/MySpace an I.S.P. or a higher layer application?

– Disney.com and the Cubby…Prodigy…section 230 line of cases

• Individual liability still pertains for privacy torts:– Invasion of privacy, misappropriate of likeness,

intrusion of seclusion…– If you can find the defendant (with a deep pocket)!

Page 25: ACRL

… and Policy

• Prohibit social networking technologies?• Select groups and higher standards

– Northwestern athletics

• Speech codes, free speech and citizenship– University of Southern California

• Education for appropriate, if not propitious use?– Purdue University

• Institutional transparency?– Admissions, Judicial Administration, Student Life,

Campus Police?

Page 26: ACRL

The Time is Now!

• Cisco buys the source code of a little-known social networking site in order to create an out-of-the-box product for its customers.

• To what use for higher education?– Cool tool for Alumni and Development

– Replace course management systems?– Electronic mail communications

• RIAA letters, poster in Facebook at CU• Go to where the students are, user-friendly environment

Page 27: ACRL

To What Use Libraries?

• Means to share and build information– Like Wikipedia or Citizendium but less as a

single static repository and more as a way to get birds of feather to share engagement in ideas and topics

– United with teaching and learning in colleges and universities

• By-pass course management systems, go to where students go, generate learning sites for more collaborative, peer to peer exchanges

Page 28: ACRL

Electronic Surveillance: Let’s Review

• Electronic Communications Privacy Act of 1986 (ECPA)– “Wiretapping Act” that collapsed telephony and

data networking technologies– Always had a content/conversational detail

component aligned with Fourth Amendment Jurisprudence

• Content: probably cause of criminal activity + judicial supervision

• Conversational detail: easy access with a subpoena

– Problem?• Different technologies offer different content

Page 29: ACRL

When Last We Visited the USA Patriot Act…

• Passed October 2001 and renewed in 2006– Including “sunset” provisions that amended

both ECPA and the Foreign Intelligence Surveillance Act

• FISA: separate court system, ex parte motions, originally passed in 1978 but under current circumstances assumed new meaning

– That allowed for easy access to conversational detail

Page 30: ACRL

ECPA and FISA Amended

• The standard for content of communications remains the same under both Title III and FISA Courts:– Probable cause of criminal or terrorist

activity respectively

• Patriot Act lowered the bar to access for conversation detail – File a paper with a clerk in the FBI

Page 31: ACRL

No Wonder!

• Saturday New York Times, March 10, 2006– “FBI Head Admits Mistakes in Use of

Security Act”• Talking about Patriot Act, and the use of

“administrative letters” generic phrase for conversational detail requests

Page 32: ACRL

What’s the Problem?

• “Mueller conceded that the bureau had improperly used the USA Patriot Act to obtain information about people and businesses.”– No central clearing house, database or

repository for these requests– No oversight for appropriate use– Confusion over content/detail = content

Page 33: ACRL

Consequently…

• Inaccurate reporting to Congress• No one really knows how many letters

have been issued• Or where the records are of either the

requests or the responses• Or what has been done with the

responses in either criminal or terrorist investigations

Page 34: ACRL

Fundamental Principles

That is not what our forefathers intended to be the case with the powers of a

government, particularly federal government, and suggests a diminution

of intended counter-balance to the Constitution:

The Bill of Rights, due process and government accountability.

Page 35: ACRL

History

Libraries can be proud of a long tradition of providing information and offering knowledge to the public domain as a

fundamental component of our constitutional rights and citizenship

obligations as members of this democratic republic …

Page 36: ACRL

The Present

Libraries have embraced new technologies -- as well as the

opportunity that those new technologies suggest for learning and pursuit of

wisdom … while being mindful of the legal and political challenges that

underpin these technologies given their particular tracking and surveillance

capabilities.

Page 37: ACRL

You were the first …

To grasp the significance of amendments to the 1976 copyright law and help us

understand the consequences of these legal constraints on teaching and

learning, research and free speech.

Page 38: ACRL

You were the one…

To lead the charge against the USA-Patriot Act for its impact civil liberties

by:

Prompting debate

Informing the media

Lobbying for reform

Page 39: ACRL

You are still charged …

With charting the direction for the constituents of colleges and universities to find meaningful access to information and, like Virgil guiding Dante, guiding us

all through the pathways by which we continue to pursue our missions of teaching, learning and outreach.

Page 40: ACRL

Back to the Future

Integrate traditional values of libraries and the seminal role that they play in our

democratic republican society with the age old missions of higher education in these interesting times that require us to balance law, technology, market forces

and social norms in the name of an ethical ordered liberty.