Groups: Difference between revisions

From Cyberlaw: Internet Points of Control Course Wiki
Jump to navigation Jump to search
No edit summary
Line 51: Line 51:
*#*Software makers have deeper pockets, but holding them liable may dry up the market somewhat.
*#*Software makers have deeper pockets, but holding them liable may dry up the market somewhat.
*#*OS makers have deeper pockets and won't easily be deterred.
*#*OS makers have deeper pockets and won't easily be deterred.
*#*But ISPs are probably the best target.
*#*But ISPs are probably the best target. They have deeper pockets, aren't easily deterred, and have a significant ability to control activity on their service (in theory, at least).
*# Most of these suggestions would work against generativity.
*# Our considerations will change somewhat based on the claim at issue (IP, fraud, privacy, etc.)


== Group 6, Ombudsman ==
== Group 6, Ombudsman ==

Revision as of 17:16, 3 January 2008

Group 1, OS Maker Industry Association

  1. Jason Liss
  2. Nevin Kamath
  3. Chris Johnson
  4. brando
  5. Ed Roggenkamp
  6. Harry Lewis
  7. Tyler Tassin
  8. Matan Shacham

Group 2, Software/Applications Industry Association

  1. Lindsay Kitzinger
  2. Bradley Hamburger
  3. Nika Engberg
  4. Anna Volftsun
  5. Dara Glasser
  6. Tom Seivert
  7. Samantha Lipton

Group 3, Internet Service Provider Industry Association

  1. Arjun Mehra
  2. Savith
  3. Jen
  4. Renat
  5. Deepa
  6. James

Group 4, Consumer Interest Group (Ralph Nader)

  1. Eryck Kratville
  2. LT Ciaccio
  3. Vanessa Hettinger
  4. Alexis Caloza
  5. Kelly Hoffman
  6. Kevin Parker

Group 5, Plaintiff-side Lawyer in Texas

  1. Josh Feasel
  2. Kim Everitt
  3. Dan Kahn
  4. Ken Grose
  5. Nate bryant
  6. Kerry Lee
  7. Mai

Thoughts:

  • Our main interest is having someone to sue (and being able to win). This has several dimensions:
    1. Standard of liability
      • We'd certainly prefer strict liability, as a negligence standard will be hard to prove.
    2. Who is liable?
      • Holding only the bad actors liable is unsatisfactory: they can hide their identities and they don't have much money.
      • Software makers have deeper pockets, but holding them liable may dry up the market somewhat.
      • OS makers have deeper pockets and won't easily be deterred.
      • But ISPs are probably the best target. They have deeper pockets, aren't easily deterred, and have a significant ability to control activity on their service (in theory, at least).
    3. Most of these suggestions would work against generativity.
    4. Our considerations will change somewhat based on the claim at issue (IP, fraud, privacy, etc.)

Group 6, Ombudsman

  1. Meika Vogel
  2. Doug
  3. Will Adams
  4. Christina Seif
  5. Will M
  6. Xixi
  7. Kira Stanfield

Other Potential Stakeholders:

1. Hardware Makers: PC makers, backbone. Backbone – financial stake because of overload in traffic. Hardware: pressure on reconfiguring; potential liability for security features; also, the more data that flows, the more they sell. Appliance Makers (cell phones).

2. Professors: Books to sell, classes to teach.

3. Countries / Government: Different countries have different needs / desires based on what services they provide (India – services, Nigeria – spam, China – free speech issues). National Security/Terrorism concerns.

4. Law Enforcement: specificity v. broad language in the law; workload.

5. Corporations: as users; IT Departments at corporations; retailers (like Norton, other corporations that depend on secure transactions like Amazon); software makers; corporations that have intellectual property at stake (whether they have a competing technology or they have copyrighted material that might be stolen).

6. Benevolent Hackers: hacking your iPhone for useful purposes, counting the number of computers on the Internet.

7. Insurance industry: because they may incur liability either through contract or extra-contractual or implied contractual liability by the courts).