Free Essay

Who Should Govern Jurisdiction on the Internet

In:

Submitted By Pavlovable
Words 1601
Pages 7
Which lawmakers have jurisdiction over actions taking place on the internet? 1

CLN4U
Final Culminating Essay
April 15th 2016

Topic: hich lawmakers should have jurisdiction over actions taking place on the internet?
W

Which lawmakers have jurisdiction over actions taking place on the internet? 2 It’s a new world, an electronic world, a world in which laws are being made and broken on the world wide web. The questions at hand are: who should have control over creating and enforcing these laws on the internet? Who should be held accountable? In the 21st century, countries reserve the right to pass legislation upon their government’s discretion, however, there is a community of nations, aptly named the United Nations (UN), that have created a universal commission which defines the legal responsibilities of states in their treatment of individuals within their borders. This is named the International Law Commission. The International Law
Commission sets out guidelines and regulations for member states to follow, however, the commission is just a guideline, meaning that each country has the right to prosecute criminals within their border upon their discretion. The nature of illegal internet activity is based around anonymity, a person may use several servers based in various countries around the world in order to hide their IP address and origin, a method called “bouncing your IP address”. It is oftentimes impossible to track the location of these criminals, which raises an issue of countries potentially overstepping their jurisdiction when investigating an international cyber­crime.
Another issue is that the participation of multiple countries’ cyber­crimes units may cause political pressure. Countries may be scrutinized for their legislation if the legislation relates to the particular cyber crime being investigated. For example, if a cyber­crime is being investigated by country X and the suspect is located in country Y, he may not be prosecuted because that particular crime is not illegal in country . Lastly, private corporations which own their own servers/websites are responsible for ensuring the integrity of their content from a legal standpoint, in accordance with their country’s law. Should these corporations be held liable for illegal activities that occur on their websites?
In order to combat these issues, cyber­crimes should fall under the jurisdiction of the United
Nations (UN) and the International Criminal Court, in compliance with International Law.

Which lawmakers have jurisdiction over actions taking place on the internet? 3 Internet crime or “Cyber­crime” is an expected phenomenon of the 21st century. Crimes are being committed from millions of miles away, by people sitting at their computers which hide their physical location from law enforcement. Moreover, a citizen of one country may break the law of another country, however, they won’t be prosecuted because either their physical location cannot be traced or the legislation of their country of origin isn’t being violated. According to
Schultz’s Essay (2008), “If this approach was followed globally, then websites would be subject only to the law of the state from which the flow of information stems” (Paragraph 59).
A more effective and efficient body of law to use for cyber­crimes is International Law because it can be applied universally to every person, no matter their physical or online location. A universal body of law could prevent the overstepping of jurisdiction and political tension.
Furthermore, according to Rosenblatt’s paper on
Principles of Jurisdiction (2016): “There is little

dispute that nation­states can prosecute Internet users (or anyone else, for that matter), whatever their location, for revealing national secrets, falsifying official documents, or inciting war. These activities threaten national security, wherever they are committed, and therefore fall under international standards for jurisdiction” (Section B).

The current system of investigating cyber­crimes relies solely on the collaboration of multiple government agencies and their respective cyber­crimes units. These government

Which lawmakers have jurisdiction over actions taking place on the internet? 4 agencies may work with each other on individual cases of primary importance, such as a manhunt, or they may collaborate with other countries and share resources. Either option requires a significant amount of time and resources.The nature of cybercrime is an international affair ­ criminals and hackers never keep all of their information in one place, therefore, efficient collaboration between countries is necessary for investigating international cyber­crime.
For example, an online perpetrator may use multiple servers, situated in multiple countries, to keep their files, information, and location a secret. Government agencies which don’t collaborate with one­another will never gain access to all of this information because their jurisdiction is limited ­ half of the information may be stored on a server in another country. On the other hand, agencies which do collaborate with each other may gain access to all of the information, but the process may waste a significant amount of time and resources, leaving more room for error.
According to Schultz’s Oxford Journal (2008), “To reconcile these two imperatives – to protect local values without encroaching on the territory of other states – is the fundamental problem of state intervention on the Internet” (Paragraph 48). All cyber­crimes occur on the world wide web, a system which uses physical devices called servers for the distribution of information. A large corporation may own hundreds of servers which store their private information, anything from employee records and passwords to document scans and contracts. All of this information is stored on physical servers. Company websites can also be hosted on company servers, which means that any illegal activities that occur on these companies’ websites/servers, directly extends liability to that company.
For example, an employee of company X, based in the United States, may have their payroll sent to a bank in the Cayman Islands and away from United States jurisdiction, for tax evasion

Which lawmakers have jurisdiction over actions taking place on the internet? 5 purposes. The liability may rest either on the individual, for tax fraud, or on the company, for negligence (if the company didn’t report the suspicious activity in a timely manner).
The question arises: should private corporations be held accountable, due to negligence, for cyber­crimes occurring on their servers? Companies themselves influence the access to information of individuals, according to the United Nations General Assembly Report (2011, May
16), “Given that Internet services are run and maintained by private companies, the private sector has gained unprecedented influence over individuals’ right to freedom of expression and access to information” (paragraph 44).In addition to influencing people’s right to freedom of expression, companies themselves are subject to international law, meaning that any negligence that occurs on their front can be scrutinized in accordance with international law.
According to Alvarez’ Essay (2010, March 12), “Every individual and every organ of society excludes no one, no company, no market, no cyberspace. The Universal Declaration applies to them all” (Page 10 Paragraph 39).
Justified as it is, a Universal Declaration (International Law) is set in place in order to deter capitalism from influencing democracy. Legislation is often passed in order to benefit private corporations, in turn, these corporations help balance that country's economy by providing domestic products and services. For example, the fast­food giant McDonald’s adds
Monosodium Glutamate (MSG) to their food which allows for lower production costs, however, the amount of “safe” consumption of this drug has been raised by the Food and Drug
Administration (FDA) in order to accommodate McDonald's. According to Alvarez’s Essay
(2010, March 12), “Corporate speech is no less indispensable to decision making in a democracy than is any other form of speech” (Page 10 Paragraph 39). If private corporations are allowed to influence legislation then the entire legislative system of individual countries may

Which lawmakers have jurisdiction over actions taking place on the internet? 6 be corrupted. Cyber­crimes could use an International Declaration as opposed to individual countries’ legislation in order to combat this corruption. In conclusion, cyber­crimes should fall under the jurisdiction of the United Nations (UN) and the International Criminal Court, in accordance with International Law. This is necessary in order to avoid the negative influence of private corporations on government legislature. In addition, International Law is universal and, therefore, can be applied to every person no matter their geographical or online location. Lastly, the current collaboration of multiple government agencies is an ineffective system because it wastes time and resources, therefore, investigating cyber­crimes should be handled by a specialized cyber­crimes unit of the United Nations (UN).

Which lawmakers have jurisdiction over actions taking place on the internet? 7
References:

Alvarez, J. E. (2010, March 12). Are Corporations “Subjects” of International Law? Page 10
Paragraph 39. Retrieved from: http://www.law.nyu.edu/sites/default/files/ECM_PRO_069097.pdf Rosenblatt, B. (2016). Principles of Jurisdiction on the Internet. Section B: Internationally.
Harvard Cyber Law. Retrieved from: http://cyber.law.harvard.edu/property99/domain/Betsy.html Schultz, T. (2008). Carving up the Internet: Jurisdiction, Legal Orders, and the Private/Public
International Law Interface. European Journal of International Law. 19 (4): 799­839. Subjective
Territoriality, Paragraph 59. Retreived from: http://ejil.oxfordjournals.org/content/19/4/799.full Schultz, T. (2008). Carving up the Internet: Jurisdiction, Legal Orders, and the Private/Public
International Law Interface. European Journal of International Law. 19 (4): 799­839. Paragraph
48. Retreived from: http://ejil.oxfordjournals.org/content/19/4/799.full United Nations General Assembly. (2011, May 16). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, United Nations
General Assembly, paragraph 44. Retrieved from: http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf

Similar Documents

Premium Essay

Common Law

...1- Define Common law, derived from English law and found in England, the United States, Canada, and other countries once under English influence; Civil or code law, derived from Roman law and found in Germany, Japan, France, and in non-Islamic and non-Marxist countries; Islamic law, derived from the interpretation of the Koran and found in Pakistan, Iran, Saudi Arabia, and other Islamic states; A commercial legal system in the Marxist-socialist economies of Russia & the republics of the former Soviet Union, Eastern Europe, China, and other Marxist-socialist states whose legal system centered on the economic, political, and social policies of the state. Arbitration A procedure used as an alternative to “litigation” in which parties in a dispute may select a disinterested party as referee to determine the merits of the case & make a judgment that both judges agree to honor. Litigation The process in which a dispute between parties is contested in a formal judicial setting,. Commonly instigated by a law suit asserting one party’s version of the facts. Marxist – socialist tnets Cyber squatters Person or businesses that buy, usually for a nominal fee, & register as web site names descriptive nouns, celebrity names, variations on company trade marks, geographic & ethic group names & pharmaceutical \& other descriptors & then hold them until they can be sold as an inflated price. Sometimes called CSQ CONCILATION - A non binding agreement between parties to resolve...

Words: 3646 - Pages: 15

Premium Essay

Governance (Cyber Ethics Scope)

...The Internet has taken an intricate and deceptive approach in the 21st century. With the always-constant advancement of technology, the Internet has grown to be a medium where, individuals utilize it as a platform to conduct criminal activities. Some criminal activities account for: fraud, cyber warfare, financial misconduct, and cyber-bullying. This has grown to be an incredible concern as human safety has been established as the main topic of conversation. With regards too the governance geography of criminal activities, “criminal organizations [as well as, individuals] cloak their power in the mantle of state authority” (Williams). However, “this [does not] suggest that the criminal interaction will determine all aspects of state behavior” (Williams). Furthermore, criminal organizations continue to “entrench themselves in weak states in the former Soviet Union, Africa, Latin America and parts of Asia, [due to] differing degrees of vulnerability” (Williams). Imperviousness to solve these limitations is an approach that must be taken. Instead of acknowledging the ideology of compromising human security, economic and social concerns, there should be some sort of regulation rules implemented. However, there is, “a possible consequence of global divide caused by competing ideologies [over a] struggle for power” (Williams). It is most likely that, states that advocate, “law and order [are the same ones] that are dominated by criminal interests and criminal authorities” (Williams)...

Words: 845 - Pages: 4

Premium Essay

Law Bank

...related questions that follow. A and B have decided to go into the business of selling goods, but wish to use the Internet to reach potential customers all over Canada who can both buy from them and pay using the Internet. As prudent businesspersons, A and B will a. register a domain name. b. negotiate an Internet access agreement. c. negotiate a website development agreement. d. negotiate a website-hosting agreement. e. all of the above Answer: e Diff: 2 Type: MC Topic: E-commerce Skill: Applied 3) Use the fact situation in Q2 to answer the related question that follows. The type of business that A and B are setting up is called a. wholesale sales. b. electronic retailing. c. retail sales. d. e-commerce. e. digital retailing. Answer: b Diff: 1 Type: MC Topic: E-commerce Skill: Recall/Applied 4) Use the fact situation in Q2 to answer the related question that follows. The type of payment that the business will most likely use is a. credit cards. b. smart cards. c. cash. d. electronic cash. e. all of the above Answer: e Diff: 2 Type: MC Topic: E-commerce Skill: Recall/Applied 5) Use the fact situation in Q2 to answer the related question that follows. One major concern that A and B will have related to carrying on their business over the Internet is a. identity theft. b. public...

Words: 4485 - Pages: 18

Free Essay

Jurisdictional Issue in Cyber Crime

...are emerging with special reference to developing countries like India By developing we mean where growth of Information Technology is rampant but still it has not reached its peak. Cyber crimes can take place across various jurisdictions and hence the legal issue of jurisdiction of International Courts and country specific Indian Courts arises. Throw light on the present system in India, how it is ineffective and also upon international treaties and legal solutions to deal with the same. I have suggested possible ways to tackle the problem taking into consideration the domestic laws in India. The inefficiency of legislature to enact a more user friendly law is also examined in detail. Turning back our focus on the main legal dilemma of Jurisdiction of Cyber Crime Courts we have suggested a model that would be successful in India taking into consideration its working in other countries. In my concluding remarks a problem solution approach is taking where we have addressed the issue and after due consideration the solution is suggested. If proposal taken and implemented with effectiveness it would lead to a better result and can be followed by other nations in solving the predicament regarding cyber crimes and criminals. In recent years, use of the Internet has grown at an explosive rate. However, there currently exists no single entity to control the enormous amount of information that is transmitted through it. In its beginnings, the...

Words: 2824 - Pages: 12

Premium Essay

Hr.Doc

...productive culture in the organization that values diversity, trust, and respect for individuals and their contributions ❖ Assesses requests for HR information in light of corporate policy, freedom of information legislation, evidentiary privileges, and contractual or other releases ❖ Contributes to the development of information security measures issues CHAPTER SUMMARY This chapter focuses on the legal environment in Canada. It discusses the multiple overlapping pieces of legislation that attempt to balance employee and employer rights when it comes to human rights and freedoms, employment equity, employment standards, and privacy. The chapter differentiates between organizations that are under federal jurisdiction versus provincial jurisdiction. It discusses the requirement to take steps to protect employees from harassment and discrimination, in order to reduce legal liability. Specific exceptions that allow discrimination on...

Words: 6699 - Pages: 27

Free Essay

Cyber Crime

...Course Title: Date: Topic: Information Law Cyber crime involves criminal activities conducted using the internet and both the computer together with the individual behind it are victims. The Australian Institute of Criminology (2011) finds cyber crime to include fraud, hacking, money laundering and theft, cyber stalking, cyber bullying, child sexual exploitation, child grooming and identity theft. The crimes mostly go unreported making it hard to quantify (Australian Institute of Criminology, 2011). However, the most common cyber crime incidents remain malware code and virus attacks that corrupt software. The Australian Cyber crime Act which was assented in 2001 and commenced on 2 April 2002 added new offences streamlined to check on those kinds of cyber crime that impair the security, integrity and reliability of computer data and electronic communications. They are; a) Unauthorized access, modification or impairment with intent to commit a serious offence, b) Unauthorized modification of data where the person is reckless as to whether the modification will impair data, c) Unauthorized impairment of electronic communications. There is a maximum penalty for these offences. Investigation powers relating to search and seizure of electronically stored data have been increased (Find Law Australia, 2012). Culprits of cybercrime can ignore the realms of Australian jurisdiction and launch an attack from anywhere in the world or even design attacks that seem to come from foreign sources...

Words: 1001 - Pages: 5

Premium Essay

The Abuse of Cyberspace

...programme in Intellectual Property Law (LL.M.) INTERNET LAW The abuse of the cyberspace - jeopardizing the copyrights Prof. Goce Naumovski, PhD Temelkova Simona 42321 I.I The rise of technology and Internet as a platform for new problems So cyberspace is real. And so are the risks that come with it. - President Barack Obama1 Despite the many and obvious benefits of the modern electronic communications development,it has also brought with it the worrying threat of intentional attacks against information systems and network platforms/infrastructures. As cyberspace gets more and more complex and its components more and more sophisticated, especially due to the fast development and evolution of (broadband) Internet-based platforms, new and unforeseen vulnerabilities may emerge.” And further that “in the hands of persons acting in bad faith, malice, or grave negligence, information society technologies (ISTs) may become tools for activities that endanger or injure, the life, property, or dignity of individuals or even damage the public interest. Technology-enabled crimes are also known as high-tech crime, computer crimes or cyber crime. They include crimes committed directly against computers and computer systems, as well as the use of technology to commit or facilitate the commission of traditional crimes, bringing unique challenges to law enforcement. IT security in ICT, with the association of the Internet, has evolved into cyber security as we know it today...

Words: 4702 - Pages: 19

Premium Essay

Be325 Online Quiz

...during voir dire. Hummel sued Dr. Strittmatter for medical malpractice for failure to diagnose her breast cancer after a mammogram. During a lengthy voir dire that filled sixteen pages of the trial transcript, jurors were asked if any of them had family members who had been diagnosed with breast cancer. One juror did not respond, but it was later discovered that his wife had died of breast cancer several years earlier. The juror claimed that he had not heard the questions about cancer. The jury returned a verdict in favor of the physician. Hummel filed a motion for a new trial on the grounds of juror misconduct because the juror had failed to respond truthfully to questions and be attentive to the trial as required by law. The court most likelyAnswer | | | | | Selected Answer: |    granted the motion for a new trial because of the jurorÕs untruthful answer and inattentiveness to the proceedings. | Correct Answer: |    granted the motion for a new trial because of the jurorÕs untruthful answer and inattentiveness to the proceedings. | | | | |  Question 4 0 out of 1 points | | | A long arm statute allows a court in a particular state to exercise jurisdiction overAnswer | | | |...

Words: 5500 - Pages: 22

Premium Essay

Mba 611

...CHAPTER 1 “LEGAL FOUNDATIONS” Administrative law is the body of law that governs the activities of administrative agencies of government. Clean hands doctrine a rule of law that a person coming to court with a lawsuit or petition for a court order must be free from unfair conduct (have "clean hands" or not have done anything wrong) in regard to the subject matter of his/her claim. Common law is based on precedent (legal principles developed in earlier case law) instead of statutory laws. It is the traditional law of an area or region created by judges when deciding individual disputes or cases. Constitutional law – a body of law dealing with the distribution and exercise of government power. Criminal Law versus Civil Law – Civil * between you and another citizen (no government involved); * disagreements between citizens were no crime has been committed (only e.g. injury); * designed to compensate parties (including businesses) for losses as a result of another conduct ; * e.g. speeding and parking violations; * don’t result in loss of freedom, though they can result in loss of privileges or fines. Criminal * between you and the government/law; * are a protection of society; * Congress and House of Representatives are involved; * When the individuals break the laws/are against the government; * actions that have been declared illegal; * they are prosecuted by the state (city, state or country); * normally punished with...

Words: 6978 - Pages: 28

Free Essay

Legal Civil Procedures

...Prepared by Peggy N. Kerley Updated in 2013 by Jennifer Carpenter Australia • Brazil • Mexico • Singapore • United Kingdom • United States i © 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. ii PART I Introduction to Civil Litigation Contents Introduction ............................................................................................................................................iv PART I INTRODUCTION TO CIVIL LITIGATION CHAPTER 1 CHAPTER 2 Litigation and the Paralegal..................................................................................................................1 The Courts and Jurisdiction .................................................................................................................2 PART II INITIATING LITIGATION CHAPTER 3 CHAPTER 4 CHAPTER 5 CHAPTER 6 CHAPTER 7 Preliminary Considerations and Procedures.......................................................................................9 Investigation and Evidence .................................................................................................................10 The Complaint......................................................................................................................................12 Responses to the Complaint ..................................................................................................

Words: 31166 - Pages: 125

Premium Essay

Week 2

...restitution. Procedural Law Procedural Law provides the structure that is used for setting up guidelines for pursue of the rights of substantive. It is utilized for description of the guidelines and rules set in the aspects of a governmental case pre, during, or post of the trial. This law may be utilized in proceeding of criminal, civil and administrative to help in the structure of how the mentioned proceeding will be handled. Included but not limited in the law may be the selection of jury, the set jurisdiction and the limitation of the statue. These laws of procedural differ in the kind of court proceedings as the courts individually have a particular set of laws. The main objective of these laws of procedural is to assure that the constitutional rights are fairly sought out. The law can be complex and council should be considered if needed. Criminal Law Criminal law involves behavioral boundaries for individuals who commit a crime and imposes punishment on those who violate the boundaries. Criminal law is a protection for society with rules and statues which defines...

Words: 653 - Pages: 3

Free Essay

Business Law Exam Notes

...its ruling group. 2. Primary sources of the Law include: The U.s. Constitution of the various states. Statues, or laws, passed by Congress and by state legislatures. Regulations created by administrative agencies, such as the Federal Trade Commission and the U.S. Food and Drug Administration. Case law (court decisions) 3. Common Law: the body of law developed from custom or judicial decisions in English and U.S. courts, not attributable to a legislature. Precedent: a court decision that furnished an example or authority for deciding subsequent cases involving identical or similar legal principles or facts. 5. State decisis( two aspects: Decisions made by a higher court are binding on lower courts A court should not overturn its own precedents unless there is a strong reason to do so *Precendents may be dropped because of social or technological changes. *Brown vs. Board of Education: white and blacks did not have equal education opportunities. Separate educational facilities- conclusion 10. preemption: Congress chooses to act exclusively in a concurrent area. 11. federal forms of government: national government and states share sovereign power. *Police powers-fire and building codes, antidiscrimination laws, parking regulations, zoning regulations, licensing requirements 12. Article I, Section 8 of the U.S. Constitution permits Congress “to regulate Commerce with foreign Nations and among the several states, and with the Indian...

Words: 2112 - Pages: 9

Premium Essay

Describe the Major Issues in Fraudulent Orders Perpetrated Against Online Merchants. What Measures Should Be Implemented to Combat These Issues?

...1. What types of e-payment systems should B2C merchants support? As there are still many consumers who are still quite cautious in regards to the perceived security concerns of n Online Payment systems , I think merchants should support various types of processes in order to facilitate the buying process for those who may not have or don’t want to use credit cards . E-Cheques,Virtual credit cards, Gift cards,and Paypal are very user friendly and easily accessible. I know that from my own experiences, I have made many purchases using Paypal and have never had a security issue or concern, If I had I think it may have limited my willingness to continue with online purchases and I’m sure other new Web purchasers would feel the same. For me, Paypal built that trust by being used by many, advertising as well as being now owned by Ebay, another well respected E-Auction presence on the web. 2. Describe the major issues in fraudulent orders perpetrated against online merchants. What measures should be implemented to combat these issues? One of the major issues facing online merchants is that should they accept the transaction, they are then responsible for the associated costs of the processing from the Credit card companies as well as the lost goods and shipping charges. Even with security checks and balances, there is also the possibility of rejecting valid orders which of course results in additional lost revenue. Measures used to combat these issues are: Address Verification...

Words: 3628 - Pages: 15

Premium Essay

E-Contract

...wherein many of the noticeable newspaper have shut down or have lifted purely to the online medium. New and inventive models and type of business need to be invented and worked. Existence of e-contract in the market is accomplishing the need for innovativeness in the traditional business segments. Businesses, both existing and new are trying to create an online individuality and an e-contract stand keeping in view the needs of the modern times. E-contract is one of the divisions of e-business. It holds a similar meaning of traditional business wherein goods and services are switched for a particular amount of consideration. The only extra element it has is that the contract here takes place through a digital mode of communication like the internet. It provides an opportunity for the sellers to reach the end of consumer directly without the involvement of the middlemen. New models of business demands different organisational charters. E-contract demands an organizational charter which caters to its new marketing needs. This mode of business enables businesses to save time on product design and device products according to the individual customer requirement, track sales and get immediate feedback from the customer. Contracts have become so common in day-to-day life that most of the time we do not even recognize that we have entered into one. Right from buying a vegetable and hiring a Cab or to buying an airline ticket online, uncountable thing in our daily exists is governed by...

Words: 5466 - Pages: 22

Premium Essay

Leg 565 Complete Course Leg565 Complete Course

...LEG 565 Complete Course LEG565 Complete Course Click Link for the Answer: http://workbank247.com/q/leg-565-complete-course-leg565-complete-course/27213 http://workbank247.com/q/leg-565-complete-course-leg565-complete-course/27213 LEG 565 Week 1 Discussion 1 "The Purpose of Law"  Please respond to the following: * Define the “law” and analyze its functions and impact on business. * Evaluate the components that the Supreme Court should consider when overturning or re-interpreting a decision. LEG 565 Week 1 Discussion 2 "Governmental Powers and the Bill of Rights" Please respond to the following: * Differentiate among the powers of government and how they protect against control by one specific branch. * Assess two possible implications of the Bill of Rights on how business is conducted in the U.S. LEG 565 Week 1 Discussion 3 "Courts" Please respond to the following:  * Compare the jurisdiction of state courts with that of federal courts and offer one type of business case that would reside in each court. Discuss the rationale you employed in making your decision. * Propose three distinct types of decisions that are issued by the U.S. Supreme Court. Discuss the implications of these decisions to business. LEG 565 Week 2 Discussion 1 "Types of Resolution" Please respond to the following: * Differentiate among arbitration and other non-judicial methods of alternative dispute resolution. For each method, offer one type of business case that might be settled...

Words: 2165 - Pages: 9