Rethinking Cyberlaw

Rethinking Cyberlaw

A New Vision for Internet Law

Rethinking Law series

Jacqueline Lipton

The rapid increase in Internet usage over the past several decades has led to the development of new and essential areas of legislation and legal study. Jacqueline Lipton takes on the thorny question of how to define the field that has come to be known variously as cyberlaw, cyberspace law or Internet law. Unlike much of the existing literature, this book tackles the question with the benefit of hindsight and draws on several decades of legal developments in the United States and abroad that help illustrate the scope of the field.

Chapter 5: Digital privacy and cyber-victimization

Jacqueline Lipton

Subjects: innovation and technology, technology and ict, law - academic, information and media law, internet and technology law

Abstract

This chapter considers the challenges posed to the protection of personal privacy in a globalized digital world. In particular, it emphasizes the highly divergent approaches taken to privacy protection between the United States and the European Union, with specific reference to the need to balance free speech interests against the protection of personal privacy. It considers some of the cyber-victimization laws that have been implemented and may work alongside privacy protections to prevent harm caused by incursions into an individual’s private online space. It also examines ways in which online privacy incursions can spill over into the physical world and cause tangible harm to victims.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information