SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Go Ahead and Shoot Me



             Go Ahead and Shoot Me: The Wild West of Online Video and Image Sharing
                               Anne Arendt, Utah Valley University
                                     Last update: 2/28/2011

CAVEAT: BELOW INFORMATION IS FOR DISCUSSION ONLY AND NOT INTENDED TO BE LEGAL ADVICE

A new and perhaps growing issue for educational institutions such as ours is the role of recorded
video/audio shot by individuals either on campus or in the name of the institution. This report intends to
start the discussion of what the issues and guidelines are for this issue across the United States as well
as at our own institutions. Minor emphasis is placed on the state of Utah throughout this report.

                                         SITUATIONAL ANALYSIS

Let’s consider how long social media resources have been around. The timeline is striking, for example:
Wikipedia (online encyclopedia) 2001; del.icio.us (social bookmarking) 2003; MySpace 2003 (social
networking); Facebook (social networking) 2004; Flikr (social media) 2004; Bebo (social networking)
2005; and YouTube (social media) 2005 (Higher Education Academy and the Joint Information Systems
Committee 2009).

Now let us consider how these new tools are being used by younger generations. Consider these
numbers for 11-15 year olds in the United Kingdom:
   • Having at least one social networking site 75%
   • Using email and instant messaging 90%
   • Playing online multiplayer games 60%
   • Owning an MP3 player 80%
   • Owning a mobile phone with camera 85% (Higher Education Academy and the Joint Information
        Systems Committee 2009).

Based on a PEW study in the United States, “Forty-seven percent of adult U.S. Internet users use online
social networks, and 19 percent now use Twitter or other status update services, according to research by
the Pew Internet and American Life Project.” It continues, “The survey also highlighted the fact that use
of Twitter and similar services is more popular among younger users, with 37 percent of 18-24 year olds
and 31 percent of 25-34 year olds claiming to use it. This compares with 19 percent of 35-44 year olds,
and 10 percent of 45-64 year olds” (Marshall 2009).

As we look at how we as educators are to become involved in these new environments it may serve us
well to consider the vast array of environments, norms, expectations, and situations that exist. Higher
Education Academy and the Joint Information Systems Committee notes, “The consequences of this
generation’s experience have become increasingly apparent over time. In general, they include a strong
sense of a community linked in its own virtual spaces of blogs and social networking and gaming sites; a
similarly strong sense of group identity; and a disposition to share and to participate. They also include
impatience – a preference for instant answers; a downgrading of text in favour of image; and a casual
approach to evaluating information and attributing it, and also to copyright and legal constraints” (2009).

As this younger generation joins higher education, the environment within which we work will continue to
transition—not just in the tools available but also in how we choose to use them. Therefore, we need to
start addressing how we will prepare for these changes. “The generation born in the 1990s entered a
world of high technological sophistication and has grown up accommodating and influencing yet further
advances on the ICT [Information and Communication Technologies] front in particular. Generally
speaking, its members are familiar and entirely at ease with the design of these technologies, unafraid of
experimenting with them, and take for granted and get on with doing all that they allow – talking,
messaging, playing online games, sharing images, finding things out – often simultaneously. Moreover,
most of their learning about it, and how to use it, comes from their peers. ICT, and the Social Web
especially, is their medium and their metier. It is integral to the world they know and that world is the only


1
Go Ahead and Shoot Me


one they have known. There is no going back from this position. Indeed, it can only become more firmly
established as the norm by subsequent generations, and not just in the UK but worldwide” (Higher
Education Academy and the Joint Information Systems Committee 2009).

OVERVIEW OF SOCIAL MEDIA TOOLS

Whereas the original Web was more of a one-way medium with content going from the publisher to the
reader, Social media is a bi-directional medium where people interact with each other and/or with the
content. Basically, it is a change from an environment with a few content authors and many readers to
one in which users generate, re-purpose, and consume shared content. As the Consortium for School
Networking (CoSN) notes, “Social media is defined as an online application that uses the World Wide
Web (www) as a platform and allows for participatory involvement, collaboration, and interactions among
users. Social media is also characterized by the creation and sharing of intellectual and social resources
by end users” (2009).

Examples of Social media applications include items such as web logs or blogs; online diaries that allow
the originator and readers to state ideas and react; wikis, which are topical collections of information that
can be edited by multiple individuals within a group; social networking sites where users can create
personalized pages of information and interact with others ; or file sharing sites where users can share
images, audio, video and more. In addition to these, there are services that allow users to participate in
various group activities and to complete, individually or collaboratively, a variety of tasks such as
document creation and editing that would previously have relied upon software on a local computer
(CoSN 2009; Albion 2008).

Social media applications like online communities, blogs, and wikis should not be thought of as just a
passing fad or idle socializing, but as an activity that has embedded itself into the way work gets done
(Demski, 2009). As Albion notes in Social media in Teacher Education, “Social media represents a more
participative and potentially paradigm-changing environment for building and sharing knowledge. Some
educators have begun to apply these tools in classrooms but, as their use in society expands, there will
be expectations for their wider application in schools.” (2008). He continues, “As social media develops, it
will not be possible for educators at any level to ignore it. Society, especially employers, will expect
education to develop essential skills with the new tools, and learners already familiar with the tools will
expect to be able to apply their knowledge and skills while learning” (Albion 2008).

For the purposes of this paper, we will look specifically at the effects of video and images distribution
within these technologies. The most common place of occurrence for these are inside of social
networking sites and in photo or video sharing sites such as Youtube.

SOCIAL NETWORKING AND PROFILES

As Wikipedia notes, "A social network service focuses on building online communities of people who
share interests and/or activities, or who are interested in exploring the interests and activities of others.
Most social network services are web based and provide a variety of ways for users to interact, such as e-
mail and instant messaging services.” It includes sites such as Facebook and MySpace that are open for
anyone to subscribe to, or can be more limited/controlled sites such as Ning, Lymabean, or Saywire.

PHOTO AND VIDEO SHARING AND EDITING

There are a multitude of sites that permit you to share images. This includes sites such as Flickr, Picnik,
Picasa (Google), Webshots, Photobucket, or YouPublish to name a few. There is also a multitude of sites
that permit you to share videos. This includes site such as Youtube, Vimeo, Viddler, Ustream,
Teachertube, Yahoo Video, or Graspr.

Most of our attention will be on the sharing of video, as that is an area with a fair amount of ambiguity,
even when it comes to adherence to laws and policies already in existence.



2
Go Ahead and Shoot Me


                                LAWS & POLICIES THAT ALREADY EXIST

First, we need to consider the laws and policies that already exist and affect the posting of video and
images. These include more historic regulations such as freedom of speech as well as newer regulations
such as anti-bullying regulations.

FREEDOM OF SPEECH/EXPRESSION

Freedom of speech (expression) in the United States is protected by the First Amendment to the United
States Constitution and by many state constitutions and state and federal laws.

FIRST AMENDMENT TO THE U.S. CONSTITUTION (RELIGION AND EXPRESSION)

The First Amendment to the United States Constitution is part of the Bill of Rights and was adopted in
1791. It provides that:
         Congress shall make no law respecting an establishment of religion, or prohibiting the free
         exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people
         peaceably to assemble, and to petition the Government for a redress of grievances.
It should be noted that court decisions have expanded this concept to include not just verbal
communication but also non-verbal expressions such as wearing a symbol, dance movements, or silent
vigils.

UNIVERSAL DECLARATION OF HUMAN RIGHTS

The right to freedom of speech is recognized as a human right under Article 19 of the Universal
Declaration of Human Rights and recognized in international human rights law in the International
Covenant on Civil and Political Rights (ICCPR).

As stated by the Global Network Initiative:
        Freedom of Expression: Freedom of expression is defined using Article 19 of the Universal
        Declaration of Human Rights (UDHR) and Article 19 of the International Covenant on Civil and
        Political Rights (ICCPR):
                  UDHR: Everyone has the right to freedom of opinion and expression; this right includes
                  freedom to hold opinions without interference and to seek, receive and impart information
                  and ideas through any media and regardless of frontiers.
                  ICCPR: 1. Everyone shall have the right to hold opinions without interference. 2.
                  Everyone shall have the right to freedom of expression; this right shall include freedom to
                  seek, receive and impart information and ideas of all kinds, regardless of frontiers, either
                  orally, in writing or in print, in the form of art, or through any other media of his choice. 3.
                  The exercise of the rights provided for in paragraph 2 of this article carries with it special
                  duties and responsibilities. It may therefore be subject to certain restrictions, but these
                  shall only be such as are provided by law and are necessary: (a) For respect of the rights
                  or reputations of others; (b) For the protection of national security or of public order (ordre
                  public), or of public health or morals.

        The Global Network Initiative notes:

                 “Freedom of opinion and expression is a human right and guarantor of human dignity.
                 The right to freedom of opinion and expression includes the freedom to hold opinions
                 without interference and to seek, receive and impart information and ideas through any
                 media and regardless of frontiers.

                 Freedom of opinion and expression supports an informed citizenry and is vital to ensuring
                 public and private sector accountability. Broad public access to information and the
                 freedom to create and communicate ideas are critical to the advancement of knowledge,
                 economic opportunity and human potential.


3
Go Ahead and Shoot Me



                 The right to freedom of expression should not be restricted by governments, except in
                 narrowly defined circumstances based on internationally recognized laws or standards.
                 These restrictions should be consistent with international human rights laws and
                 standards, the rule of law and be necessary and proportionate for the relevant purpose.

                 Participating companies will respect and protect the freedom of expression of their users
                 by seeking to avoid or minimize the impact of government restrictions on freedom of
                 expression, including restrictions on the information available to users and the
                 opportunities for users to create and communicate ideas and information, regardless of
                 frontiers or media of communication” (2009).

While freedom of speech regulation encourages creative and free expressions, these expressions must
be done within the context of copyright and intellectual property.

COPYRIGHT AND INTELLECTUAL PROPERTY

Generally speaking, we have well established rules and norms for individual, joint, institutional and vendor
IP ownership. We also have reasonably well established academic norms for attribution. However, the
devil is in the details (Cate 2009). We can now distribute rights almost any way we want to distribute
them. Copyright and intellectual property policy and enforcement includes a number of areas such as
patents, trademarks, trade secrets, right of publicity, and copyrights.

As the United State Copyright Office states:

    Copyright is a form of protection provided by the laws of the United States (title 17, U. S. Code) to the
    authors of “original works of authorship,” including literary, dramatic, musical, artistic, and certain
    other intellectual works. This protection is available to both published and unpublished works. Section
    106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to
    authorize others to do the following:

        •   To reproduce the work in copies or phonorecords;
        •   To prepare derivative works based upon the work;
        •   To distribute copies or phonorecords of the work to the public by sale or other transfer of
            ownership, or by rental, lease, or lending;
        •   To perform the work publicly, in the case of literary, musical, dramatic, and choreographic
            works, pantomimes, and motion pictures and other audiovisual works;
        •   To display the work publicly, in the case of literary, musical, dramatic, and choreographic
            works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images
            of a motion picture or other audiovisual work; and
        •   In the case of sound recordings,* to perform the work publicly by means of a digital audio
            transmission.

    In addition, certain authors of works of visual art have the rights of attribution and integrity as
    described in section 106A of the 1976 Copyright Act. For further information, see Circular 40,
    Copyright Registration for Works of the Visual Arts.

    It is illegal for anyone to violate any of the rights provided by the copyright law to the owner of
    copyright. These rights, however, are not unlimited in scope. Sections 107 through 121 of the 1976
    Copyright Act establish limitations on these rights. In some cases, these limitations are specified
    exemptions from copyright liability. One major limitation is the doctrine of “fair use,” which is given a
    statutory basis in section 107 of the 1976 Copyright Act. In other instances, the limitation takes the
    form of a “compulsory license” under which certain limited uses of copyrighted works are permitted
    upon payment of specified royalties and compliance with statutory conditions.” (United States
    Copyright Office).




4
Go Ahead and Shoot Me


FAIR USE

Sometimes, what we do as educators is protected by fair use. Fair use allows for limited use of
copyrighted materials without permissions from rights holders. An example may be a critical review.

As noted by the U.S. Copyright notice, fair use is defined as follows:

        The doctrine of fair use has developed through a substantial number of court decisions over the
        years and has been codified in section 107 of the copyright law.

        Section 107 contains a list of the various purposes for which the reproduction of a particular work
        may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and
        research. Section 107 also sets out four factors to be considered in determining whether or not a
        particular use is fair:

             1. The purpose and character of the use, including whether such use is of commercial
        nature or is for nonprofit educational purposes
             2. The nature of the copyrighted work
             3. The amount and substantiality of the portion used in relation to the copyrighted work as a
        whole
             4. The effect of the use upon the potential market for, or value of, the copyrighted work

        The distinction between fair use and infringement may be unclear and not easily defined. There is
        no specific number of words, lines, or notes that may safely be taken without permission.

        Acknowledging the source of the copyrighted material does not substitute for obtaining
        permission.

COPYRIGHT IN EDUCATION

Copyright law provides educators with a separate set of rights in addition to fair use, to display (show) and
perform (show or play) others' works in the classroom. These rights are in Section 110(1) of the Copyright
Act and apply to any work, regardless of the medium:
        § 110. Limitations on exclusive rights: Exemption of certain performances and displays
        Notwithstanding the provisions of section 106, the following are not infringements of copyright:
        (1) performance or display of a work by instructors or pupils in the course of face-to-face teaching
        activities of a nonprofit educational institution, in a classroom or similar place devoted to
        instruction, unless, in the case of a motion picture or other audiovisual work, the performance, or
        the display of individual images, is given by means of a copy that was not lawfully made under
        this title, and that the person responsible for the performance knew or had reason to believe was
        not lawfully made;

TEACH ACT

Signed by President Bush on November 2, 2002, the Technology, Education, and Copyright
Harmonization (TEACH) Act "facilitates and enables the performance and display of copyrighted
materials for distance education by accredited, non-profit educational institutions (and some government
entities) that meet the TEACH Act’s qualifying requirements. Its primary purpose is to balance the needs
of distance learners and educators with the rights of copyright holders. The TEACH Act applies to
distance education that includes the participation of any enrolled student, on or off campus" (Copyright
Clearance Center).

RIGHT OF PUBLICITY

The right of publicity is a state-set rule regarding the right to control the commercial use of one’s identity
which generally includes name, image and likeness; however, it varies from state to state. Right of


5
Go Ahead and Shoot Me


publicity is part of the intellectual property family. Currently, Utah is one of nineteen states that recognize
the right of publicity via statutes (Right of Publicity). In Utah it specifically related to newspapers and
radio broadcasting. To learn more see Utah Code 1993, Title 45, Newspapers and Radio Broadcasting
Chapter 3 Abuse of Personal Identity (Right of Publicity 2009b; Roesler, 2011). These policies leave
much grey area when it comes to Web 2.0 and social media technologies; particularly when these
technologies are outside of a traditional or online classroom setting.

ANTI-CIRCUMVENTION

Anti-circumvention laws prohibit the circumvention of technological barriers for using a digital resources in
certain ways which the rights holders do not wish to allow.

WIPO COPYRIGHT TREATY & THE DIGITAL MILLIENNIUM COPYRIGHT ACT

The World Intellectual Property Organization Copyright Treaty (WIPO) is an international treaty on
copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in
1996. The United States entered into the force in 2002. The WIPO Copyright Treaty is implemented in
United States law by the Digital Millennium Copyright Act or DMCA (WIPO 1996; Wikipedia, 2009b).

The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996
treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and
dissemination of technology, devices, or services intended to circumvent measures (commonly known as
digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of
circumventing an access control, whether or not there is actual infringement of copyright itself. In addition,
the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998
by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October
28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while
limiting the liability of the providers of on-line services for copyright infringement by their users (Wikipedia,
2009a).

Assuming we have all necessary copyright and intellectual property clearances, our freedom of
expression may also be impacted by rules relating to privacy and data protection.

PRIVACY, DATA PROTECTION AND FREEDOM OF INFORMATION

In considering privacy, data protection, and freedom of information laws, we need to consider normative
and ethical issues as well as legal ones.

PRIVACY

Privacy is something we all seem to want in some cases and all seem to be willing to give up in others.
“Privacy is an important, but illusive concept in law. The right to privacy is acknowledged in several broad-
based international agreements. Article 12 of the Universal Declaration of Human Rights and Article 17 of
the United Nations International Covenant on Civil and Political Rights both state that, ‘No one shall be
subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon
his honour and reputation. Everyone has the right to the protection of the law against such interference or
attacks’” (Stratford & Stratford 1998).

Stratford and Stratford note, “The term “privacy” does not appear in the U.S. Constitution or the Bill of
Rights. However, the U.S. Supreme Court has ruled in favor of various privacy interests-deriving the right
to privacy from the First, Third, Fourth, Fifth, Ninth, and Fourteenth Amendments to the Constitution”
(1998).

As stated by the Global Network Initiative:




6
Go Ahead and Shoot Me


        Privacy: Privacy is defined using Article 12 of the Universal Declaration of Human Rights (UDHR)
        and Article 17 of the International Covenant on Civil and Political Rights (ICCPR):

                 UDHR: No one shall be subjected to arbitrary interference with his privacy, family, home
                 or correspondence, nor to attacks upon his honour and reputation. Everyone has the right
                 to the protection of the law against such interference or attacks.

                 ICCPR: 1. No one shall be subjected to arbitrary or unlawful interference with his privacy,
                 family, home or correspondence, nor to unlawful attacks on his honour and reputation. 2.
                 Everyone has the right to the protection of the law against such interference or attacks.

        The Global Network Initiative notes, ““Privacy is a human right and guarantor of human dignity.
        Privacy is important to maintaining personal security, protecting identity and promoting freedom of
        expression in the digital age.

        Everyone should be free from illegal or arbitrary interference with the right to privacy and should
        have the right to the protection of the law against such interference or attacks.

        The right to privacy should not be restricted by governments, except in narrowly defined
        circumstances based on internationally recognized laws and standards. These restrictions should
        be consistent with international human rights laws and standards, the rule of law and be
        necessary and proportionate for the relevant purpose”
        (2009).

“The Privacy Act (PL 93-579) is a companion to and extension of the Freedom of Information Act (FOIA)
of 1966. FOIA was primarily intended to provide access to government information. It did exempt the
disclosure of personnel and medical files that would constitute “a clearly unwarranted invasion of personal
privacy” [12]. This provision was initially used to deny access to people requesting their own records. So
the Privacy Act was also adopted both to protect personal information in federal databases and to provide
individuals with certain rights over information contained in those databases. The act has been
characterized as “the centerpiece of U.S. privacy law affecting government record-keeping” [13]. The act
was developed explicitly to address the problems posed by electronic technologies and personal records
systems and covers the vast majority of personal records systems maintained by the federal government.
The act set forth some basic principles of “fair information practice,” and provided individuals with the right
of access to information about themselves and the right to challenge the contents of records. It requires
that personal information may only be disclosed with the individual’s consent or for purposes announced
in advance. The act also requires federal agencies to publish an annual list of systems maintained by the
agency that contain personal information” (Statford & Stratford, 1998).

DATA PROTECTION

Associated to online video and audio recording, although likely not directly related, are laws and
regulations relating to the protection of individual data. The Federal Trade Commission is educating
consumers and businesses about the importance of personal information privacy, including the security of
personal information. Under the FTC Act, the Commission guards against unfairness and deception by
enforcing companies' privacy promises about how they collect, use and secure consumers' personal
information. Under the Gramm-Leach-Bliley Act, the Commission has implemented rules concerning
financial privacy notices and the administrative, technical and physical safeguarding of personal
information, and it aggressively enforces against pretexting (Federal Trade Commission).

It should be noted that the United States does not treat personal data privacy in the same manner as
some other countries. “Where the U.S. approach has been to provide specific and narrowly applicable
legislation, in Europe there are unified supra-national policies for the region. Most countries have
implemented these policies with omnibus legislation. The European legislation outlines a set of rights and
principle for the treatment of personal data, without regard to whether the data is held in the public or




7
Go Ahead and Shoot Me


private sector. In the United States, the legal tradition is much more concerned with regulating data
collected by the federal government" (Stratford & Stratford 1998).”

U.S. SAFE WEB ACT OF 2006

Associated to online video and audio recording, although likely not directly related, are laws and
regulations relating to spam, spyware, or fraud. Congress approved S. 1608, the “Undertaking Spam,
Spyware, And Fraud Enforcement with Enforcers beyond Borders Act of 2006,” (the US SAFE WEB Act
of 2006) on December 9, 2006. The US Safe Web Act amends the Federal Trade Commission Act
(FTCA) and improves the Federal Trade Commission (FTC)’s ability to protect consumers from
international fraud by: (1) improving the FTC’s ability to gather information and coordinate investigation
efforts with foreign counterparts; and (2) enhance the FTC’s ability to obtain monetary consumer redress
in cases involving spam, spyware, and Internet fraud and deception (Brownlee 2006).

LIABILITY

There are three types of liability issues that should be taken into account in relation to an institution’s use
of Web 2.0 technologies:

    1. Contract based liability due to breach of contract
    2. Negligence based liability due to failure to meet the required standard of care
    3. Specific liabilities such as for defamatory or obscene content

HARASSMENT AND DEFAMATION

Utah has general bullying and hazing laws for the state system of public education. The bill HB 325
creates a statewide definition of bullying and hazing and outlines the minimum standards for bullying and
hazing policies in local districts and charter schools (Equality Utah 2011). However not all harassment or
defamation will fall under the category of direct bullying. To some degree we are also protected by local
codes of conduct or campus policies. As Cate points out, “Some examples of potential liability may
include, but is not limited to, harassment, defamation, and other online nastiness. We, as institutions,
have student codes of conduct and employee/faculty codes of conduct. These apply to social media
worlds. Harassment, defamation and other online nastiness doesn’t require new rules (legal or policy
issues), but instead now we can just engage in so much more communication there is more scope and
potential for conflict” (2009).

Even considering anti bullying regulations and our own local institutional regulations, it is likely that the
social media world is nebulous. In some cases the social media may offer even more restrictions, and in
some cases it may offer less—as well as limited ability to enforce local policies. As Cate points out,
“When you are using public sites there are some interesting twists. The terms of use of a site may limit
speech more than the institution does or the first amendment does. The public site could actually remove
participants for speech that institutions of higher education would or must permit” (2009).

Assuming one is not in violation of privacy laws and one has necessary copyright clearances, ones
freedom of expression may also be affected by system specific policies.

SYSTEM SPECIFIC POLCIES

In addition to federal and state laws, you have policies and guidelines that dictate how the technologies
themselves can be used. These are what often offer a company or website the ability to reject or remove
content it sees as not fitting.

YOUTUBE POLICIES




8
Go Ahead and Shoot Me


As an example we will consider Youtube policies, since many of our examples come from this website.
Youtube permits anyone to post a video but also permits anyone to report a video that one feels may be
in violation of the Youtube policies.

Sex & Nudity
Most nudity is not allowed, particularly if it is in a sexual context. Generally if a video is intended to be
sexually provocative, it is less likely to be acceptable for YouTube. There are exceptions for some
educational, documentary, scientific, and artistic content, but only if that is the sole purpose of the video
and it is not gratuitously graphic. For example, a documentary on breast cancer would be appropriate, but
posting clips out of context from the documentary might not be.

Hate Speech
"Hate speech" refers to content that promotes hatred against members of a protected group. For
instance, racist or sexist content may be considered hate speech. Sometimes there is a fine line between
what is and what is not considered hate speech. For instance, it is generally okay to criticize a nation, but
not okay to make insulting generalizations about people of a particular nationality.

Shocking and Disgusting
The world is a dangerous place. Sometimes people do get hurt and it’s inevitable that these events may
be documented on YouTube. However, it’s not okay to post violent or gory content that’s primarily
intended to be shocking, sensational or disrespectful. If a video is particularly graphic or disturbing, it
should be balanced with additional context and information. For instance, including a clip from a slaughter
house in a video on factory farming may be appropriate. However, stringing together unrelated and
gruesome clips of animals being slaughtered in a video may be considered gratuitous if its purpose is to
shock rather than illustrate.

Dangerous Illegal Acts
While it might not seem fair to say you can’t show something because of what viewers theoretically might
do in response, we draw the line at content that’s intended to incite violence or encourage dangerous,
illegal activities that have an inherent risk of serious physical harm or death. This means not posting
videos on things like instructional bomb making, ninja assassin training, sniper attacks, videos that train
terrorists, or tips on illegal street racing. Any depictions like these should be educational or documentary
and shouldn’t be designed to help or encourage others to imitate them.

Children
Videos involving children (anyone under the age of 18) are particularly sensitive. Videos containing
children should never be sexually suggestive or violent. Please be cautious when posting something
involving a child. If you’re sharing a private moment or home movie, consider making it a private video so
that only your family and friends can see it.

Copyright
When you create something original, you own the copyright for it. Likewise, when other people create
content, they may have a copyright to it. As a creative community, it’s essential that everyone on
YouTube respect the copyrights of others. If you’re not sure if something will violate someone’s copyright,
the safest thing to do is to create something completely original, with images and audio you’ve created. If
it’s all yours you never have to worry about copyright—you own it. If you’ve recorded something from a
DVD, videotaped your TV screen, or downloaded a video online, don’t post it unless you have permission.

Privacy
If a video you've recorded features people who are readily identifiable and who haven't consented to
being filmed, there's a chance they'll file a privacy complaint seeking its removal. We'll notify you if that
happens and give you a chance to edit and re-upload your video before we act on the complaint. If we do
remove your video for privacy reasons, don't upload another version featuring the same people. Chances
are those people will file another privacy complaint or report you for harassment. Don't post other people's
personal information, including phone numbers, addresses, credit card numbers, and government IDs.
We're serious about keeping our users safe and suspend accounts that violate people's privacy.


9
Go Ahead and Shoot Me



Harassment
It comes down to respect. YouTube is all about sharing and interacting with the community in respectful
ways. If you're not sure whether a video or comment you've made crosses the line, follow a simple rule of
thumb: if you wouldn't say it to someone's face, don't say it on YouTube. And if you're looking to attack,
harass, demean, or impersonate others, go elsewhere.

Impersonation
Impersonating another user by copying someone's exact channel layout, using a similar username, or
posing as that person in comments, emails or videos is considered harassment. If you want to keep your
account, stay away from participating in any form of impersonation or harassing activity on the site.

Threats
Users shouldn't feel threatened when they're on YouTube. Period. Don't leave threatening comments on
other people's videos (Youtube 2011).

                      RECORDING OF INDIVIDUALS WITHOUT THEIR CONSENT

So, what are the rules relating to recording of individuals without their consent and they are in a public
place? Well, it depends what state you are in, and if you are including audio as well as video. The audio
may cause you bigger problems.

Video

Most video recordings are legal with or without consent. There are very few laws that prohibit video
recording of any kind, but there are laws in some areas dealing with areas of expected privacy.

Generally, it is perfectly legal to videotape or photograph any person and anything while on public
property, except:

        •   You cannot take pictures of areas that are usually considered private such as bedrooms,
            bathrooms, changing rooms, locker rooms, hotel rooms and so on
        •   Certain public places have banned the use of cameras such as mass transit systems,
            courthouses, capital buildings, secured government buildings, jails or prisons unless you
            obtain written permission
        •   You cannot film or photograph if it interferes with police, fire, medical or emergency
            operations

There are also restrictions on videotaping and photographing on private property:

        •   If the private property is open to the public, such as retail stores, private stadiums or tourist
            areas, filming may be allowed unless there are signs posted that expressly forbid videotaping
            or photography
        •   If the private property belongs to someone other than a commercial business, you had better
            get the property owner's permission (Palmvid 2011; New Media Rights 2011; Lawyers.com
            2011).

Audio

Unlike with video, most audio recordings without consent of one or all parties are illegal. This, in part, is
because audio recording has been around for far longer and has been historically more widely used and
disbursed. There are two types of defined recording situations for audio recording. They are usually
referred to as one-party consent and two-party consent.



10
Go Ahead and Shoot Me




As Palmvid describes, “’One Party Consent’ means that only the person doing the recording has to give
consent and does not have to notify the other party or parties that the conversation is being recorded.
‘Two Party Consent’ means the person recording the conversation must notify all of the other parties that
the recording is taking place and they must consent to the recording” (2011).

In Utah we have one-party consent as noted by the Reporters Committee for Freedom of the Press:

        An individual legally can record or disclose the contents of any wire, oral or electronic
        communication to which he is a party, or when at least one participant has consented to the
        recording, unless the person has a criminal or tortious purpose in making the recording. Utah
        Code Ann. § 77-23a-4.

        Under the statute, consent is not required for the taping of a non-electronic communication
        uttered by a person who does not have a reasonable expectation of privacy in that
        communication. See definition of “oral communication,” Utah Code Ann. § 77-23a-3.

        Unlawful interception of communication, including disclosure of the contents of a communication
        with reason to know of the illegal origin, is a felony—except that when the communication
        consists of the radio portion of a cellular telephone call, it is a misdemeanor. Civil liability for
        unlawful interception can include the greater of actual damages, mandatory damages ranging
        from $50 to $1,000, depending on whether it is a first or subsequent offense, $100 per day of
        violation, or $10,000. Equitable or declarative relief is also available under the statute. Civil
        actions are governed by a two-year statute of limitations. Utah Code Ann. § 77-23a-11.

        Installing a hidden camera or audio recorder to tape a person in a “private place” without consent
        is a misdemeanor. Utah Code Ann. § 76-9-402. A “private place” is a place where one may
        reasonably expect to be safe from intrusion or surveillance. Utah Code Ann. §76-9-401.
        (Reporters Committee for Freedom of the Press 2011)

So, there are few if any regulations in relation to video recording, and only limited regulation of audio in
Utah. What affect could this have in education? If you want a recent case in which to consider, take a
look at the Rutger’s University Tyler Clementi case from 2010.

                                      RECENT CASES IN THE NEWS

RUTGERS CLEMENTI CASE - INVASION OF PRIVACY

A Rutgers University freshman posted a goodbye message on his Facebook page before jumping to his
death after his roommate secretly filmed him during a intimate encounter in his dorm room and posted it
live on the Internet. Not only are the students who recorded and posted the video in legal battles now, but
so is the institution for not protecting the rights and privacy of the student.

In a nutshell here what occurred is that two students, Dharun Ravi and Molly Wei, have been charged
with two counts each of invasion of privacy after allegedly placing a camera in Clementi's room and
livestreaming the recording online on Sept. 19, according to a written statement by New Jersey's
Middlesex County Prosecutor Bruce Kaplan. Under New Jersey's invasion-of-privacy statutes, it is a
fourth degree crime to collect or view images depicting nudity or sexual contact involving another
individual without that person's consent, and it is a third degree crime to transmit or distribute such
images. The penalty for conviction of a third degree offense can include a prison term of up to five years
(Friedman, 2010). Equally the institution is struggling with a definition of what is harassment and what
control or monitoring educational institutions should have over student conduct online (Stripling, 2011).




11
Go Ahead and Shoot Me


Please note that above is simply an overview of things to consider. There are many other angles that may
be relevant based on your individual situation.

                                       OTHER ISSUES TO CONSIDER

NO SINGLE OWNER

Increasingly on the Internet, information and resources are becoming shared resources were there are no
single owners or authors of intellectual property. As Bruwelheide notes, “in today’s environment,
ownership may be shared with several individuals or organizations as new technology encourages
development of multimedia products using a variety of formats and pieces which may involve multiple
layers of copyrighted materials” (1999).

ABILITY TO REMOVE A VIDEO FROM THE PUBLIC

Once a video or image has gone public, it is nearly impossible to remove all instances of that file based
on the rapid distribution, copying, and redistribution of files via the Internet.

The best we can do as educators is to continue to ask ourselves questions and to continue to be
inquisitive as to what new laws and standards are developing in regard to online sharing of files and
resources. One area to consider in particular, as it is developing rapidly at the writing of this paper, is
cyber-bullying.

                                     QUESTIONS TO ASK YOURSELF

Who is responsible?
   • The system upon which the video is shared (website, twitter, web server, email)
   • The site if they are given a take down request (by whom)
   • The owner of the system used to post the images/video (consider public locations like libraries)
   • The person(s) posting the video
           o What if they were not the originator?
   • The originator(s) of the video
           o What if they shared it privately but those users then shared it publically?
   • The users of the site or system

What if there is not a single originator or distributer of the content?
Does it matter when and where the video/image was posted?
Does it matter who the original intended audience was?
Does intent matter?




12
Go Ahead and Shoot Me


                                             REFERENCES

Albion, Peter. 2008, September. Social media in Teacher Education: Two Imperatives for Action.
Computers in the Schools, 25(3/4), 181-198. Retrieved July 21, 2009, doi:10.1080/07380560802368173
from http://eprints.usq.edu.au/4553/1/Albion_Web_2.0_in_teacher_education.pdf

Brownlee, C. 2006, December 13. U.S. Safe Web Act of 2006. Privacy and Security Law Blog.
Retreived November 4, 2009 from http://www.privsecblog.com/2006/12/articles/spam/us-safe-web-act-
of-2006/

Bruwelheide, J. H. 1999. Intellectual Property and Copyright: Protecting Educational Interests and
Managing Changing Environments. Retrieved November 3, 2009 from
http://net.educause.edu/ir/library/html/edu9935/edu9935.html

Cate, B. 2009. The Law and Policy of Web 2.0: Much Old, Some New, Lots Borrowed, So Don't Be Blue.
Educuase Learning Initative. Retrieved from http://hosted.mediasite.com/mediasite/Viewer/?
peid=98e83dc76b9749f3a08996bfb0f5904b

Center for Cognitive Liberty & Ethics. 2009. Freedom of Thought & the First Amendment. Retrieved
November 3, 2009 from http://www.cognitiveliberty.org/issues/first_amend_index.html

Consortium for School Networking (CoSN). 2009. Leadership for Social media in Education: Promise and
Reality. Retrieved July 22, 2009, from Consortium for School Networking (CoSN) Advancing K-12
Technology Leadership Web site: http://www.CoSN.org/Portals/7/docs/Web%202.0/ExecSummaryCoSN
%20Report042809Final.pdf

Demski, J. 2009. Facebook Training Wheels. T H E Journal, 36(4), 24-28. Retrieved July 21, 2009, from
Academic Search Premier database.

Copyright Clearance Center. 2005. The TEACH act: New roles, rules and responsibilities for academic
institutions. Retrieved November 3, 2009 from http://www.copyright.com/media/pdfs/CR-Teach-Act.pdf

Directorate for Science, Technology, and Industry Committee for Information, Computer and
Communications Policy (DSTI/ICCP). 2009. Working Party on Information Security and Privacy The Role
of Digital Identity Management in the Internet Economy: A Primer for Policy Makers. Retrieved from http://
www.oecd.org/dataoecd/55/48/43091476.pdf

Equality Utah 2011. Support HB 325, Bullying and Hazing by Representative Spackman-Moss. Retrieved
February 28, 2011 from http://www.equalityutah.org/bullyinghazingfact.pdf

Friedman, E. 2010. ABC News. Victim of Secret Dorm Sex Tape Posts Facebook Goodbye, Jumps to
His Death. Retrieved February 25, 2011 from http://abcnews.go.com/US/victim-secret-dorm-sex-tape-
commits-suicide/story?id=11758716

Global Network Initiative. 2008. Global Network Initiative Principles. Retrieved February 28, 2011 from
http://www.globalnetworkinitiative.org/principles/index.php#18

Higher Education Academy and the Joint Information Systems Committee. 2009. Higher Education in a
Web 2.0 World. Retrieved October 21, 2009 from
http://www.jisc.ac.uk/media/documents/publications/heweb20rptv1.pdf



13
Go Ahead and Shoot Me



JISC Legal. 2008a. Web 2.0 and the law for HE policy makers. Retrieved from http://www.jisclegal.ac.uk/
Portals/12/Documents/PDFs/Web2_HE_Policy_Makers.pdf

JISC Legal. 2008b. Web 2.0 and the law for information services. Retrieved from
http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/Web2_Information_Services.pdf

JISC Legal. 2008c. Social media and the Law for HE Policy Makers. Retrieved from
http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/Web2_HE_Policy_Makers.pdf

Lawyers.com. 2011. Photography or Video Taping Consent. Retrieved February 25, 2011 from
http://communications-media.lawyers.com/privacy-law/Photography-or-Video-Taping-Consent.html

Marshall, J. 2009. 20% of U.S. Adults use Twitter, Says Pew. Retrieved November 4, 2009 from
http://www.clickz.com/3635448

New Media Rights. 2011. Field Guide to Secret Audio and Video Recordings. Retrieved February 25,
2011 from http://www.newmediarights.org/page/field_guide_audio_and_video_recordings#Video

Palmvid Video Security Cameras. 2011. Legal Information Regarding Audio and Video Recording.
Retrieved February 25, 2011 from http://www.palmvid.com/content/support/legal-information-regarding-
audio-and-video-recording.html

Privireal. 2005. United States – Data Protection. Retrieved November 4, 2009 from
http://www.privireal.org/content/dp/usa.php

Reporters Committee for Freedom of the Press. 2011. A Practical Guide to Taping Phone Calls and In-
Person Conversations in the 50 States and D.C. Retrieved February 25, 2011 from
http://www.rcfp.org/taping/states/utah.html

Right of Publicity. 2009. Statutes. Retrieved November 3, 2009 from http://rightofpublicity.com/statutes

Right of Publicity. 2009b. Utah Code 1953. Retrieved February 28, 2011 from
http://rightofpublicity.com/statutes/utah

Roesler, Mark. 2011. Utah Code 1953. Retrieved February 28, 2011 from
http://www.markroesler.com/pdf/statutes/Utah_ROP_1999.pdf

Stratford, J.S. & Stratford, J. 1998. Data Protection and Privacy in the United States and Europe. IASSIST
Quarterly. 22(1). Retrieved October 21, 2009 from
http://iassistdata.org/publications/iq/iq22/iqvol223stratford.pdf

Stripling, J. 2011. Panelists Debate How Far Colleges Should Go to Monitor Online Behavior. The
Chronicle of Higher Education Technology News. Retrieved February 28, 2011 from http://chronicle.com/
article/Panelists-Debate-How-Far/126298/

U.S. Department of Justice, Civil Rights Division. 2009. A Guide to Disabiilty Rights Laws. Retrieved
October 31, 2009 from http://www.ada.gov/cguide.htm#anchor62335



14
Go Ahead and Shoot Me


United States Copyright Office. 2008. Copyright Office. Library of Congress. Retrieved November 3,
2009 from http://www.copyright.gov/circs/circ1.pdf.

Wikipedia. 2009a. Digital Millennium Copyright Act. Retrieved November 4, 2009 from
http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act

Wikipedia. 2009b. World Intellectual Property Organization Copyright Treaty. Retrieved November 4,
2009 from http://en.wikipedia.org/wiki/World_Intellectual_Property_Organization_Copyright_Treaty

World Intellectual Property Organization. 1996. WIPO Copyright Treaty. Retrieved February 28, 2011
from http://www.wipo.int/treaties/en/ip/wct/trtdocs_wo033.html

Youtube. 2011. YouTube Community Guidelines. Retrieved February 25, 2001 from
http://www.youtube.com/t/community_guidelines




15

Weitere ähnliche Inhalte

Was ist angesagt?

Last ICT Trends on Social Collaborations and eLearning tools
Last ICT Trends on Social Collaborations and eLearning toolsLast ICT Trends on Social Collaborations and eLearning tools
Last ICT Trends on Social Collaborations and eLearning toolsAntonio Ciccarelli, PMP
 
Designing Social Media for Learning
Designing Social Media for LearningDesigning Social Media for Learning
Designing Social Media for LearningStella Lee
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Mediajohntk01
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
Technology and youth ywc conf
Technology and youth  ywc confTechnology and youth  ywc conf
Technology and youth ywc confguest007cc5e6
 
Social Media in Education
Social Media in Education Social Media in Education
Social Media in Education Shannon Miller
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningJudy O'Connell
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Sangeet Bhullar
 
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)Anne Arendt
 

Was ist angesagt? (20)

Last ICT Trends on Social Collaborations and eLearning tools
Last ICT Trends on Social Collaborations and eLearning toolsLast ICT Trends on Social Collaborations and eLearning tools
Last ICT Trends on Social Collaborations and eLearning tools
 
Designing Social Media for Learning
Designing Social Media for LearningDesigning Social Media for Learning
Designing Social Media for Learning
 
Koluni white-paper[1]
Koluni white-paper[1]Koluni white-paper[1]
Koluni white-paper[1]
 
Module 16 Manipulative Information and Media
Module 16 Manipulative Information and MediaModule 16 Manipulative Information and Media
Module 16 Manipulative Information and Media
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
Trends in ict
Trends in ictTrends in ict
Trends in ict
 
ACRL
ACRLACRL
ACRL
 
Technology and youth ywc conf
Technology and youth  ywc confTechnology and youth  ywc conf
Technology and youth ywc conf
 
Social Media in Education
Social Media in Education Social Media in Education
Social Media in Education
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learning
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age Keynote presentation for Conference: Vounteering in a Digital Age
Keynote presentation for Conference: Vounteering in a Digital Age
 
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
The NET Generation (Generation Next, Gen Y, Generation Y, Millenials)
 
Webdesign
WebdesignWebdesign
Webdesign
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
OHE
OHEOHE
OHE
 
Implications of digital technology on youth culture
Implications of digital technology on youth cultureImplications of digital technology on youth culture
Implications of digital technology on youth culture
 

Andere mochten auch

Technology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessTechnology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessAnne Arendt
 
Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Anne Arendt
 
Using Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomUsing Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomAnne Arendt
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsAnne Arendt
 
Web 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersWeb 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersAnne Arendt
 
Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Anne Arendt
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher educationAnne Arendt
 
ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16Anne Arendt
 

Andere mochten auch (8)

Technology, Higher Education, and Open Access
Technology, Higher Education, and Open AccessTechnology, Higher Education, and Open Access
Technology, Higher Education, and Open Access
 
Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)Open Educational Resources (OER) and OpenCourseWare (OCW)
Open Educational Resources (OER) and OpenCourseWare (OCW)
 
Using Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition ClassroomUsing Open Educational Resources in the Basic Composition Classroom
Using Open Educational Resources in the Basic Composition Classroom
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative Commons
 
Web 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it mattersWeb 2.0 at UVU: What it is and why it matters
Web 2.0 at UVU: What it is and why it matters
 
Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 
ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16
 

Ähnlich wie Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image Sharing

Social media impact_digital
Social media impact_digitalSocial media impact_digital
Social media impact_digitalCarlos Herreros
 
Contoh Report Bahasa Inggris
Contoh Report Bahasa InggrisContoh Report Bahasa Inggris
Contoh Report Bahasa InggrisHti999
 
Tugas Report BAHAS
Tugas Report BAHASTugas Report BAHAS
Tugas Report BAHASHti999
 
The Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoThe Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoPath of the Blue Eye Project
 
2 09 groinne conole_july_final_2011
2 09 groinne conole_july_final_20112 09 groinne conole_july_final_2011
2 09 groinne conole_july_final_2011grainne
 
Conole dehub paper_april
Conole dehub paper_aprilConole dehub paper_april
Conole dehub paper_aprilgrainne
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word documentShailendra Singh
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word documentShailendra Singh
 
effects of Social media
effects of Social mediaeffects of Social media
effects of Social mediakimi7792
 
Socialmediaandethics 111104203630-phpapp02
Socialmediaandethics 111104203630-phpapp02Socialmediaandethics 111104203630-phpapp02
Socialmediaandethics 111104203630-phpapp02paatriiii
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docxsodhi3
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docxblondellchancy
 
FSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSUlibIT
 
Chapter One MediaSociety in a Digital WorldNote Read the summ.docx
Chapter One MediaSociety in a Digital WorldNote Read the summ.docxChapter One MediaSociety in a Digital WorldNote Read the summ.docx
Chapter One MediaSociety in a Digital WorldNote Read the summ.docxtiffanyd4
 
Social media time_management_tools_and_tips
Social media time_management_tools_and_tipsSocial media time_management_tools_and_tips
Social media time_management_tools_and_tipsJulius Narciso
 
Social Media Tools for Academic Library Services
Social Media Tools for Academic Library ServicesSocial Media Tools for Academic Library Services
Social Media Tools for Academic Library Servicesinventionjournals
 

Ähnlich wie Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image Sharing (20)

Social media impact_digital
Social media impact_digitalSocial media impact_digital
Social media impact_digital
 
Contoh Report Bahasa Inggris
Contoh Report Bahasa InggrisContoh Report Bahasa Inggris
Contoh Report Bahasa Inggris
 
Tugas Report BAHAS
Tugas Report BAHASTugas Report BAHAS
Tugas Report BAHAS
 
The Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated SoThe Reader To Leader Framework Motivating Technology Mediated So
The Reader To Leader Framework Motivating Technology Mediated So
 
2 09 groinne conole_july_final_2011
2 09 groinne conole_july_final_20112 09 groinne conole_july_final_2011
2 09 groinne conole_july_final_2011
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Conole dehub paper_april
Conole dehub paper_aprilConole dehub paper_april
Conole dehub paper_april
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
effects of Social media
effects of Social mediaeffects of Social media
effects of Social media
 
Socialmediaandethics 111104203630-phpapp02
Socialmediaandethics 111104203630-phpapp02Socialmediaandethics 111104203630-phpapp02
Socialmediaandethics 111104203630-phpapp02
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
Sns1
Sns1Sns1
Sns1
 
H018144450
H018144450H018144450
H018144450
 
FSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSU FAME Conference Presentation Slides
FSU FAME Conference Presentation Slides
 
Chapter One MediaSociety in a Digital WorldNote Read the summ.docx
Chapter One MediaSociety in a Digital WorldNote Read the summ.docxChapter One MediaSociety in a Digital WorldNote Read the summ.docx
Chapter One MediaSociety in a Digital WorldNote Read the summ.docx
 
Vc 2 Oct09
Vc 2 Oct09Vc 2 Oct09
Vc 2 Oct09
 
Social media time_management_tools_and_tips
Social media time_management_tools_and_tipsSocial media time_management_tools_and_tips
Social media time_management_tools_and_tips
 
Social Media Tools for Academic Library Services
Social Media Tools for Academic Library ServicesSocial Media Tools for Academic Library Services
Social Media Tools for Academic Library Services
 

Mehr von Anne Arendt

Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Anne Arendt
 
Creation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesCreation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesAnne Arendt
 
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Anne Arendt
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Anne Arendt
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Anne Arendt
 
web 2.0 (Social Media) Policy in Higher Education
web 2.0 (Social Media) Policy in Higher Educationweb 2.0 (Social Media) Policy in Higher Education
web 2.0 (Social Media) Policy in Higher EducationAnne Arendt
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsAnne Arendt
 
OER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonOER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonAnne Arendt
 

Mehr von Anne Arendt (8)

Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)
 
Creation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and DisincentivesCreation of a Statewide Survey of Incentives and Disincentives
Creation of a Statewide Survey of Incentives and Disincentives
 
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
Creation of a Statewide Survey of Incentives and Disincentives for the Use of...
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
 
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
Teaching with Technology Idea Exchange (TTIX) Presentation 06.10.10
 
web 2.0 (Social Media) Policy in Higher Education
web 2.0 (Social Media) Policy in Higher Educationweb 2.0 (Social Media) Policy in Higher Education
web 2.0 (Social Media) Policy in Higher Education
 
How to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative CommonsHow to Commit a Legal Rip-off: Creative Commons
How to Commit a Legal Rip-off: Creative Commons
 
OER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic CompositonOER and OCW Use in the Basic Compositon
OER and OCW Use in the Basic Compositon
 

Kürzlich hochgeladen

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Kürzlich hochgeladen (20)

Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Final DRAFT: Go Ahead and Shoot Me: The Wild West of Online Video and Image Sharing

  • 1. Go Ahead and Shoot Me Go Ahead and Shoot Me: The Wild West of Online Video and Image Sharing Anne Arendt, Utah Valley University Last update: 2/28/2011 CAVEAT: BELOW INFORMATION IS FOR DISCUSSION ONLY AND NOT INTENDED TO BE LEGAL ADVICE A new and perhaps growing issue for educational institutions such as ours is the role of recorded video/audio shot by individuals either on campus or in the name of the institution. This report intends to start the discussion of what the issues and guidelines are for this issue across the United States as well as at our own institutions. Minor emphasis is placed on the state of Utah throughout this report. SITUATIONAL ANALYSIS Let’s consider how long social media resources have been around. The timeline is striking, for example: Wikipedia (online encyclopedia) 2001; del.icio.us (social bookmarking) 2003; MySpace 2003 (social networking); Facebook (social networking) 2004; Flikr (social media) 2004; Bebo (social networking) 2005; and YouTube (social media) 2005 (Higher Education Academy and the Joint Information Systems Committee 2009). Now let us consider how these new tools are being used by younger generations. Consider these numbers for 11-15 year olds in the United Kingdom: • Having at least one social networking site 75% • Using email and instant messaging 90% • Playing online multiplayer games 60% • Owning an MP3 player 80% • Owning a mobile phone with camera 85% (Higher Education Academy and the Joint Information Systems Committee 2009). Based on a PEW study in the United States, “Forty-seven percent of adult U.S. Internet users use online social networks, and 19 percent now use Twitter or other status update services, according to research by the Pew Internet and American Life Project.” It continues, “The survey also highlighted the fact that use of Twitter and similar services is more popular among younger users, with 37 percent of 18-24 year olds and 31 percent of 25-34 year olds claiming to use it. This compares with 19 percent of 35-44 year olds, and 10 percent of 45-64 year olds” (Marshall 2009). As we look at how we as educators are to become involved in these new environments it may serve us well to consider the vast array of environments, norms, expectations, and situations that exist. Higher Education Academy and the Joint Information Systems Committee notes, “The consequences of this generation’s experience have become increasingly apparent over time. In general, they include a strong sense of a community linked in its own virtual spaces of blogs and social networking and gaming sites; a similarly strong sense of group identity; and a disposition to share and to participate. They also include impatience – a preference for instant answers; a downgrading of text in favour of image; and a casual approach to evaluating information and attributing it, and also to copyright and legal constraints” (2009). As this younger generation joins higher education, the environment within which we work will continue to transition—not just in the tools available but also in how we choose to use them. Therefore, we need to start addressing how we will prepare for these changes. “The generation born in the 1990s entered a world of high technological sophistication and has grown up accommodating and influencing yet further advances on the ICT [Information and Communication Technologies] front in particular. Generally speaking, its members are familiar and entirely at ease with the design of these technologies, unafraid of experimenting with them, and take for granted and get on with doing all that they allow – talking, messaging, playing online games, sharing images, finding things out – often simultaneously. Moreover, most of their learning about it, and how to use it, comes from their peers. ICT, and the Social Web especially, is their medium and their metier. It is integral to the world they know and that world is the only 1
  • 2. Go Ahead and Shoot Me one they have known. There is no going back from this position. Indeed, it can only become more firmly established as the norm by subsequent generations, and not just in the UK but worldwide” (Higher Education Academy and the Joint Information Systems Committee 2009). OVERVIEW OF SOCIAL MEDIA TOOLS Whereas the original Web was more of a one-way medium with content going from the publisher to the reader, Social media is a bi-directional medium where people interact with each other and/or with the content. Basically, it is a change from an environment with a few content authors and many readers to one in which users generate, re-purpose, and consume shared content. As the Consortium for School Networking (CoSN) notes, “Social media is defined as an online application that uses the World Wide Web (www) as a platform and allows for participatory involvement, collaboration, and interactions among users. Social media is also characterized by the creation and sharing of intellectual and social resources by end users” (2009). Examples of Social media applications include items such as web logs or blogs; online diaries that allow the originator and readers to state ideas and react; wikis, which are topical collections of information that can be edited by multiple individuals within a group; social networking sites where users can create personalized pages of information and interact with others ; or file sharing sites where users can share images, audio, video and more. In addition to these, there are services that allow users to participate in various group activities and to complete, individually or collaboratively, a variety of tasks such as document creation and editing that would previously have relied upon software on a local computer (CoSN 2009; Albion 2008). Social media applications like online communities, blogs, and wikis should not be thought of as just a passing fad or idle socializing, but as an activity that has embedded itself into the way work gets done (Demski, 2009). As Albion notes in Social media in Teacher Education, “Social media represents a more participative and potentially paradigm-changing environment for building and sharing knowledge. Some educators have begun to apply these tools in classrooms but, as their use in society expands, there will be expectations for their wider application in schools.” (2008). He continues, “As social media develops, it will not be possible for educators at any level to ignore it. Society, especially employers, will expect education to develop essential skills with the new tools, and learners already familiar with the tools will expect to be able to apply their knowledge and skills while learning” (Albion 2008). For the purposes of this paper, we will look specifically at the effects of video and images distribution within these technologies. The most common place of occurrence for these are inside of social networking sites and in photo or video sharing sites such as Youtube. SOCIAL NETWORKING AND PROFILES As Wikipedia notes, "A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. Most social network services are web based and provide a variety of ways for users to interact, such as e- mail and instant messaging services.” It includes sites such as Facebook and MySpace that are open for anyone to subscribe to, or can be more limited/controlled sites such as Ning, Lymabean, or Saywire. PHOTO AND VIDEO SHARING AND EDITING There are a multitude of sites that permit you to share images. This includes sites such as Flickr, Picnik, Picasa (Google), Webshots, Photobucket, or YouPublish to name a few. There is also a multitude of sites that permit you to share videos. This includes site such as Youtube, Vimeo, Viddler, Ustream, Teachertube, Yahoo Video, or Graspr. Most of our attention will be on the sharing of video, as that is an area with a fair amount of ambiguity, even when it comes to adherence to laws and policies already in existence. 2
  • 3. Go Ahead and Shoot Me LAWS & POLICIES THAT ALREADY EXIST First, we need to consider the laws and policies that already exist and affect the posting of video and images. These include more historic regulations such as freedom of speech as well as newer regulations such as anti-bullying regulations. FREEDOM OF SPEECH/EXPRESSION Freedom of speech (expression) in the United States is protected by the First Amendment to the United States Constitution and by many state constitutions and state and federal laws. FIRST AMENDMENT TO THE U.S. CONSTITUTION (RELIGION AND EXPRESSION) The First Amendment to the United States Constitution is part of the Bill of Rights and was adopted in 1791. It provides that: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. It should be noted that court decisions have expanded this concept to include not just verbal communication but also non-verbal expressions such as wearing a symbol, dance movements, or silent vigils. UNIVERSAL DECLARATION OF HUMAN RIGHTS The right to freedom of speech is recognized as a human right under Article 19 of the Universal Declaration of Human Rights and recognized in international human rights law in the International Covenant on Civil and Political Rights (ICCPR). As stated by the Global Network Initiative: Freedom of Expression: Freedom of expression is defined using Article 19 of the Universal Declaration of Human Rights (UDHR) and Article 19 of the International Covenant on Civil and Political Rights (ICCPR): UDHR: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. ICCPR: 1. Everyone shall have the right to hold opinions without interference. 2. Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice. 3. The exercise of the rights provided for in paragraph 2 of this article carries with it special duties and responsibilities. It may therefore be subject to certain restrictions, but these shall only be such as are provided by law and are necessary: (a) For respect of the rights or reputations of others; (b) For the protection of national security or of public order (ordre public), or of public health or morals. The Global Network Initiative notes: “Freedom of opinion and expression is a human right and guarantor of human dignity. The right to freedom of opinion and expression includes the freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. Freedom of opinion and expression supports an informed citizenry and is vital to ensuring public and private sector accountability. Broad public access to information and the freedom to create and communicate ideas are critical to the advancement of knowledge, economic opportunity and human potential. 3
  • 4. Go Ahead and Shoot Me The right to freedom of expression should not be restricted by governments, except in narrowly defined circumstances based on internationally recognized laws or standards. These restrictions should be consistent with international human rights laws and standards, the rule of law and be necessary and proportionate for the relevant purpose. Participating companies will respect and protect the freedom of expression of their users by seeking to avoid or minimize the impact of government restrictions on freedom of expression, including restrictions on the information available to users and the opportunities for users to create and communicate ideas and information, regardless of frontiers or media of communication” (2009). While freedom of speech regulation encourages creative and free expressions, these expressions must be done within the context of copyright and intellectual property. COPYRIGHT AND INTELLECTUAL PROPERTY Generally speaking, we have well established rules and norms for individual, joint, institutional and vendor IP ownership. We also have reasonably well established academic norms for attribution. However, the devil is in the details (Cate 2009). We can now distribute rights almost any way we want to distribute them. Copyright and intellectual property policy and enforcement includes a number of areas such as patents, trademarks, trade secrets, right of publicity, and copyrights. As the United State Copyright Office states: Copyright is a form of protection provided by the laws of the United States (title 17, U. S. Code) to the authors of “original works of authorship,” including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works. Section 106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to authorize others to do the following: • To reproduce the work in copies or phonorecords; • To prepare derivative works based upon the work; • To distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending; • To perform the work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works; • To display the work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work; and • In the case of sound recordings,* to perform the work publicly by means of a digital audio transmission. In addition, certain authors of works of visual art have the rights of attribution and integrity as described in section 106A of the 1976 Copyright Act. For further information, see Circular 40, Copyright Registration for Works of the Visual Arts. It is illegal for anyone to violate any of the rights provided by the copyright law to the owner of copyright. These rights, however, are not unlimited in scope. Sections 107 through 121 of the 1976 Copyright Act establish limitations on these rights. In some cases, these limitations are specified exemptions from copyright liability. One major limitation is the doctrine of “fair use,” which is given a statutory basis in section 107 of the 1976 Copyright Act. In other instances, the limitation takes the form of a “compulsory license” under which certain limited uses of copyrighted works are permitted upon payment of specified royalties and compliance with statutory conditions.” (United States Copyright Office). 4
  • 5. Go Ahead and Shoot Me FAIR USE Sometimes, what we do as educators is protected by fair use. Fair use allows for limited use of copyrighted materials without permissions from rights holders. An example may be a critical review. As noted by the U.S. Copyright notice, fair use is defined as follows: The doctrine of fair use has developed through a substantial number of court decisions over the years and has been codified in section 107 of the copyright law. Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. Section 107 also sets out four factors to be considered in determining whether or not a particular use is fair: 1. The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes 2. The nature of the copyrighted work 3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole 4. The effect of the use upon the potential market for, or value of, the copyrighted work The distinction between fair use and infringement may be unclear and not easily defined. There is no specific number of words, lines, or notes that may safely be taken without permission. Acknowledging the source of the copyrighted material does not substitute for obtaining permission. COPYRIGHT IN EDUCATION Copyright law provides educators with a separate set of rights in addition to fair use, to display (show) and perform (show or play) others' works in the classroom. These rights are in Section 110(1) of the Copyright Act and apply to any work, regardless of the medium: § 110. Limitations on exclusive rights: Exemption of certain performances and displays Notwithstanding the provisions of section 106, the following are not infringements of copyright: (1) performance or display of a work by instructors or pupils in the course of face-to-face teaching activities of a nonprofit educational institution, in a classroom or similar place devoted to instruction, unless, in the case of a motion picture or other audiovisual work, the performance, or the display of individual images, is given by means of a copy that was not lawfully made under this title, and that the person responsible for the performance knew or had reason to believe was not lawfully made; TEACH ACT Signed by President Bush on November 2, 2002, the Technology, Education, and Copyright Harmonization (TEACH) Act "facilitates and enables the performance and display of copyrighted materials for distance education by accredited, non-profit educational institutions (and some government entities) that meet the TEACH Act’s qualifying requirements. Its primary purpose is to balance the needs of distance learners and educators with the rights of copyright holders. The TEACH Act applies to distance education that includes the participation of any enrolled student, on or off campus" (Copyright Clearance Center). RIGHT OF PUBLICITY The right of publicity is a state-set rule regarding the right to control the commercial use of one’s identity which generally includes name, image and likeness; however, it varies from state to state. Right of 5
  • 6. Go Ahead and Shoot Me publicity is part of the intellectual property family. Currently, Utah is one of nineteen states that recognize the right of publicity via statutes (Right of Publicity). In Utah it specifically related to newspapers and radio broadcasting. To learn more see Utah Code 1993, Title 45, Newspapers and Radio Broadcasting Chapter 3 Abuse of Personal Identity (Right of Publicity 2009b; Roesler, 2011). These policies leave much grey area when it comes to Web 2.0 and social media technologies; particularly when these technologies are outside of a traditional or online classroom setting. ANTI-CIRCUMVENTION Anti-circumvention laws prohibit the circumvention of technological barriers for using a digital resources in certain ways which the rights holders do not wish to allow. WIPO COPYRIGHT TREATY & THE DIGITAL MILLIENNIUM COPYRIGHT ACT The World Intellectual Property Organization Copyright Treaty (WIPO) is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. The United States entered into the force in 2002. The WIPO Copyright Treaty is implemented in United States law by the Digital Millennium Copyright Act or DMCA (WIPO 1996; Wikipedia, 2009b). The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998 by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of on-line services for copyright infringement by their users (Wikipedia, 2009a). Assuming we have all necessary copyright and intellectual property clearances, our freedom of expression may also be impacted by rules relating to privacy and data protection. PRIVACY, DATA PROTECTION AND FREEDOM OF INFORMATION In considering privacy, data protection, and freedom of information laws, we need to consider normative and ethical issues as well as legal ones. PRIVACY Privacy is something we all seem to want in some cases and all seem to be willing to give up in others. “Privacy is an important, but illusive concept in law. The right to privacy is acknowledged in several broad- based international agreements. Article 12 of the Universal Declaration of Human Rights and Article 17 of the United Nations International Covenant on Civil and Political Rights both state that, ‘No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks’” (Stratford & Stratford 1998). Stratford and Stratford note, “The term “privacy” does not appear in the U.S. Constitution or the Bill of Rights. However, the U.S. Supreme Court has ruled in favor of various privacy interests-deriving the right to privacy from the First, Third, Fourth, Fifth, Ninth, and Fourteenth Amendments to the Constitution” (1998). As stated by the Global Network Initiative: 6
  • 7. Go Ahead and Shoot Me Privacy: Privacy is defined using Article 12 of the Universal Declaration of Human Rights (UDHR) and Article 17 of the International Covenant on Civil and Political Rights (ICCPR): UDHR: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. ICCPR: 1. No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. 2. Everyone has the right to the protection of the law against such interference or attacks. The Global Network Initiative notes, ““Privacy is a human right and guarantor of human dignity. Privacy is important to maintaining personal security, protecting identity and promoting freedom of expression in the digital age. Everyone should be free from illegal or arbitrary interference with the right to privacy and should have the right to the protection of the law against such interference or attacks. The right to privacy should not be restricted by governments, except in narrowly defined circumstances based on internationally recognized laws and standards. These restrictions should be consistent with international human rights laws and standards, the rule of law and be necessary and proportionate for the relevant purpose” (2009). “The Privacy Act (PL 93-579) is a companion to and extension of the Freedom of Information Act (FOIA) of 1966. FOIA was primarily intended to provide access to government information. It did exempt the disclosure of personnel and medical files that would constitute “a clearly unwarranted invasion of personal privacy” [12]. This provision was initially used to deny access to people requesting their own records. So the Privacy Act was also adopted both to protect personal information in federal databases and to provide individuals with certain rights over information contained in those databases. The act has been characterized as “the centerpiece of U.S. privacy law affecting government record-keeping” [13]. The act was developed explicitly to address the problems posed by electronic technologies and personal records systems and covers the vast majority of personal records systems maintained by the federal government. The act set forth some basic principles of “fair information practice,” and provided individuals with the right of access to information about themselves and the right to challenge the contents of records. It requires that personal information may only be disclosed with the individual’s consent or for purposes announced in advance. The act also requires federal agencies to publish an annual list of systems maintained by the agency that contain personal information” (Statford & Stratford, 1998). DATA PROTECTION Associated to online video and audio recording, although likely not directly related, are laws and regulations relating to the protection of individual data. The Federal Trade Commission is educating consumers and businesses about the importance of personal information privacy, including the security of personal information. Under the FTC Act, the Commission guards against unfairness and deception by enforcing companies' privacy promises about how they collect, use and secure consumers' personal information. Under the Gramm-Leach-Bliley Act, the Commission has implemented rules concerning financial privacy notices and the administrative, technical and physical safeguarding of personal information, and it aggressively enforces against pretexting (Federal Trade Commission). It should be noted that the United States does not treat personal data privacy in the same manner as some other countries. “Where the U.S. approach has been to provide specific and narrowly applicable legislation, in Europe there are unified supra-national policies for the region. Most countries have implemented these policies with omnibus legislation. The European legislation outlines a set of rights and principle for the treatment of personal data, without regard to whether the data is held in the public or 7
  • 8. Go Ahead and Shoot Me private sector. In the United States, the legal tradition is much more concerned with regulating data collected by the federal government" (Stratford & Stratford 1998).” U.S. SAFE WEB ACT OF 2006 Associated to online video and audio recording, although likely not directly related, are laws and regulations relating to spam, spyware, or fraud. Congress approved S. 1608, the “Undertaking Spam, Spyware, And Fraud Enforcement with Enforcers beyond Borders Act of 2006,” (the US SAFE WEB Act of 2006) on December 9, 2006. The US Safe Web Act amends the Federal Trade Commission Act (FTCA) and improves the Federal Trade Commission (FTC)’s ability to protect consumers from international fraud by: (1) improving the FTC’s ability to gather information and coordinate investigation efforts with foreign counterparts; and (2) enhance the FTC’s ability to obtain monetary consumer redress in cases involving spam, spyware, and Internet fraud and deception (Brownlee 2006). LIABILITY There are three types of liability issues that should be taken into account in relation to an institution’s use of Web 2.0 technologies: 1. Contract based liability due to breach of contract 2. Negligence based liability due to failure to meet the required standard of care 3. Specific liabilities such as for defamatory or obscene content HARASSMENT AND DEFAMATION Utah has general bullying and hazing laws for the state system of public education. The bill HB 325 creates a statewide definition of bullying and hazing and outlines the minimum standards for bullying and hazing policies in local districts and charter schools (Equality Utah 2011). However not all harassment or defamation will fall under the category of direct bullying. To some degree we are also protected by local codes of conduct or campus policies. As Cate points out, “Some examples of potential liability may include, but is not limited to, harassment, defamation, and other online nastiness. We, as institutions, have student codes of conduct and employee/faculty codes of conduct. These apply to social media worlds. Harassment, defamation and other online nastiness doesn’t require new rules (legal or policy issues), but instead now we can just engage in so much more communication there is more scope and potential for conflict” (2009). Even considering anti bullying regulations and our own local institutional regulations, it is likely that the social media world is nebulous. In some cases the social media may offer even more restrictions, and in some cases it may offer less—as well as limited ability to enforce local policies. As Cate points out, “When you are using public sites there are some interesting twists. The terms of use of a site may limit speech more than the institution does or the first amendment does. The public site could actually remove participants for speech that institutions of higher education would or must permit” (2009). Assuming one is not in violation of privacy laws and one has necessary copyright clearances, ones freedom of expression may also be affected by system specific policies. SYSTEM SPECIFIC POLCIES In addition to federal and state laws, you have policies and guidelines that dictate how the technologies themselves can be used. These are what often offer a company or website the ability to reject or remove content it sees as not fitting. YOUTUBE POLICIES 8
  • 9. Go Ahead and Shoot Me As an example we will consider Youtube policies, since many of our examples come from this website. Youtube permits anyone to post a video but also permits anyone to report a video that one feels may be in violation of the Youtube policies. Sex & Nudity Most nudity is not allowed, particularly if it is in a sexual context. Generally if a video is intended to be sexually provocative, it is less likely to be acceptable for YouTube. There are exceptions for some educational, documentary, scientific, and artistic content, but only if that is the sole purpose of the video and it is not gratuitously graphic. For example, a documentary on breast cancer would be appropriate, but posting clips out of context from the documentary might not be. Hate Speech "Hate speech" refers to content that promotes hatred against members of a protected group. For instance, racist or sexist content may be considered hate speech. Sometimes there is a fine line between what is and what is not considered hate speech. For instance, it is generally okay to criticize a nation, but not okay to make insulting generalizations about people of a particular nationality. Shocking and Disgusting The world is a dangerous place. Sometimes people do get hurt and it’s inevitable that these events may be documented on YouTube. However, it’s not okay to post violent or gory content that’s primarily intended to be shocking, sensational or disrespectful. If a video is particularly graphic or disturbing, it should be balanced with additional context and information. For instance, including a clip from a slaughter house in a video on factory farming may be appropriate. However, stringing together unrelated and gruesome clips of animals being slaughtered in a video may be considered gratuitous if its purpose is to shock rather than illustrate. Dangerous Illegal Acts While it might not seem fair to say you can’t show something because of what viewers theoretically might do in response, we draw the line at content that’s intended to incite violence or encourage dangerous, illegal activities that have an inherent risk of serious physical harm or death. This means not posting videos on things like instructional bomb making, ninja assassin training, sniper attacks, videos that train terrorists, or tips on illegal street racing. Any depictions like these should be educational or documentary and shouldn’t be designed to help or encourage others to imitate them. Children Videos involving children (anyone under the age of 18) are particularly sensitive. Videos containing children should never be sexually suggestive or violent. Please be cautious when posting something involving a child. If you’re sharing a private moment or home movie, consider making it a private video so that only your family and friends can see it. Copyright When you create something original, you own the copyright for it. Likewise, when other people create content, they may have a copyright to it. As a creative community, it’s essential that everyone on YouTube respect the copyrights of others. If you’re not sure if something will violate someone’s copyright, the safest thing to do is to create something completely original, with images and audio you’ve created. If it’s all yours you never have to worry about copyright—you own it. If you’ve recorded something from a DVD, videotaped your TV screen, or downloaded a video online, don’t post it unless you have permission. Privacy If a video you've recorded features people who are readily identifiable and who haven't consented to being filmed, there's a chance they'll file a privacy complaint seeking its removal. We'll notify you if that happens and give you a chance to edit and re-upload your video before we act on the complaint. If we do remove your video for privacy reasons, don't upload another version featuring the same people. Chances are those people will file another privacy complaint or report you for harassment. Don't post other people's personal information, including phone numbers, addresses, credit card numbers, and government IDs. We're serious about keeping our users safe and suspend accounts that violate people's privacy. 9
  • 10. Go Ahead and Shoot Me Harassment It comes down to respect. YouTube is all about sharing and interacting with the community in respectful ways. If you're not sure whether a video or comment you've made crosses the line, follow a simple rule of thumb: if you wouldn't say it to someone's face, don't say it on YouTube. And if you're looking to attack, harass, demean, or impersonate others, go elsewhere. Impersonation Impersonating another user by copying someone's exact channel layout, using a similar username, or posing as that person in comments, emails or videos is considered harassment. If you want to keep your account, stay away from participating in any form of impersonation or harassing activity on the site. Threats Users shouldn't feel threatened when they're on YouTube. Period. Don't leave threatening comments on other people's videos (Youtube 2011). RECORDING OF INDIVIDUALS WITHOUT THEIR CONSENT So, what are the rules relating to recording of individuals without their consent and they are in a public place? Well, it depends what state you are in, and if you are including audio as well as video. The audio may cause you bigger problems. Video Most video recordings are legal with or without consent. There are very few laws that prohibit video recording of any kind, but there are laws in some areas dealing with areas of expected privacy. Generally, it is perfectly legal to videotape or photograph any person and anything while on public property, except: • You cannot take pictures of areas that are usually considered private such as bedrooms, bathrooms, changing rooms, locker rooms, hotel rooms and so on • Certain public places have banned the use of cameras such as mass transit systems, courthouses, capital buildings, secured government buildings, jails or prisons unless you obtain written permission • You cannot film or photograph if it interferes with police, fire, medical or emergency operations There are also restrictions on videotaping and photographing on private property: • If the private property is open to the public, such as retail stores, private stadiums or tourist areas, filming may be allowed unless there are signs posted that expressly forbid videotaping or photography • If the private property belongs to someone other than a commercial business, you had better get the property owner's permission (Palmvid 2011; New Media Rights 2011; Lawyers.com 2011). Audio Unlike with video, most audio recordings without consent of one or all parties are illegal. This, in part, is because audio recording has been around for far longer and has been historically more widely used and disbursed. There are two types of defined recording situations for audio recording. They are usually referred to as one-party consent and two-party consent. 10
  • 11. Go Ahead and Shoot Me As Palmvid describes, “’One Party Consent’ means that only the person doing the recording has to give consent and does not have to notify the other party or parties that the conversation is being recorded. ‘Two Party Consent’ means the person recording the conversation must notify all of the other parties that the recording is taking place and they must consent to the recording” (2011). In Utah we have one-party consent as noted by the Reporters Committee for Freedom of the Press: An individual legally can record or disclose the contents of any wire, oral or electronic communication to which he is a party, or when at least one participant has consented to the recording, unless the person has a criminal or tortious purpose in making the recording. Utah Code Ann. § 77-23a-4. Under the statute, consent is not required for the taping of a non-electronic communication uttered by a person who does not have a reasonable expectation of privacy in that communication. See definition of “oral communication,” Utah Code Ann. § 77-23a-3. Unlawful interception of communication, including disclosure of the contents of a communication with reason to know of the illegal origin, is a felony—except that when the communication consists of the radio portion of a cellular telephone call, it is a misdemeanor. Civil liability for unlawful interception can include the greater of actual damages, mandatory damages ranging from $50 to $1,000, depending on whether it is a first or subsequent offense, $100 per day of violation, or $10,000. Equitable or declarative relief is also available under the statute. Civil actions are governed by a two-year statute of limitations. Utah Code Ann. § 77-23a-11. Installing a hidden camera or audio recorder to tape a person in a “private place” without consent is a misdemeanor. Utah Code Ann. § 76-9-402. A “private place” is a place where one may reasonably expect to be safe from intrusion or surveillance. Utah Code Ann. §76-9-401. (Reporters Committee for Freedom of the Press 2011) So, there are few if any regulations in relation to video recording, and only limited regulation of audio in Utah. What affect could this have in education? If you want a recent case in which to consider, take a look at the Rutger’s University Tyler Clementi case from 2010. RECENT CASES IN THE NEWS RUTGERS CLEMENTI CASE - INVASION OF PRIVACY A Rutgers University freshman posted a goodbye message on his Facebook page before jumping to his death after his roommate secretly filmed him during a intimate encounter in his dorm room and posted it live on the Internet. Not only are the students who recorded and posted the video in legal battles now, but so is the institution for not protecting the rights and privacy of the student. In a nutshell here what occurred is that two students, Dharun Ravi and Molly Wei, have been charged with two counts each of invasion of privacy after allegedly placing a camera in Clementi's room and livestreaming the recording online on Sept. 19, according to a written statement by New Jersey's Middlesex County Prosecutor Bruce Kaplan. Under New Jersey's invasion-of-privacy statutes, it is a fourth degree crime to collect or view images depicting nudity or sexual contact involving another individual without that person's consent, and it is a third degree crime to transmit or distribute such images. The penalty for conviction of a third degree offense can include a prison term of up to five years (Friedman, 2010). Equally the institution is struggling with a definition of what is harassment and what control or monitoring educational institutions should have over student conduct online (Stripling, 2011). 11
  • 12. Go Ahead and Shoot Me Please note that above is simply an overview of things to consider. There are many other angles that may be relevant based on your individual situation. OTHER ISSUES TO CONSIDER NO SINGLE OWNER Increasingly on the Internet, information and resources are becoming shared resources were there are no single owners or authors of intellectual property. As Bruwelheide notes, “in today’s environment, ownership may be shared with several individuals or organizations as new technology encourages development of multimedia products using a variety of formats and pieces which may involve multiple layers of copyrighted materials” (1999). ABILITY TO REMOVE A VIDEO FROM THE PUBLIC Once a video or image has gone public, it is nearly impossible to remove all instances of that file based on the rapid distribution, copying, and redistribution of files via the Internet. The best we can do as educators is to continue to ask ourselves questions and to continue to be inquisitive as to what new laws and standards are developing in regard to online sharing of files and resources. One area to consider in particular, as it is developing rapidly at the writing of this paper, is cyber-bullying. QUESTIONS TO ASK YOURSELF Who is responsible? • The system upon which the video is shared (website, twitter, web server, email) • The site if they are given a take down request (by whom) • The owner of the system used to post the images/video (consider public locations like libraries) • The person(s) posting the video o What if they were not the originator? • The originator(s) of the video o What if they shared it privately but those users then shared it publically? • The users of the site or system What if there is not a single originator or distributer of the content? Does it matter when and where the video/image was posted? Does it matter who the original intended audience was? Does intent matter? 12
  • 13. Go Ahead and Shoot Me REFERENCES Albion, Peter. 2008, September. Social media in Teacher Education: Two Imperatives for Action. Computers in the Schools, 25(3/4), 181-198. Retrieved July 21, 2009, doi:10.1080/07380560802368173 from http://eprints.usq.edu.au/4553/1/Albion_Web_2.0_in_teacher_education.pdf Brownlee, C. 2006, December 13. U.S. Safe Web Act of 2006. Privacy and Security Law Blog. Retreived November 4, 2009 from http://www.privsecblog.com/2006/12/articles/spam/us-safe-web-act- of-2006/ Bruwelheide, J. H. 1999. Intellectual Property and Copyright: Protecting Educational Interests and Managing Changing Environments. Retrieved November 3, 2009 from http://net.educause.edu/ir/library/html/edu9935/edu9935.html Cate, B. 2009. The Law and Policy of Web 2.0: Much Old, Some New, Lots Borrowed, So Don't Be Blue. Educuase Learning Initative. Retrieved from http://hosted.mediasite.com/mediasite/Viewer/? peid=98e83dc76b9749f3a08996bfb0f5904b Center for Cognitive Liberty & Ethics. 2009. Freedom of Thought & the First Amendment. Retrieved November 3, 2009 from http://www.cognitiveliberty.org/issues/first_amend_index.html Consortium for School Networking (CoSN). 2009. Leadership for Social media in Education: Promise and Reality. Retrieved July 22, 2009, from Consortium for School Networking (CoSN) Advancing K-12 Technology Leadership Web site: http://www.CoSN.org/Portals/7/docs/Web%202.0/ExecSummaryCoSN %20Report042809Final.pdf Demski, J. 2009. Facebook Training Wheels. T H E Journal, 36(4), 24-28. Retrieved July 21, 2009, from Academic Search Premier database. Copyright Clearance Center. 2005. The TEACH act: New roles, rules and responsibilities for academic institutions. Retrieved November 3, 2009 from http://www.copyright.com/media/pdfs/CR-Teach-Act.pdf Directorate for Science, Technology, and Industry Committee for Information, Computer and Communications Policy (DSTI/ICCP). 2009. Working Party on Information Security and Privacy The Role of Digital Identity Management in the Internet Economy: A Primer for Policy Makers. Retrieved from http:// www.oecd.org/dataoecd/55/48/43091476.pdf Equality Utah 2011. Support HB 325, Bullying and Hazing by Representative Spackman-Moss. Retrieved February 28, 2011 from http://www.equalityutah.org/bullyinghazingfact.pdf Friedman, E. 2010. ABC News. Victim of Secret Dorm Sex Tape Posts Facebook Goodbye, Jumps to His Death. Retrieved February 25, 2011 from http://abcnews.go.com/US/victim-secret-dorm-sex-tape- commits-suicide/story?id=11758716 Global Network Initiative. 2008. Global Network Initiative Principles. Retrieved February 28, 2011 from http://www.globalnetworkinitiative.org/principles/index.php#18 Higher Education Academy and the Joint Information Systems Committee. 2009. Higher Education in a Web 2.0 World. Retrieved October 21, 2009 from http://www.jisc.ac.uk/media/documents/publications/heweb20rptv1.pdf 13
  • 14. Go Ahead and Shoot Me JISC Legal. 2008a. Web 2.0 and the law for HE policy makers. Retrieved from http://www.jisclegal.ac.uk/ Portals/12/Documents/PDFs/Web2_HE_Policy_Makers.pdf JISC Legal. 2008b. Web 2.0 and the law for information services. Retrieved from http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/Web2_Information_Services.pdf JISC Legal. 2008c. Social media and the Law for HE Policy Makers. Retrieved from http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/Web2_HE_Policy_Makers.pdf Lawyers.com. 2011. Photography or Video Taping Consent. Retrieved February 25, 2011 from http://communications-media.lawyers.com/privacy-law/Photography-or-Video-Taping-Consent.html Marshall, J. 2009. 20% of U.S. Adults use Twitter, Says Pew. Retrieved November 4, 2009 from http://www.clickz.com/3635448 New Media Rights. 2011. Field Guide to Secret Audio and Video Recordings. Retrieved February 25, 2011 from http://www.newmediarights.org/page/field_guide_audio_and_video_recordings#Video Palmvid Video Security Cameras. 2011. Legal Information Regarding Audio and Video Recording. Retrieved February 25, 2011 from http://www.palmvid.com/content/support/legal-information-regarding- audio-and-video-recording.html Privireal. 2005. United States – Data Protection. Retrieved November 4, 2009 from http://www.privireal.org/content/dp/usa.php Reporters Committee for Freedom of the Press. 2011. A Practical Guide to Taping Phone Calls and In- Person Conversations in the 50 States and D.C. Retrieved February 25, 2011 from http://www.rcfp.org/taping/states/utah.html Right of Publicity. 2009. Statutes. Retrieved November 3, 2009 from http://rightofpublicity.com/statutes Right of Publicity. 2009b. Utah Code 1953. Retrieved February 28, 2011 from http://rightofpublicity.com/statutes/utah Roesler, Mark. 2011. Utah Code 1953. Retrieved February 28, 2011 from http://www.markroesler.com/pdf/statutes/Utah_ROP_1999.pdf Stratford, J.S. & Stratford, J. 1998. Data Protection and Privacy in the United States and Europe. IASSIST Quarterly. 22(1). Retrieved October 21, 2009 from http://iassistdata.org/publications/iq/iq22/iqvol223stratford.pdf Stripling, J. 2011. Panelists Debate How Far Colleges Should Go to Monitor Online Behavior. The Chronicle of Higher Education Technology News. Retrieved February 28, 2011 from http://chronicle.com/ article/Panelists-Debate-How-Far/126298/ U.S. Department of Justice, Civil Rights Division. 2009. A Guide to Disabiilty Rights Laws. Retrieved October 31, 2009 from http://www.ada.gov/cguide.htm#anchor62335 14
  • 15. Go Ahead and Shoot Me United States Copyright Office. 2008. Copyright Office. Library of Congress. Retrieved November 3, 2009 from http://www.copyright.gov/circs/circ1.pdf. Wikipedia. 2009a. Digital Millennium Copyright Act. Retrieved November 4, 2009 from http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act Wikipedia. 2009b. World Intellectual Property Organization Copyright Treaty. Retrieved November 4, 2009 from http://en.wikipedia.org/wiki/World_Intellectual_Property_Organization_Copyright_Treaty World Intellectual Property Organization. 1996. WIPO Copyright Treaty. Retrieved February 28, 2011 from http://www.wipo.int/treaties/en/ip/wct/trtdocs_wo033.html Youtube. 2011. YouTube Community Guidelines. Retrieved February 25, 2001 from http://www.youtube.com/t/community_guidelines 15