Digital Property

From SI410
Revision as of 17:42, 22 April 2019 by Avaranda (Talk | contribs) (changed formatting and some wording)

Jump to: navigation, search
An Expanding Digital Property Network [1]

Digital Property or digital assets consists of all data and information owned by someone in digital form. This pertains to anything that can be stored on computers either on personal hard drives or circulating around the internet or any asset converted to binary form. Digital property ranges from word documents, emails, and code files, to photos, videos, audio attachments[2]. This variety in digital property gets even more complicated when attempting to categorize the data into physical property within files or intellectual property of the ideas running throughout the objects. What makes digital property the most non-comformative in nature is its lack of solid presence that is typical of personal property. This makes it difficult to track, monitor, and protect digital property.


An Expanding Empire of Digital Property

The notion of digital property first appeared in a paper by Albert van Niekerk in 2007 proposing management strategies of media assets (MAM). Niekerk characterized digital assets as having the traits of binary form and classified rights to ownership. Two of the three forms of digital assets, images and multimedia, Niekerk proposed should fall under the definition of a media asset and the other textual content is not discussed in great detail in his paper. [3] In 2013, this definition was further expanded in the paper A New Asset Type: Digital Assets which added the characteristics of reusability and longevity to list of attributes defining a digital asset.[4] As the digital world is expanding at an unprecedented speed as individuals and businesses move towards the trend of greater online presence. In other words, information is being commercialized and distributed in mass and the presence of digital assets holding monetary or sentimental value is becoming more prevalent in society[2]. The improved user convenience and organization characterized by digitalizing information is accelerating this movement. This means that everyone is storing more data digitally, and the global digital property content is multiplying. Humanity is interacting with digital technologies at an exponential rate, leading some to argue that it can be difficult to differentiate between online and offline personas[5]. It is contested that the the once strictly digital cyber space is now an indistinguishable part of humanity's natural modern environment[5]. With this trend of greater online interaction and content capacity comes the necessity for greater cultural and legislative change accordingly.

Legislation Regarding Digital Property

The United States prides itself in supporting creativity and innovation to enact progress. Therefore, protection of intellectual property is treated as a fundamental right and is highlighted in the constitution. In Article 1, Section 8, Clause 8 it states that Congress has the power to “promote the Progress of Science and Useful arts, by securing, for limited Times, to Authors and Investors, the exclusive Right to their respective Writings and Discoveries”. [6] There was no way for the Founding Fathers to have predicted the digital age we have today in the 21st century, therefore digital property is not mentioned specifically in the constitution. However, they did account for intellectual property protection which was later developed into a system of patents, copyright, and trademark rights and laws. Despite these barriers put in place to protect innovators and promote advancements, the complications of the digital property off-shoot from traditional works skews the property protection process further.

California, which has some of the most developed digital privacy and security laws, has certain statutes that apply to digital assets. California law defines digital assets as any form of digital records or files, which apply to email accounts, blogs, social media accounts, financial accounts, etc. Although ownership and accessibility of these files can vary under a provider's terms of service, the individual who holds the asset is the primary owner. This creates legal ambiguity, such as if a legal executor can access a digital file or social media account after the account holder's death. If the account holder does not provide instructions or information on how to access the file, they cannot gain entry to the assets, since California does not grant authority of digital assets to executors. Assets may continue to exist without proper management or ownership. This includes files, which can hold crucial information, or social media platform information, which may create confusion and ambiguity if they continue to exist after a holder's death. Given the massive amount of online information and growth of digital assets, California is considering updating legislation to help the process of transferring digital asset ownership and management.

Currently the European Union is working to coordinate the protection of intellectual property with technology in light of the increasingly digital age we live in. The United States is also attempting to create legal structure to protect intellectual property in regards to data and technology through the National Information Infrastructure.[7] The difference between countries in stages of integrating digital property protection laws within current legislation poses another problem. The laws vary by country, although the internet network expands worldwide. [8] Exchange of certain information may be legal in one country, but can be communicated across borders instantaneously and become considered illegal sharing of digital property.

Types of Digital Property

There are three main types of digital property:

  • Person digital property: Personal digital property is any information that is stored electronically. When referring to electronically, this can mean data that is stored online or on a physical device. Personal digital property also means any online accounts that are personal to the user. A person's personal digital property is legally theirs and even family members cannot access these legally after a loved one passes away. There is a legislative process to follow to access someone else's personal digital property [9].
  • Personal digital property with monetary value: Personal digital property with monetary value is property that generates revenue for personal benefit, such as computing hardware, websites, eBooks, accounts that are used to manage money.
  • Digital business property: Digital business property refers to digital property owned by a business. This can mean accounts that are under the business’s name, assets of an online store, any client data, or mailing lists[10].

Ethical Dilemmas

Data Creation, Ownership, and Privacy

We are currently in an age where companies pay big bucks for consumer data. This big data originates at the level of individuals and is collected by companies using technology such as cookies. When companies who collect data then go to sell it to other companies for purposes such as targeted advertising, the issue of ownership arises. These companies did not create this data, they only collected it. The users whose data has been collected likely had no idea they were being monitored and recorded. This is a breach of those users' ownership over their actions, the data they are generating by perusing the internet, and their privacy. This data is then used by companies to further violate users' privacy by using this private information to target them with sales pitches for products and services.

A well known example of this phenomenon was an instance of a young woman whose data profile indicated that she was pregnant, as determined by her online searches. Because of this, Target sent her targeted discount ads for baby products, which then exposed this fact to her previously unaware parents.[11] The data, which the woman generated herself, was exploited by Target and their marketing. If the data created by the consumer is also directly owned by the them while companies only collect it, cases such as this violate the consumers privacy.

Increased accessibility

The digital age enables information to be shared more efficiently through file uploads, mass email chains, and sharing of social media posts, all of which make up digital property. This increased fluidity of information in turn leads to greater accessibility. Instead of physical property being passed along manually, the virtual circulation of digital property creates an expansive network expanding the web worldwide. This increased accessibility makes protection of digital property more complex, as the information can be possessed by numerous people at once without concern for the original source. [8] [7]This continuous process of copying material to be shared with the world can lead to the degradation of content quality as well. [7] Original content can be altered intentionally for example with effects on images and videos, or unintentionally with the composition of pixels degrading or content being lost in the transitional process.

Passwords

With increasing quantifiable data online and on computers, passwords and passcodes have grown more prevalent in cyber space. Digital property can be protected through patents, copyright, and trademark laws, but if the individual proprietors don’t take steps to safe-guard their personal digital belongings through passwords, legislation can do little. The privacy breach that the expansive network of internet users poses to personal digital property can be minimized by strong passwords and diversification of these passwords between different accounts. [12] Many online entities are doing their part to assist users in creating newer, stronger passwords in order to protect their customers personal information and avoid any negative publicity on the corporate side. A method known as nudging is commonly used where websites display pop-ups, occasionally when a user logs-in, encouraging the user to update their password.[13] There can be many different reasons to nudge a user, most commonly this is due to the user retaining the same password for a lengthy amount of time, attempted theft or hack, and as a requirement for employees for various companies. [14] In addition to encouraging users to create strong passwords, many platforms nowadays offer two-factor authentication as a means of furthering the your account security to ensure protection of your online property and data.

Violations of patents, copyrights, and trademarks

Copyright, Trademark, and Patent Symbols[15]

Current legislation regarding digital property attempts to set boundaries and sanctions as punishment for infringing on intellectual and contractual property. Patents, copyrights, and trademarks are violated constantly, as artists and inventors have difficulty distinguishing inspiration from originality. As Snapper details about plagiarism, authorization to digital property is outlined with very fine lines, and interpretation of patent and copyright laws is difficult. [16]

Barrack Obama "Hope" Campaign Poster [17]

An example of a digital property rights violation that recently occurred was with a "Hope" campaign poster for Barrack Obama. The original source of the photo before the editing was obscured due to the advanced entanglement of digital property circulating the internet. Shepard Fairey, the artist credited with creating the rendition piece, originally discovered the unaltered photo through a quick Google search. The photo was originally published in a 2007 story at Time.com, but was later to be found to have been taken by a photographer named Mannie Garcia in April of 2006 at a National Press Club event. Following the events, Fairey chose to file a declaratory judgement suit against the AP on February 9th, 2008. Later, on March 11th of that same year, AP filed counterclaims. [18]

Legislation

Legislation pertaining to digital property has been poorly defined because it is a developing concept that lacks clear cut legislation like similar property regulations which define tangible and intangible property rights. Digital property legislation fails to define how the transfer, the inheriting, or the selling of digital assets are defined within internet spaces and this is problematic because internet spaces are becoming saturated with notion of the "digital asset".[4] With rapidly evolving technology, and society's cultural and business practices changing in response, the legislative process is slow in comparison. Passing new laws proves to take much longer than the invention of new technological resources and the acceptance of these advancements by society. Legislation not being able to keep pace with rapid innovation in the technology field has resulted in further ethical dilemmas when determining the proper response to conflicts in digital property.

References

  1. “State-by-State Digital Estate Planning Laws.” Everplans, www.everplans.com/articles/state-by-state-digital-estate-planning-laws.
  2. 2.0 2.1 The Elder Law Report, Vol. XXV, Number 1
  3. van Niekerk, A. J Digit Asset Manag (2007) 3: 89. https://doi.org/10.1057/palgrave.dam.3650070
  4. 4.0 4.1 Toygar, Alp; Rohm, C.E. Taipe Jr.; and Zhu, Jake (2013) "A New Asset Type: Digital Assets," Journal of International Technology and Information Management: Vol. 22: Iss. 4, Article 7.
  5. 5.0 5.1 Lupton, Deborah. “Routledge Handbook of Physical Cultural Studies.” Routledge Handbook of Physical Cultural Studies, London:Routledge.
  6. “Did You Know Intellectual Property Is Protected Under the Constitution?” U.S. Chamber of Commerce, 19 Dec. 2017, www.uschamber.com/series/above-the-fold/did-you-know-intellectual-property-protected-under-the-constitution.
  7. 7.0 7.1 7.2 “US6314409B2 - System for Controlling Access and Distribution of Digital Property.” Google Patents, Google, patents.google.com/patent/US6314409B2/en.
  8. 8.0 8.1 “The Digital Dilemma.” Google Books, books.google.com/books?hl=en&lr=&id=e_GbAgAAQBAJ&oi=fnd&pg=PT22&dq=digital%2Bproperty&ots=cZsvtCwskz&sig=XtBETmEdw61eZhtLXEmQu4NJtnk#v=onepage&q=digital%20property&f=false.
  9. “Digital Property Frequqently Asked Questions” American Bar Association, 01 Apr. 2019, https://www.americanbar.org/groups/real_property_trust_estate/resources/estate_planning/digital_property/.
  10. “A Helpful Overview Of All Your Digital Property And Digital Assets” Everplans, https://www.everplans.com/articles/a-helpful-overview-of-all-your-digital-property-and-digital-assets.
  11. [1]
  12. Adams, Anne, et al. “Making Passwords Secure and Usable.” SpringerLink, Springer, London, 1 Jan. 1997, link.springer.com/chapter/10.1007/978-1-4471-3601-9_1.
  13. Renaud, Karen, and Verena Zimmermann. “Guidelines for Ethical Nudging in Password Authentication.” SAIEE Africa Research Journal, South African Institute of Electrical Engineers, June 2018, www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1991-16962018000200002&lng=en&nrm=iso&tlng=en.
  14. Renaud, Karen, et al. “Lessons Learned from Evaluating Eight Password Nudges in the Wild.” 2017.
  15. “Patents, Copyrights and Trademarks – Oh My!” Shenandoah Valley, www.valleysbdc.org/patents-copyrights-and-trademarks-oh-my/.
  16. Snapper, John. “The Matter of Plagiarism: What, Why, and It.” The Handbook of Information and Computer Ethics, by Kenneth Einar. Himma and Herman T. Tavani, John Wiley & Sons, 2008, pp. 533–552.
  17. Scott, Mac. “Obama Hope Poster - Shepard Fairey (2008).” Medium, FGD1 The Archive, 15 Oct. 2017, medium.com/fgd1-the-archive/obama-hope-poster-by-shepard-fairey-1307a8b6c7be.
  18. Fisher III, William W., Frank Cost, Shepard Fairey, and Meir Feder. "Reflections on the hope poster case." Harv. JL & Tech. 25 (2011): 243.