We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byDarcy Oliver
Modified about 1 year ago
Legal and Ethical Issues: Privacy and Security Chapter Five
Copyright © Houghton Mifflin Company. All rights reserved.5–25–2 Chapter Five Learning Objectives To understand why Internet laws and jurisdiction are in a state of flux and what remedies are being attempted To learn what important legal issues confront internet marketers To consider whether ethical marketing behaviors can be enforced on the Internet To understand why online security problems concern buyers and sellers
Copyright © Houghton Mifflin Company. All rights reserved.5–35–3 Tips for Smart Web Shopping Before purchasing, shoppers should determine Is the business legitimate? Are prices and conditions clearly stated? Is the transaction currency calculated? Is ordering secure? Is privacy respected? Is there recourse? Is the credit card statement correct?
Copyright © Houghton Mifflin Company. All rights reserved.5–45–4 Laws and Jurisdiction Lack of uniform Internet law Challenge to maintain order Maintaining order affects business success Different national legal systems often conflict UN, ABA, WTO, OECD and others trying to develop uniform guidelines Should there be a unique law of the Internet?
Copyright © Houghton Mifflin Company. All rights reserved.5–55–5 Laws and Jurisdiction (cont’d) Jurisdiction determines –Which courts have the right to exercise authority? –Which courts have the power to do so? –Which courts have control over issues and parties? Interactive/passive relations jurisdiction test Upload/download status jurisdiction test The USA Patriot Act of 2001 –The United States as the Internet’s police?
Copyright © Houghton Mifflin Company. All rights reserved.5–65–6 Legal Concerns Fraud is a criminal act –The Internet fraud complaint center –Most frauds at online auctions –EBay and other sites responding to fraud threat On-site self-monitoring Posted warnings Bar offenders from site Diversify to lessen risk from auction fraud
Copyright © Houghton Mifflin Company. All rights reserved.5–75–7 Legal Concerns (cont’d) Property protection Copyright Patents Trademarks Domain names Liability and disclaimers Contracts and digital signatures
Copyright © Houghton Mifflin Company. All rights reserved.5–85–8 Legal Concerns (cont’d) Speech –Consumer complaints –Corporate bashing –Free speech Taxation Gambling Visual pornography
Copyright © Houghton Mifflin Company. All rights reserved.5–95–9 Online Ethics and Privacy Online ethics –Moral principles, rules of conduct –Standards differ between and even within countries Online consumer research –Ethics of information collection –Identification of researchers –Scientific soundness of chat room research –Information use
Copyright © Houghton Mifflin Company. All rights reserved.5–10 Online Ethics and Privacy (cont’d) Marketing of professionals Marketing to children and other vulnerable groups –COPPA Marketing restricted products Unsolicited commercial (spam) Self-regulation Privacy or personalization
Copyright © Houghton Mifflin Company. All rights reserved.5–11 Security Issues Hackers Crackers Cyberterrorism Viruses
Copyright © Houghton Mifflin Company. All rights reserved.5–12 Security Issues (cont’d) A DOS Attack Access to a Web Site Is Blocked for Legitimate Users When Captured Computers Overwhelm the Site’s Servers Vandals Take Over Innocent Computers Access to the Web Site is Blocked
Chapter 17 Legal, Ethical, and Social Impacts of EC.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Essentials in a Borderless World: United States and European Union Perspectives Kenneth Slade Senior Partner, Hale and Dorr LLP Boston, Massachusetts,
Principles of Information Security, 3rd Edition2 Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Chapter 15 Legal & Ethical Issues. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Ethical Issues –What is Ethics? –Major Threats –Improving.
The Legal Framework for Creating Trust in Cyberspace: Security and Privacy Skopje March 2006 James X. Dempsey Center for Democracy & Technology Global.
Sales and Consumer Issues Objective Interpret sales contracts and warranties within the rights and law of consumers CONSUMER PROTECTION ISSUES.
Nov. 2009Copyrighted Work--A. MAMBI,TCRA 1 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009 Presenter.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
McGraw-Hill McGraw-Hill The Challenges of the Digital Age.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Legal Framework Chapter 5. Learning outcomes Explain difference between patent and copyright Computer Miss use Act List 8 principles of Data protection.
Purchasing and Supply Chain Management by W.C. Benton Chapter Three The Legal Aspects of Purchasing.
Information Technology Engineering 124 Spring 2005.
Trust in E-Commerce Topic 9. Introduction Trust & Risk Strategic Thrusts Framework of Trust Questions Conclusion Related Web Sites.
E-Business – Technology and Networks Teodora Bakardjieva Prof. Dr., Varna Free University Varna Free University.
Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,
Ethical and Social Issues in Information Systems DIS 302 E-Business.
8-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
IT Security Auditing. Topics Defining IT Audit Risk Analysis Internal Controls Steps of an IT Audit Preparing to be Audited Auditing IT Applications Who.
Copyright 2001 Brett J. Trout Security Concerns with e-Commerce Bretttrout.com.
312 Test Review 1 Ethics, Privacy, and Freedom of Speech.
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
National Differences in Political Economy 2. INTRODUCTION To explores how the political, economic, and legal systems of countries differ Together these.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Legal Systems on Unfair Competition in CANADA Overview of Public Remedies –Criminal –Civil Private Remedies –Suits –Trade Mark Enforcement.
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
© 2016 SlidePlayer.com Inc. All rights reserved.