Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-Commerce and Technology Law Issues For Managers A Guest Lecture for BA 483, Information Technology, Business Strategy and E-Commerce Spring 2005 By Professor.

Similar presentations


Presentation on theme: "E-Commerce and Technology Law Issues For Managers A Guest Lecture for BA 483, Information Technology, Business Strategy and E-Commerce Spring 2005 By Professor."— Presentation transcript:

1 E-Commerce and Technology Law Issues For Managers A Guest Lecture for BA 483, Information Technology, Business Strategy and E-Commerce Spring 2005 By Professor Nancy King, Assistant Professor of Business Law, OSU

2 Preview of Topics: Cyber Crime and the global marketplace Jurisdiction of the courts over online businesses Contracting in cyberspace Trademarks in cyberspace Online dispute resolution and its use to resolve domain name/trademark disputes Copyright issues and the Digital Millennium Copyright Act

3 Cyber Crime Cyber crime involves the use of computers in cyberspace to injure a person or property (the crime occurs online or in a virtual community) Financial crimes (example: use computer to commit embezzlement or theft of intellectual property) Identity theft Theft, alteration, etc. of data Denial of service attacks (DOS) Cyber stalking (find victim online, cause to have reasonable fear for safety of self or family) Deceptive spamming prohibited by federal law Online obscenity/First Amendment issues

4 Global Enforcement FBI’s Cyber Action Teams EU’s Cyber Cops

5 Challenges in Prosecuting Cyber Crimes Location of the crime raises jurisdictional issues. Identification of offenders and obtaining evidence is often difficult. But use of computer forensics is closing this gap.

6 Unauthorized Access to Computers Hacking (use one computer to break into another one without authorization; it is a crime even if nothing is taken). Federal Computer Fraud and Abuse Act (accessing a protected computer online without authorization and taking classified, restricted or protected data).

7 Federal CAN-SPAM Act Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003. Criminal penalties including fines and up to 5 years prison for serious spamming violations that are committed in furtherance of any felony or as a second offense. Two serious spamming violations: Accessing a protected computer and sending spam without authorization, with intent to deceive or mislead recipients of the origin of such messages. Materially falsifying header information in spam and intentionally initiating such messages (“Spoofed email addresses”).

8 CIVIL Remedies Under CAN-SPAM Prohibits less-serious spamming acts and provides remedies for engaging in these activities: Using materially false or misleading information in spam messages (example: false or misleading email header, including the “from” line or the “subject” line). Failure to include a working return email address or other way to “opt-out” of receiving future email from the sender. Sending future spam after opt-out by recipient; Failure to include identifier of sender, opt-out, and a physical address in commercial email. Use of automated programs to generate email addresses. Nature of civil remedies: cease and desist orders; fines example: $250 per violation/$2 million limit.

9 Limitations of CAN-SPAM Only applies to commercial spam – does not regulate political or charitable spam. Preempts (supersedes) more restrictive state spam laws -- but allows states to provide more stringent laws to regulate false and deceptive spam. Essentially allows commercial spammers at least “one freebie” – one spam message that is not false and deceptive sent to a consumer without advance permission.

10 FTC and CAN-SPAM Congress delegated administrative agency powers to the FTC in CAN-SPAM under “unfair or deceptive acts or practices” authority of the FTC. Rule-making authority– FTC adopted an administration requiring the placement of a warning label on email containing sexually oriented material (FTC required label: “Sexually-Explicit” in Subject line; the message cannot contain graphic material). Investigations: FTC authorized to investigate violations of CAN-SPAM and impose civil sanctions (fines). Adjudicate disputes: disputed civil sanctions are reviewed by administrative law judges and available internal appeals processes. FTC can refer cases for criminal prosecution to U.S. DOJ.

11 Criminal Charges for Spamming In April 2004 the DOJ charged the first four people for criminal violations of the CAN-SPAM act related to mass emails sent by the four to advertise fraudulent weight-loss products. Defendants are alleged to have disguised their identity as senders in the emails and to have delivered hundreds of thousands of email advertisements by bouncing the messages off unprotected computers.

12 SPAM Convictions 2004 – first felony convictions in the U.S. A Virginia man was convicted of spamming felonies and received nine years and a $7500 fine (in a three day period he sent tens of thousands of unsolicited email advertisements using false Internet addresses to America Online subscribers through an AOL server). 2005- Florida man was sentenced to a year in jail and 6 years probation for sending millions of unsolicited email using a phone company’s Internet services.

13 Instant-Message Spam Spam sent to instant-message services advertising (“SPIM”). In instant messaging (IM) programs, words typed by a sender immediately appear on recipients’ screens. First criminal case: a NY man was arrested in Feb. 2005 for sending 1.5 million spim ads for pornography and cheap mortgages. He was charged with violation of the federal Can-SPAM act and faces 18 years if convicted. Well known IM services: MYSpace, Friendster, and other web service firms that connect people with shared interests or mutual friends. AOL, Microsoft, and Yahoo Inc. all offer IM programs. SPIM can spread viruses, overload servers.

14 EU and SPAM LAW 2002 EU E-Commerce Directive requires member countries to implement national legislation to regulate SPAM by October, 2003. This EU Directive prohibits email marketing when consumers have “opted-out” via an “opt-out registrar.” This EU Directive also requires e-marketers to take steps to make sure unsolicited commercial advertisements are clearly designated as such as soon as received (for example, in the email header) so the consumer can delete the unsolicited email without opening it.

15 EU and SPAM Member states’ laws may be more restrictive than the EU E-Commerce directive. Some EU countries (e.g., Austria, Germany, Italy, Denmark, and Finland) prohibit sending unsolicited email without prior permission of the recipient (thus, if these rules are followed, email is no longer spam). In these countries email marketers may only send bulk unsolicited commercial e-mail if the consumer has “opted- in” by making the choice to receive email advertisements, which protects the privacy of consumers’ personal information. Spam filters, etc. are being developed that complement spam regulation. For e.g., Microsoft is working with international governments to fight SPAM and is developing technological measures to fight SPAM for MSN, Microsoft Exchange, and Outlook Messaging in Office.

16 Businesses Are Taking Action: Civil Liability for Computer Crime Several tort and intellectual property laws may be used by businesses and individuals to recover damages (money) for computer crime or to get a temporary restraining order to stop undesired activity: Trespassing or Conversion Misappropriation of Trade Secrets Trademark, Copyright or Patent Infringement Defamation Fraud, interference with a contractual relationship, etc.

17 Online Obscenity Communications Decency Act (Reno I) Child Online Protection Act (COPA) (Reno II) Not to be confused with the COPPA – the federal Children’s Online Privacy Protection Act which is in force (requires websites to get parental consent before collecting personally identifying information from children 13 or younger – see Federal Trade Commission at www.ftc.gov for more information about COPPA).www.ftc.gov For regulation of online obscenity to be constitutional under the First Amendment, the law may not be overbroad – in other words it must be narrowly tailored not to prohibit or unduly restrict adult access to First Amendment protected speech and expression in the form of non-obscene sexual material.

18 E-Commerce Law: Contracts When is a contract entered online enforceable by the parties? What law applies to contracts entered online? What law applies to contracts about computer information that may or may not be entered online?

19 Shrink-wrap Contracts When is a shrink-wrap contract formed? Elements of a contract: offer, acceptance, consideration, legality. Where is the agreement required to enforce a contract? Courts have found that an enforceable Shrink-wrap contract is formed after the buyer opens the box and has an opportunity to read the terms. S/he can read the terms and refuse to accept by returning the software.

20 Definition of an E-Contract A contract that is entered into in cyberspace and is evidenced only by electronic impulses (such as those in a computer’s memory), rather than, for example, a typewritten or handwritten form.

21 Are Clickwrap Contracts Enforceable? Clickwrap contracts are the Internet equivalent of shrinkwrap contracts: standard form contracts, the online/purchaser generally clicks “I agree” to the terms. Courts have generally held clickwrap contracts are enforceable under common law theories or the UCC-2 (Sales of Goods).

22 Hotmail v. Van$ Money Pie, Inc. Court held Hotmail was entitled to an injunction against defendant spammer in a breach of contract & fraud lawsuit related to a free e-mail account. The spammer (Van$ Money Pie) implicitly agreed to terms and conditions of hotmail account which prohibited spamming by clicking “I agree” when applying for the account online.

23 Bottom-line on E-contracts Many courts find e-contracts enforceable under existing contract laws, drawing on common-law contract theories or the Uniform Commercial Code for Sale of Goods. But before E-sign and UETA, there was still significant risk that e-contracts would not be enforced by the courts. E-Sign (federal law) and UETA (as adopted by individual states) remove the doubt that e-contracts are enforceable and e-documents are valid but only if the contract or document is otherwise valid.

24 What E-Sign Does E-Sign is a federal law that makes e-signatures and e-transactions as enforceable as if they were not electronic (i.e. acts as a statute of frauds). It also provides consumer protections in many situations: e.g. written notice to consumer before their electric power or health insurance is cut off is still required – e-mail won’t do. When a state adopts UETA, E-sign is no longer applicable to the extent UETA applies.

25 What UETA Does UETA is a state law that acts as a statute of frauds for e-contracts Electronic signatures and records are equivalent to “writings” in a legal sense -- E-signatures and E- transactions are not unenforceable simply because there is no “writing”. But it does not make e-contracts enforceable if they would not be so under other laws like the common law of contract or UCC2 (Uniform Commercial Code, Sales). Reasons an e-contract might be otherwise unenforceable: no agreement, no consideration, unconscionable, induced by fraud, etc. UETA leaves it up to the parties to decide whether to use e-commerce.

26 Why Was UCITA Proposed? Because contracts for computer information do not fit neatly within the existing law on enforceability of contracts. This is especially true when a court tries to apply the Uniform Commercial Code for Sales. Why? Because contracts for computer information like software often involve licenses to use information, rather than sale of the computer information. And because the requirements for an enforceable contract under the common law of contracts are stiffer on the element of “agreement.” For example, under common law, a court may find there is no agreement when a computer agent enters a contract rather than a real person.

27 Scope of UCITA Definition of Computer Information: “Information in electronic form obtained from or through use of a computer, or that is in digital or an equivalent form capable of being processed by a computer.” Examples: Contracts to license or purchase software, contracts to create a computer program, contracts for computer games, contracts for online access to databases, contracts to distribute information on the Internet, “diskettes” containing computer programs, online books. Status: UCITA has been enacted in only a few states. Its drafter has withdrawn its recommendation for states to adopt UCITA. Revision of UCITA is likely and there is a good chance it will become law!!!

28 Special Concerns Related to UCITA Electronic Self Help (Sections 605, 815, 816) Attribution in an e-contract (Sections 212-214) Oral contracts vs. “Record” of contract (electronic “memorandum” or traditional writing) of a contract sufficient to satisfy the statute of frauds: $5000 rule (Section 201) Express Warranties & Implied Warranties in contracts to sell or license computer information (content & compatibility of the computer systems) (Sections 401-409)

29 Identifying Potential Costs of E- Commerce E-Commerce businesses face increased risk of litigation costs if they have business facilities in only a few states, yet have interactive websites that are available nationally. (Recent cases apply the Zippo Mfg. Co. v. Zippo Dot Com continuum of interactivity test to e-recruiting Web sites.) Whether a court in a particular state (federal or state courts are in all states) will find it has in personam jurisdiction over these businesses depends in part on whether the business uses interactive, as opposed to passive, Web technology for e-recruiting.

30 The Zippo “Sliding Scale Test” for Personal Jurisdiction Over Non- Resident Website Operators Passive Site Highly Interactive Site Middle Spectrum Site No Jurisdiction Yes Jurisdiction Maybe…

31 When Having a Website is a Jurisdictional Hook – E-recruiting Example Company-provided websites are increasingly being used to recruit new employees. This is called e-recruiting, using the Internet to recruit new employees. Advantage: E-recruiting uses the power of information technology to attract new employees Disadvantage: Are there additional legal risks of using this new technology?

32 What Does It Mean for an E- Recruiting Web Site to be “Interactive”? Defined in Study as a Web Site that enables the Web site use to apply for a job online, including Web sites with the following features: Enables applicants to complete a job application or submit a resume online. Enables applicants to generate an email message to the employer on the employer’s Web site or using an email address provided on the Web site that may include a resume.

33 Example of E-Recruiting JELD-WEN, inc. has a graphically interesting, informative e-recruiting http://www.jeld- wen.com/about/index.cfm [click: employment].http://www.jeld- wen.com/about/index.cfm Markets the company and the community to potential new employees: Advertises current job openings Provides a quick picture of job requirements Enables user to e-mail or fax a resume and cover letter. Provides a link to its college recruiting site – applicants may apply online [JW Careers and JW Interns].

34 Recent Cases- In Personam Jurisdiction Found Tech Heads v. Desktop, 105 F. Supp.2d 1142 (D. Or. 2000). Defendant employer, an e-recruiter located in Virginia, must defend a trademark infringement lawsuit in Oregon. Defendant employer maintained an interactive e- recruiting Web site that was used by an Oregon resident to submit a résumé (Middle-spectrum Web site). Defendant successfully argued the interactivity of the site plus the transaction with an Oregon resident was sufficient for IPJ over the Virginia company.

35 Recent Cases--No In Personam Jurisdiction American Information Corp. v American Infometrics, Inc., 139 F. Supp.2d 696 (D. Md. 2001). California business with a middle spectrum e- recruiting Web site successfully escaped litigating a trademark infringement lawsuit in Maryland where the plaintiff filed the lawsuit. Defendant e-recruiter maintained a middle spectrum Web site with interactive features that allowed users to submit a résumé online, but plaintiff was unable to show that a Maryland resident had accessed the site to do so.

36 Trademarks and the Internet Registration of domain names Domain names and trademarks Cybersquatting Cybersquatting ICANN’s Uniform Domain Name Dispute Resolution Policy

37 Trademarks and Related Property A trademark is a distinctive mark, motto, device, or implement that a manufacturer stamps, prints or otherwise affixes to the goods it produces so that they may be identified on the market and their origin vouched for. Generic marks are not protected by trademark law because they are not distinctive. Phrase “You have Mail” is generic, because mail means email and does not refer to the email provider (AOL v. AT&T case).

38 Federal Trademark Law: The Lanham Trademark Act of 1946, Amended By the Federal Trademark Dilution Act of 1995. The owner of the trademark has the right to prevent others from using the mark or a substantially similar mark if it: 1) would confuse customers about the source of the product or, 2) if the owner has a famous mark, and it would “dilute” the value. Why register a trademark if “use” creates right? Notice

39 Trademark Infringement – How to Win This Type of Case Infringement – trademark owner must prove likelihood of confusion Dilution – trademark owner must prove tarnishment or blurring, but need not prove likeli Dilution – trademark owner must prove tarnishment or blurring, but need not prove likelihood of confusion

40 Microsoft All the following would be confusingly similar to the Microsoft mark and use of the mark would violate trademark law: Mike Crow Soft (sounds same, looks different). Macrosoft (looks same, sounds different). TinySoft (means same, sounds and looks different). MI (fanciful use of the words and letters) CRO SOFT (Source Elias, Trademark, Legal Care for Your Business & Product Name, 5 th ed.)

41 Domain Name Disputes and U.S. Trademark Law Domain Name: a website address: http://www.mic rosoft.com Trademark: the word Microsoft when used in conjunction with Microsoft Company’s products and services.

42 Cybersquatting A modern legal dispute: Cybersquatting takes place when a person registers a domain name that includes another company’s trademark. ICANN oversees the Internet domain name system and accredits companies to sell name registrations in top level domains (.com,.net,.org, etc.). Under ICANN registration agreement, the first person to register a domain name “owns” the domain name and takes responsibility for any trademark or other legal disputes that relate to the domain name. There are other remedies for cybersquatting: sue for trademark infringment and/or file a lawsuit under the federal Anticybersquatting Consumer Protection Act.

43 NFL vs. Bedford Mr. Bedford, living in Sweden, establishes a Hockey Fan website after registering the domain names: www.nfl2003.com and www.nfl2004.com. The National Football League owns the registered trademark NFL and has registered the website www.nfl.org. The NFL wants the fan site using its trademark to be transferred to the NFL or shut down, so it files a complaint with WIPO to demand ODR to resolve the dispute. www.nfl2003.comwww.nfl2004.comwww.nfl.org An arbitrator appointed by an ICANN approved ODR provider will decide and issue a written opinion. Who should win? Is the fan site unlawful trademark infringement? Do fans have a “fair use” right to establish web sites using registered trademarks in the domain name?

44 Online Dispute Resolution (ODR) ODR is used to resolve disputes about ownership of domain names and other cyberspace disputes. For example, the person who registers a domain name agrees to ODR under ICANN’s (Internet Corporation for Assigned Names and Numbers) Uniform Dispute Resolution Policy. ICANN provides Rules for ODR of domain name disputes. An approved ODR provider will appoint an arbitrator to decide the dispute, for example: the World Intellectual Property Organization’s Arbitration and Mediation Center.

45 The Digital Millennium Copyright Act (DMCA) The DMCA creates civil and criminal prohibitions against tampering with copy protection, breaking encryption, etc. The DMCA does not add new exclusive rights to the rights of copyright owners. The DMCA applies to a variety of digital works.

46 Types of Copyrightable Works Literary works (computer code including source and object code; text on a website) Architectural works (building blue prints) Sound recordings (digital music) Motion pictures and A/V works (digital movies) Pictorials, graphics, and sculptures (design of a website, graphics on a computer game) Pictorials, graphics, and sculptures (design of a website, graphics on a computer game) Musical works (the lyrics of popular music) Dramatic works Pantomimes and choreography

47 Major Provisions of the DMCA Anti-circumvention rules (prohibits enabling cracking encryption codes) Anti-circumvention exceptions (includes copying for maintaining or repairing a computer) Copyright management information (makes it illegal to delete “© King.” Safe harbors for ISPs (generous protections from liability) Let’s Discuss Let’s Discuss Let’s Discuss Let’s Discuss

48 Other Cyberlaw Issues… Data mining and other privacy issues related to the privacy of personal information including that of consumers. Online trade secret theft. When online offers to sell interests in businesses, including stock, may violate federal and state securities laws. Business method patents for online business models that may give the owner of the patent a 20 year exclusive right to use an online selling method that has been patented (Amazon.com’s “one-click” check-out process to purchase an item on its site – is it patentable? Can Barnes And Noble use a similar check out process on its site?)


Download ppt "E-Commerce and Technology Law Issues For Managers A Guest Lecture for BA 483, Information Technology, Business Strategy and E-Commerce Spring 2005 By Professor."

Similar presentations


Ads by Google