Presentation is loading. Please wait.

Presentation is loading. Please wait.

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.

Similar presentations


Presentation on theme: "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013."— Presentation transcript:

1 ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013

2 Cyber law Cyberlaw - Law that pertains to computer and computer-related crimes –Cybercrime – any criminal activity associated with a computer –Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer BB30 Business Law 6.03Summer 2013

3 Cybercrime Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure Cybervandalism – disrupting, damaging, or destroying a website or computer network Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files BB30 Business Law 6.03Summer 2013

4 Identity Theft Identity theft – using a computer to steal financial, employment, education, medical and personal data How to report http://www.fbi.gov/about-us/investigate/cyber/identity_theft Other types –Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records –Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. BB30 Business Law 6.03Summer 2013

5 Cybertorts Invasion, theft, falsification, misuse, or deletion of information stored in a computer –Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation –Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer BB30 Business Law 6.03Summer 2013

6 Important Statutes Computer Software Copyright Act of 1980 – added software programs to the types of work protected by copyright laws Anticybersquatting Consumer Protection Act –provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it Uniform Computer Information Transactions Act (UCITA) –Governs law for software agreements, licenses, formulation contracts, and maintenance contracts –Contracts entered into electronically will be just as binding as one negotiated outside of the Web. BB30 Business Law 6.03Summer 2013

7 Important Statutes Lanham Act of 1976 –Provides for the registration and protection of copyrights and trademarks Trademark Dilution Act of 1996 –Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill Computer Fraud and Abuse Act –An often-amended act that pioneered the treatment of computer- related crimes as unique offenses BB30 Business Law 6.03Summer 2013

8 Important Statutes Telecommunications Act of 1996 –Also known as the Communications Decency Act of 1996 –Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution –Gives protection from defamation suits to Internet service providers Child Online Protection Act of 1998 –Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material BB30 Business Law 6.03Summer 2013


Download ppt "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013."

Similar presentations


Ads by Google