Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.

Slides:



Advertisements
Similar presentations
Protecting People and Information
Advertisements

Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
The Internet.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Security for Seniors SeniorNet Help Desk
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Lecture # 34 Privacy and Security. Passwords Spam Scams Viruses and Worms (Malware) Intellectual Property and Copyright Cookies Encryption Back-Ups.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Class Discussion Notes MKT April 10, 2001.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Micah Stevens Identity Theft in the World Today.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Hotspot Shield Protect Your Online Identity
IT Security  .
Chapter 10 Cyberlaw, Social Media, and Privacy
Digital Citizenship Middle School
Internet and security.
E-Commerce: Regulatory, Ethical, and Social Environments
Computers and the Internet
Staying safe on the internet
Essentials of the legal environment today, 5e
Being Aware of What You Share
Presentation transcript:

Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act

Jurisdiction Location of Customer Location of Business Location of Servers

Content Filtering ? Effectiveness ? –Filtering on keywords: breast –Move content to another IP address ISP becomes a publisher

Two Industries Porn –Prohibition on types of porn –Accessibility of porn to underage –Age of models Gambling –Liability of business versus customer

Internet Fraud Click fraud Nigerian Scam Phishing Identity theft

Intellectual Property Copyright –Google –Youtube Patent –Amazon Trademark –Domain names and Cybersquatting

Privacy Who owns your personal data ? “Opt in” versus “opt out” Burden on the consumer Privacy versus personalization

Security Virus Trojans Spyware Adware

Security Spam techniques to trick users: –Spoofing –Phishing –Text links / images to another site –Social Engineering

Cookies and Passwords First party versus third party cookies Weak passwords: –Less than 8 characters –Word in the dictionary –Common usage word (family pet)