Essentials of the legal environment today, 5e

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 5 Intellectual Property & Internet Law
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
What advantages and disadvantages are associated with the sole proprietorship? What advantages and disadvantages are associated with the sole proprietorship?
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law for the Entrepreneur and Manager
The Case Against Cybersquatting A Discussion of Domain Name Trademark Protection By Matt Poole.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
What is intellectual property? What is intellectual property? Why does the law protect trademarks and patents? Why does the law protect trademarks and.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
World Trade Equilibrium CHAPTER 20 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Elasticity: Demand and Supply CHAPTER 6 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 10 Intellectual Property and Internet Law.
Chapter 9: Internet Law, Social Media, and Privacy
Essentials of the legal environment today, 5e
Chapter 15 Internet Law and E-Commerce
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Fundamentals of business law, 10e
Chapter 10 Cyberlaw, Social Media, and Privacy
Essentials of the legal environment today, 5e
CHAPTER 33 Cyberlaw.
Chapter 14 Online Commerce and E-Contracts
Essentials of the legal environment today, 5e
Essentials of the Legal Environment today, 5E
Essentials of the legal environment today, 5e
Essentials of the Legal Environment today, 5E
Essentials of the legal environment today, 5e
Chapter 9 Internet Law and Intellectual Property
Essentials of the Legal Environment today, 5E
Essentials of the legal environment today, 5e
Essentials of the legal environment today, 5e
CHAPTER 5 Inflation: Who Wins, and Who Loses?
ELC 200 Day 6 Exam Day © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part,
CHAPTER 10 The Economics of Virtual Currencies
Technological, Legal, and Ethical Considerations
Chapter 13 E-Commerce Contracts
Putting it All Together
Essentials of the legal environment today, 5e
CHAPTER 1 Introduction to International Macroeconomics
CHAPTER 3 Understanding and Monitoring Labor Market Conditions
Monetary Aggregates: Measuring Money
CHAPTER 7 Financial Intermediation, Markets and Intermediaries
CHAPTER 9 Who Controls the Money Supply and How?
Chapter 10 INTELLECTUAL PROPERTY RIGHTS AND THE INTERNET
Cyber Law and E-Commerce
Presentation transcript:

Essentials of the legal environment today, 5e ROGER LEROY MILLER © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

INTERNET LAW, SOCIAL MEDIA, AND PRIVACY CHAPTER 9 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Learning Objectives What is cybersquatting, and when is it illegal? What steps have been taken to protect intellectual property rights in the digital age? When does the law protect a person’s electronic communications from being intercepted or accessed? © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

LEARNING OBJECTIVES (CONT’D) What law governs whether Internet service providers are liable for online defamatory statements made by users? How do online retailers track their users’ Web browsing activities? © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Internet law Laws specifically address issues that only arise on the Internet Spam State regulation of spam The Federal CAN-SPAM Act Enacted by Congress in 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act U.S. Safe Web Act Allows FTC to work with foreign agencies © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Internet law Domain Names Structure of domain names Top-level domain (TLD) indicates type of entity operating the site Second-level domain (SLD) chosen by the business or entity or individual registering the domain name Distribution system Internet Corporation for Assigned Names and Numbers (ICANN) oversees distribution of domain names © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Internet law Cybersquatting Anticybersquatting legislation Anticybersquatting Consumer Protection Act (ACPA) Cybersquatting is illegal when: The name is identical or confusingly similar to the trademark of another. The one registering, trafficking in, or using the domain name has a “bad faith intent” to profit from that trademark. Ongoing problem of cybersquatting Typosquatting Applicability and sanctions of the ACPA LO-1 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Internet law Meta Tags Trademark Dilution in the Online World Licensing © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Copyrights in digital information Copyright law is most important form of intellectual property protection on the Internet. Digital Millennium Copyright Act (DMCA) Congress passed in 1998 Significant protection to owners of copyrights in digital information LO-2 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Copyrights in digital information MP3 and File-Sharing Technology Programmers created software to compress large data files Methods of file-sharing Sharing stored music files DVDs and file-sharing © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Social media Studies show Internet users spend more time on social networks than other sites Legal Issues Criminal investigations Administrative agencies Employers’ social media policies © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Social media The Electronic Communications Privacy Act (ECPA) Amended federal wiretapping law to cover electronic forms of communications Prohibits the intentional interception and disclosure of any wire, oral, or electronic communication Exclusions Stored communications Stored Communications Act (SCA) – part of ECPA LO-3 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Social media Protection of Social Media Passwords States have enacted legislation to protect individuals from having to disclose passwords Company-wide Social Media Networks Protection of trade secrets Other advantages © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Online defamation Identifying the Author of Online Defamation Liability of Internet Service Providers General rule – Communications Decency Act (DCA) Exceptions LO-4 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

privacy Data Collection and Cookies Retailers collect information about consumers to personalize online services Internet Companies’ Privacy Policies FTC investigates consumer complaints of privacy violations LO-5 © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.