Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.

Slides:



Advertisements
Similar presentations
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Advertisements

EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 5 Intellectual Property & Internet Law
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 10 Intellectual Property Rights and the Internet Twomey Jennings.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Business Law for the Entrepreneur and Manager
Chapter 7 Intellectual Property and Cyber Piracy
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 33 Investor Protection and Online Securities Offerings.
By Richard A. Mann & Barry S. Roberts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Class Discussion Notes MKT April 10, 2001.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 10 Intellectual.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Business Law and the Regulation of Business Chapter 40: Securities Regulation By Richard A. Mann & Barry S. Roberts.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.17-1 Chapter 17 Investor Protection and E- Securities Transactions.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Chapter 41 Corporations: Securities and Investor Protection McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 10 Intellectual Property Rights Twomey, Business Law and the Regulatory Environment (14th Ed.)
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 41 Investor Protection, E-Securities, and Wall Street Reform.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Chapter 10 Intellectual Property and Internet Law.
Chapter 9: Internet Law, Social Media, and Privacy
Securities Regulation
Essentials of the legal environment today, 5e
Chapter 15 Internet Law and E-Commerce
Fundamentals of business law, 10e
Chapter 06: LEGAL ISSUES FOR THE ENTREPRENEUR
Chapter 10 Cyberlaw, Social Media, and Privacy
Intellectual Property and Cyber Piracy
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 17: E-Contracts and Licensing
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Corporations: Securities and Investor Protection
Chapter 14 Online Commerce and E-Contracts
INTELLECTUAL PROPERTY AND CYBER PIRACY
Chapter 9 Internet Law and Intellectual Property
E-Contracts and Internet Law
Essentials of the legal environment today, 5e
Chapter 13 E-Commerce Contracts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 10 INTELLECTUAL PROPERTY RIGHTS AND THE INTERNET
Cyber Law and E-Commerce
Presentation transcript:

Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts

Topics Covered in this Chapter A.Defamation B.Intellectual Property C.Contracts and Sales D.Privacy and the Internet E.Securities Regulation F.Cyber Crime

Defamation n Definition of Defamation - a false communication that injures a person’s reputation. n Communications Decency Act of grants Internet service providers immunity from liability for defamation when publishing information originating from a third party.

Copyrights n Copyrights are the exclusive right to original works of authorship -- including computer programs. No Electronic Theft Act (NET Act) amended Federal copyright law to prohibit willful infringement even if not for personal profit.No Electronic Theft Act (NET Act) amended Federal copyright law to prohibit willful infringement even if not for personal profit. Digital Millennium Copyright Act (DMCA) prohibits circumventing, as well as creating or trafficking in devices that circumvent, a technological protection measure put in place by a copyright owner to control access to or copying of a copyrighted work.Digital Millennium Copyright Act (DMCA) prohibits circumventing, as well as creating or trafficking in devices that circumvent, a technological protection measure put in place by a copyright owner to control access to or copying of a copyrighted work.

Trademarks n Trademarks or trade symbols include trademarks, service marks, certification marks, and collective marks. Lanham Act protects marks that are distinctive and not immoral, deceptive, or scandalous.Lanham Act protects marks that are distinctive and not immoral, deceptive, or scandalous. Anticybersquatting Consumer Protection Act protects the owner of a mark against any person who, with a bad faith intent to profit from that mark, registers or uses a domain name which, at the time of its registration (1) is identical or confusingly similar to a distinctive mark, (2) dilutes a famous mark, or (3) is a protected trademark, word, or name.Anticybersquatting Consumer Protection Act protects the owner of a mark against any person who, with a bad faith intent to profit from that mark, registers or uses a domain name which, at the time of its registration (1) is identical or confusingly similar to a distinctive mark, (2) dilutes a famous mark, or (3) is a protected trademark, word, or name.

Patents n Patents - utility patents protect the exclusive right to an invention for twenty years from the date of application if the invention is novel, useful, and not obvious; patent protection has been granted for some Internet business methods.

Trade Secrets n Trade Secrets - commercially valuable, secret information; the Federal Economic Espionage Act prohibits the theft of trade secrets (including downloading or uploading such information) and provides criminal penalties for violations.

Governing Law n Contracts are primarily governed by State common law; Article 2 of the Uniform Commercial Code (UCC) governs the sale of goods. n Uniform Computer Information Transaction Act (UCITA) - applies to agreements to create, modify, transfer, or license computer information or informational rights in computer information.

Uniform Computer Information Transaction Act n Transfer Contracts - UCITA applies to transfers of computer programs or multimedia products, software, and multimedia development contracts. n Access Contracts - UCITA applies to contracts to enter the information system of another to obtain information or use that information system for specific purposes.

Electronic Records n Electronic Records include contracts or transactions entered into online or by . The Uniform Electronic Transactions Act (UETA) - State law that gives full effect to electronic contracts and signatures.The Uniform Electronic Transactions Act (UETA) - State law that gives full effect to electronic contracts and signatures. The Electronic Signatures in Global and National Commerce (E-Sign) - Federal law that makes electronic records and signatures valid and enforceable across the United States for many types of transactions in or affecting interstate or foreign commerce.The Electronic Signatures in Global and National Commerce (E-Sign) - Federal law that makes electronic records and signatures valid and enforceable across the United States for many types of transactions in or affecting interstate or foreign commerce.

Noncompete Agreements n Noncompete Agreements by employees are enforceable if: –(1) the purpose of the restraint is to protect a property interest of the employer and –(2) the restraint is no more extensive than is reasonably necessary to protect that interest. (In determining the reasonableness of restraint, courts considers the rapid evolution of business practices in the Internet industry.)

Personal Identifiable Information n Protection of Personal Identifiable Information on the Internet - almost all Internet sites collect personal identifiable information on their users. Privacy and Intrusion by Private Parties - currently an individual is accorded very limited rights with regard to online privacy invasions. Privacy and Intrusion by Private Parties - currently an individual is accorded very limited rights with regard to online privacy invasions. Protecting Children COPPA - protects children under thirteen from commercial Websites that collect, store, and distribute their personal data.Protecting Children COPPA - protects children under thirteen from commercial Websites that collect, store, and distribute their personal data.

Unwanted Intrusion n Freedom from Unwanted Government Intrusion - the U.S. Constitution protects an individual’s privacy from intrusion by the government. n Intrusions by Employers - the actions of private employers are not governed by the U.S. Constitution with regard to the individual’s privacy.

Regulation of Securities Issuances n The Securities Act of 1933 requires disclosure of accurate material information in all public offerings of nonexempt securities unless the offering is an exempt transaction and prohibits fraud in all issuances of securities.

Regulation of Secondary Distributions n The Securities Exchange Act of 1934 requires regulated, publicly held companies to register their securities and subjects them to the Act’s periodic reporting requirements, short-swing profits provision, tender offer provisions, and proxy solicitation provisions; issuers of securities, whether registered under the 1934 Act or not, must comply with the antifraud and antibribery provisions of the Act.

Electronic Media n The SEC permits the use of electronic media for the delivery of information required by the Federal securities laws if the media provide notice, access, and evidence of delivery comparable to that provided by paper delivery. n EDGAR (Electronic Data Gathering, Analysis, and Retrieval) - SEC’s computer system that performs automated collection, validation, indexing, acceptance, and dissemination of reports required to be filed with the SEC.

Permitted Securities Activities over the Internet n Registered Public Offerings - disclosure of certain documents required by the 1933 Act may be made over the Internet so long as electronic delivery to provide notice, access, and evidence of delivery comparable to that provided by paper delivery.

Permitted Securities Activities over the Internet n Regulation A permits an issuer to offer up to $5 million of securities in any twelve month period without registering them if the issuer files an offering statement with the SEC’s regional office prior to the sale of the securities and provides an offering circular to offerees and purchasers; Regulation A has been used to issue securities over the Internet.

Permitted Securities Activities over the Internet n Private Offerings under Regulation D are exempt from registration under the 1933 Act but general advertising or solicitation is not permitted and the securities may be purchased by an unlimited number of accredited investors and by no more than thirty-five other purchasers; the SEC has approved posting notice of an Internet-based, private offering in a password-protected page of a Website accessible only to members who had previously qualified as accredited investors.

Fraudulent Use of the Internet n The Internet has expanded the possibilities for securities fraud and created additional challenges for recovery of money defrauded; the SEC is responding through an evolving program of education, surveillance, and litigation.

Cybercrime n Definition - any crime committed or facilitated by a computer including crimes using computers as instruments of the crime and crimes with computers as targets of the crime. n Laws - every State as well as the Federal government has enacted laws targeting cybercriminals.