Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.

Slides:



Advertisements
Similar presentations
Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
Advertisements

Legal and Ethical Issues: Privacy and Security Chapter Five.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
Chapter 5 Intellectual Property & Internet Law
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 18 E-Contracts Chapter 18 E-Contracts.
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Business Law for the Entrepreneur and Manager
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
Business Law Chapter 13: Business Law in the Internet Era.
Chapter 21 Web Contracts. Basic Principles of Contract Law Offer Acceptance Consideration-bargained for exchange Caveats- Lawful purpose, not violate.
Class Discussion Notes MKT April 10, 2001.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
Chapter Key Points Understand connection between internet issues, international relations and globalization Investigate interplay of market forces, ethics.
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2004 West Legal Studies in Business, a Division of Thomson Learning 13.1 Chapter 13 Intellectual Property and Technology.
© 2005 West Legal Studies in Business A Division of Thomson Learning CHAPTER 5 Intellectual Property.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 13 E-Contracts.
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
MT311 – Business Law I Seminar Presentation UNIT 3 Criminal Law and Cyber Crimes I. Chapter 5, Intellectual Property and Internet Law II. Chapter 6, Criminal.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Chapter 10 Intellectual Property and Internet Law.
Chapter 9: Internet Law, Social Media, and Privacy
TYPES OF LAW PUBLIC LAW-Deals with the relationship between government and individuals PRIVATE LAW (AKA CIVIL LAW)-deals with the interests of private.
Chapter 15 Internet Law and E-Commerce
Fundamentals of business law, 10e
by John Bagby and F. William McCarty
Legal Resources in Cyberspace
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
Legal and Ethical Issues in E-Commerce
CHAPTER 22 E-COMMERCE 2011 Thomson Reuters Legal & Regulatory Ltd. All Rights Reserved. PowerPoint slides to accompany A Guide to Business Law, 19th.
Chapter 14 Online Commerce and E-Contracts
Essentials of the legal environment today, 5e
Computer Security Social Legal and Ethical issues
Cyber Law and E-Commerce
Presentation transcript:

Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. Chapter 8 Cyber Law

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 2 Overview of Cyber Law  Cyber law is traditional law applied to disputes in the on-line venue. Tort Issues Contract Issues Intellectual Property Issues Criminal Violations Constitutional Restraints, and Securities Law Issues  Cyber law is traditional law applied to disputes in the on-line venue. Tort Issues Contract Issues Intellectual Property Issues Criminal Violations Constitutional Restraints, and Securities Law Issues

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 3 Tort Issues in Cyber Law  Privacy Issues and Worker Privacy 90 Million Americans send 2.8 billion s per day. exists as an electronic record not only between sender and receiver but across the network as well. Do the parties have an expectation to privacy? Generally, Employers do have the right to access an employee’s .  Privacy Issues and Worker Privacy 90 Million Americans send 2.8 billion s per day. exists as an electronic record not only between sender and receiver but across the network as well. Do the parties have an expectation to privacy? Generally, Employers do have the right to access an employee’s .

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 4  Case 8.1 Kyllo v. U.S. (2001) Was the use of thermal imaging a violation of privacy? Was the use of thermal imaging a “search” under the Fourth Amendment? Was a search warrant required?  Case 8.1 Kyllo v. U.S. (2001) Was the use of thermal imaging a violation of privacy? Was the use of thermal imaging a “search” under the Fourth Amendment? Was a search warrant required? Tort Issues in Cyber Law

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 5  Case 8.2 Smyth v. Pillsbury (1996) Did Smyth have an expectation of privacy? Was Smyth wrongfully discharged? Did Pillsbury violate its own policies?  Case 8.2 Smyth v. Pillsbury (1996) Did Smyth have an expectation of privacy? Was Smyth wrongfully discharged? Did Pillsbury violate its own policies? Tort Issues in Cyber Law

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 6  Privacy and Statutory Protections Electronic Communications Privacy Act (1986) prohibits the interception of “live” communications. What about the information collected by online e-tailers in their ‘cookies’?  Privacy and Statutory Protections Electronic Communications Privacy Act (1986) prohibits the interception of “live” communications. What about the information collected by online e-tailers in their ‘cookies’? Tort Issues in Cyber Law

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 7  Appropriation in Cyberspace Making an image or likeness and then using it for commercial advantage.  Defamation in Cyberspace Elements of traditional defamation are the same. What about chat room defamation? (Mark S. Jakob’s press release)  Appropriation in Cyberspace Making an image or likeness and then using it for commercial advantage.  Defamation in Cyberspace Elements of traditional defamation are the same. What about chat room defamation? (Mark S. Jakob’s press release) Tort Issues in Cyber Law

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 8 Tort Issues in Cyber Law  Trespass in Cyberspace Is sending a ‘robot’ to another internet server a form of trespass?  Case 8.3 Compuserve v. Cyber Promotions (1997) When does free speech in an become trespass?  Trespass in Cyberspace Is sending a ‘robot’ to another internet server a form of trespass?  Case 8.3 Compuserve v. Cyber Promotions (1997) When does free speech in an become trespass?

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 9 Contract Law in Cyber Space  Formation Issues Online contracts formed between businesses (B2B) and business and consumers (B2C). Is there an offer and acceptance? Is there a writing? Is the contract enforceable?  Formation Issues Online contracts formed between businesses (B2B) and business and consumers (B2C). Is there an offer and acceptance? Is there a writing? Is the contract enforceable?

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 10 Contract Law in Cyber Space  Case 8.4 Caspi v. Microsoft Network, LLC (1999) Do you think Caspi received adequate notice of the contract terms? When was the contract accepted? What about online resolution of this online contract?  Case 8.4 Caspi v. Microsoft Network, LLC (1999) Do you think Caspi received adequate notice of the contract terms? When was the contract accepted? What about online resolution of this online contract?

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 11 Contract Law in Cyber Space  E-SIGN, federal law on Electronic Contracts and Signatures.  UETA, the Uniform Electronic Transactions Act, adopted in over 18 states, including Texas.  These laws provide a framework for enforcing online contracts.  E-SIGN, federal law on Electronic Contracts and Signatures.  UETA, the Uniform Electronic Transactions Act, adopted in over 18 states, including Texas.  These laws provide a framework for enforcing online contracts.

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 12  Misrepresentation and Fraud in Cyberspace Federal Trade Commission is actively involved in shutting down illegal online activity. Identity Theft occurs when hackers find social security numbers and personal information.  Misrepresentation and Fraud in Cyberspace Federal Trade Commission is actively involved in shutting down illegal online activity. Identity Theft occurs when hackers find social security numbers and personal information. Contract Law in Cyber Space

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 13 Intellectual Property Issues in Cyber Space  I.P. law has not changed, even though the internet allows the easy exchange of documents, pictures and music.  Jeff Bezos, founder of Amazon.com, patented the ‘one-click’ process.  Free Music (Napster) vs. Royalties  I.P. law has not changed, even though the internet allows the easy exchange of documents, pictures and music.  Jeff Bezos, founder of Amazon.com, patented the ‘one-click’ process.  Free Music (Napster) vs. Royalties

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 14  Copyright Infringement and Technology Digital Millennium Copyright Act provides ‘safe harbors’ for ISP’s.  Protecting Domain Names ICANN UDRP: domain name disputes  Trademarks in Cyberspace Federal Trademark Dilution Act provides private cause of action.  Copyright Infringement and Technology Digital Millennium Copyright Act provides ‘safe harbors’ for ISP’s.  Protecting Domain Names ICANN UDRP: domain name disputes  Trademarks in Cyberspace Federal Trademark Dilution Act provides private cause of action. Intellectual Property Issues in Cyber Space

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 15 Criminal Law Issues in Cyberspace  Most cyber crime is ordinary crime carried out by a computer.  Computer Fraud and Abuse Act and Economic Espionage Act (see Ch.9)  Case 8.5 U.S. v. Czubinski (1997) What is computer fraud? Why did the court caution about the broad application of the wire fraud?  Most cyber crime is ordinary crime carried out by a computer.  Computer Fraud and Abuse Act and Economic Espionage Act (see Ch.9)  Case 8.5 U.S. v. Czubinski (1997) What is computer fraud? Why did the court caution about the broad application of the wire fraud?

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 16 Constitutional Restraints and Protections in Cyberspace  First Amendment in Cyberspace Speech on the internet enjoys the same protections as ‘real space’ speech. Cyber Promotions v. AOL (1996) Child Pornography Prevention Act was ruled unconstitutional in U.S. v. Hilton (1999) and Free Speech Coalition v. Reno (1999).  First Amendment in Cyberspace Speech on the internet enjoys the same protections as ‘real space’ speech. Cyber Promotions v. AOL (1996) Child Pornography Prevention Act was ruled unconstitutional in U.S. v. Hilton (1999) and Free Speech Coalition v. Reno (1999).

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 17  Commerce Clause in Cyberspace Constitutional requires some “nexus” between taxing authority and business paying tax.  Due Process in Cyberspace When does an out-of-state, online company have sufficient presence to be hailed into local court? See Bensusan Restaurant v. King.  Commerce Clause in Cyberspace Constitutional requires some “nexus” between taxing authority and business paying tax.  Due Process in Cyberspace When does an out-of-state, online company have sufficient presence to be hailed into local court? See Bensusan Restaurant v. King. Constitutional Restraints and Protections in Cyberspace

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 18 Securities Law Issues in Cyberspace  ‘Pump and Dump’ occurs when online traders post information on the web to make gains on their stock.  SEC and FTC still monitor and prosecute on-line security offerings and scams.  Any disclosures made to the public must apply same principles to real-space companies.  ‘Pump and Dump’ occurs when online traders post information on the web to make gains on their stock.  SEC and FTC still monitor and prosecute on-line security offerings and scams.  Any disclosures made to the public must apply same principles to real-space companies.

Copyright ©2003 by West Legal Studies in Business, a division of Thomson Learning. All rights reserved. 19 Cyberspace and International Law  Traditional notions of American jurisdiction do not always fit on the web.  Case 8.6 Yahoo! v. La Ligue Contre le Racisme (2001) Yahoo! appealed French court order and U.S. Court held France had no jurisdiction over Yahoo!.  Traditional notions of American jurisdiction do not always fit on the web.  Case 8.6 Yahoo! v. La Ligue Contre le Racisme (2001) Yahoo! appealed French court order and U.S. Court held France had no jurisdiction over Yahoo!.