Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
An Introduction to Computer Law Judy Jacobs Miller © 2006.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
Lesson 15 : Networks And The Internet
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Law And Ethics And Ethics.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Legal and Ethical Issues in E-Commerce
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
CHAPTER 33 Cyberlaw.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
E-Commerce: Regulatory, Ethical, and Social Environments
– Communication Technology in a Changing World
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

Chapter 11 CYBERLAW

2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal precedent to new problems presented with the technology of the Internet. Cyberlaw is the application of existing laws and legal precedent to new problems presented with the technology of the Internet. Cyberlaw issues include: Cyberlaw issues include: TortsContracts Intellectual Property Criminal Law Constitutional Restraints and Protections Securities Law Introduction to Cyberlaw

3 Tort Issues in Cyberspace Privacy: Privacy:  sent over an employer’s network is not guaranteed private.  sent over a home-use network may be intercepted; this issue is still developing.

4 Tort Issues in Cyberspace Privacy: Privacy:  Web Site Information & Privacy. Websites routinely collect information about their customers; this information may be sold to other businesses.  Identity theft, or the use of someone else’s identity to purchase or obtain credit, is a growing problem. Most web merchants minimize this problem by providing a secure mode of transmitting personal information. Statutory Protections: ECPA, CFAA, COPPA. Statutory Protections: ECPA, CFAA, COPPA.

5 Tort Issues in Cyberlaw Appropriation (the unauthorized use of someone’s image) is illegal both on the Internet and elsewhere. Appropriation (the unauthorized use of someone’s image) is illegal both on the Internet and elsewhere. Defamation in Cyberspace. Defamation in Cyberspace.

6 Contract Issues in Cyberspace Formation of Contracts. Formation of Contracts.  Though most contract issues have not changed with the Internet, a few new questions have arisen.  At what point is the contract formed?  Is an electronic signature valid? Misrepresentation and Fraud. Misrepresentation and Fraud.  Fraud is the most reported crime committed via the Internet. This is in part due to the high volume of sales transactions over the Internet.

7 Intellectual Property Issues The Internet has not actually changed intellectual property rights, but has facilitated the illegal copying of copyrighted material. The Internet has not actually changed intellectual property rights, but has facilitated the illegal copying of copyrighted material.  The best known case dealing with intellectual property via the Internet is the suit against Napster, the web site which facilitated the free downloading of copyrighted songs.

8 Criminal Law Issues A computer may be the target of the crime, as when someone “hacks” into a bank’s computer records. A computer may be the target of the crime, as when someone “hacks” into a bank’s computer records. Sometimes the computer is the tool of the crime, as in the transporting of pornography across state lines. Sometimes the computer is the tool of the crime, as in the transporting of pornography across state lines. Criminal Procedures. Criminal Procedures.  The fourth amendment protects against unlawful search and seizures.  Applies to search of homes, offices and computers.

9 Constitutional Restraints First Amendment Rights First Amendment Rights  Internet free speech is protected as it is anywhere.  Violations outside the First Amendment protection are common on the Internet due to ease of communication and anonymity. Commerce Clause issues. Commerce Clause issues.  Nexus for Taxes. Where is the office?

10 Constitutional Restraints Due Process Issues. Due Process Issues.  What about fairness and minimum contacts in interstate commerce?  When should an internet company be required to defend itself in another state?

11 Securities Law Issues The Internet has facilitated new methods of securities trading, including day trading and minute-by-minute tracking of stock performances. The Internet has facilitated new methods of securities trading, including day trading and minute-by-minute tracking of stock performances. Abuses have arisen from the use of the Internet; most notably the practice of “pump and dump.” This is where a trader spreads false information about a stock to quickly raise its price, then selling existing shares at an inflated price. Abuses have arisen from the use of the Internet; most notably the practice of “pump and dump.” This is where a trader spreads false information about a stock to quickly raise its price, then selling existing shares at an inflated price.