Download presentation
Presentation is loading. Please wait.
Published byGarey Spencer Modified over 8 years ago
1
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013
2
Cyber law BB30 Business Law 6.03Summer 2013 Cyberlaw - Law that pertains to computer and computer-related crimes Cybercrime – any criminal activity associated with a computer Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer
3
Cybercrime BB30 Business Law 6.03Summer 2013 Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure Cybervandalism – disrupting, damaging, or destroying a website or computer network Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files
4
Identity Theft BB30 Business Law 6.03 Summer 2013 Identity theft – using a computer to steal financial, employment, education, medical and personal data How to report Other types Medical Identity Child Identity
5
Identity Theft BB30 Business Law 6.03Summer 2013 http://ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.pdf Use the above link to access resource document for identity theft. Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records. Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. http://www.fbi.gov/about-us/investigate/cyber/identity_theft Use the above as a resource for activity on identity theft
6
Cybertorts BB30 Business Law 6.03Summer 2013 Invasion, theft, falsification, misuse, or deletion of information stored in a computer Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer
7
Important Statutes BB30 Business Law 6.03Summer 2013 Computer Software Copyright Act of 1980 added software programs to the types of work protected by copyright laws Anticybersquatting Consumer Protection Act provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it Uniform Computer Information Transactions Act (UCITA) Governs law for software agreements, licenses, formulation contracts, and maintenance contracts Contracts entered into electronically will be just as binding as one negotiated outside of the Web.
8
Important Statutes BB30 Business Law 6.03Summer 2013 Lanham Act of 1976 Provides for the registration and protection of copyrights and trademarks Trademark Dilution Act of 1996 Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill Computer Fraud and Abuse Act An often-amended act that pioneered the treatment of computer- related crimes as unique offenses
9
Important Statutes BB30 Business Law 6.03Summer 2013 Telecommunications Act of 1996 Also known as the Communications Decency Act of 1996 Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution Gives protection from defamation suits to Internet service providers Child Online Protection Act of 1998 Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.