Presentation is loading. Please wait.

Presentation is loading. Please wait.

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.

Similar presentations


Presentation on theme: "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013."— Presentation transcript:

1 ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013

2 Cyber law BB30 Business Law 6.03Summer 2013  Cyberlaw - Law that pertains to computer and computer-related crimes  Cybercrime – any criminal activity associated with a computer  Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer

3 Cybercrime BB30 Business Law 6.03Summer 2013  Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud  Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format  Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer  Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure  Cybervandalism – disrupting, damaging, or destroying a website or computer network  Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files

4 Identity Theft BB30 Business Law 6.03 Summer 2013  Identity theft – using a computer to steal financial, employment, education, medical and personal data  How to report  Other types  Medical Identity  Child Identity

5 Identity Theft BB30 Business Law 6.03Summer 2013 http://ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.pdf Use the above link to access resource document for identity theft. Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records. Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. http://www.fbi.gov/about-us/investigate/cyber/identity_theft Use the above as a resource for activity on identity theft

6 Cybertorts BB30 Business Law 6.03Summer 2013  Invasion, theft, falsification, misuse, or deletion of information stored in a computer  Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation  Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer

7 Important Statutes BB30 Business Law 6.03Summer 2013  Computer Software Copyright Act of 1980  added software programs to the types of work protected by copyright laws  Anticybersquatting Consumer Protection Act  provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it  Uniform Computer Information Transactions Act (UCITA)  Governs law for software agreements, licenses, formulation contracts, and maintenance contracts  Contracts entered into electronically will be just as binding as one negotiated outside of the Web.

8 Important Statutes BB30 Business Law 6.03Summer 2013  Lanham Act of 1976  Provides for the registration and protection of copyrights and trademarks  Trademark Dilution Act of 1996  Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill  Computer Fraud and Abuse Act  An often-amended act that pioneered the treatment of computer- related crimes as unique offenses

9 Important Statutes BB30 Business Law 6.03Summer 2013  Telecommunications Act of 1996  Also known as the Communications Decency Act of 1996  Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution  Gives protection from defamation suits to Internet service providers  Child Online Protection Act of 1998  Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material


Download ppt "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013."

Similar presentations


Ads by Google