Presentation is loading. Please wait.

Presentation is loading. Please wait.

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS

Similar presentations


Presentation on theme: "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS"— Presentation transcript:

1 ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
BB30 Business Law 6.03 Summer 2013 ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law

2 Cyber law Cyberlaw - Law that pertains to computer and computer-related crimes Cybercrime – any criminal activity associated with a computer Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer BB30 Business Law 6.03 Summer 2013

3 Cybercrime Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure Cybervandalism – disrupting, damaging, or destroying a website or computer network Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files BB30 Business Law 6.03 Summer 2013

4 Identity Theft Identity theft – using a computer to steal financial, employment, education, medical and personal data How to report Other types Medical Identity Child Identity Use the above link to access resource document for identity theft. Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records. Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. Use the above as a resource for activity on identity theft BB30 Business Law 6.03 Summer 2013

5 Cybertorts Invasion, theft, falsification, misuse, or deletion of information stored in a computer Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer BB30 Business Law 6.03 Summer 2013

6 Important Statutes Computer Software Copyright Act of 1980
added software programs to the types of work protected by copyright laws Anticybersquatting Consumer Protection Act provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it Uniform Computer Information Transactions Act (UCITA) Governs law for software agreements, licenses, formulation contracts, and maintenance contracts Contracts entered into electronically will be just as binding as one negotiated outside of the Web. BB30 Business Law 6.03 Summer 2013

7 Important Statutes Lanham Act of 1976
Provides for the registration and protection of copyrights and trademarks Trademark Dilution Act of 1996 Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill Computer Fraud and Abuse Act An often-amended act that pioneered the treatment of computer- related crimes as unique offenses BB30 Business Law 6.03 Summer 2013

8 Important Statutes Telecommunications Act of 1996
Also known as the Communications Decency Act of 1996 Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution Gives protection from defamation suits to Internet service providers Child Online Protection Act of 1998 Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material BB30 Business Law 6.03 Summer 2013


Download ppt "ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS"

Similar presentations


Ads by Google