Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethical and Legal Issues E-M ARKETING /6E C HAPTER 5.

Similar presentations


Presentation on theme: "Ethical and Legal Issues E-M ARKETING /6E C HAPTER 5."— Presentation transcript:

1 Ethical and Legal Issues E-M ARKETING /6E C HAPTER 5

2 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-2 C HAPTER 5 O BJECTIVES  After reading Chapter 5, you will be able to:  Compare and contrast ethics and law.  Discuss the implications of ethical codes and self-regulation.  Identify some of the main privacy concerns within traditional and digital contexts.  Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet.  Highlight key ethical and legal concerns related to online expression.

3 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-3 S OFTWARE I NFRINGEMENT  Copyright violation occurs when people download copyrighted software without a license, loan software to others for which they have no licenses, or install software on more computers than allowed.  Counterfeiting occurs when illegally copied software is duplicated and distributed on a large scale. Compare and contrast ethics and law.

4 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-4 S OFTWARE I NFRINGEMENT, CONT.  Microsoft uses the following remedies:  Proposes intellectual property legislation.  Files civil lawsuits.  Creates noninfringement technologies such as digital rights management (DRM) security programs embedded in software CDs.  Microsoft believes that education is the best weapon against piracy. Do you agree?

5 E THICS AND L EGAL I SSUES  Ethics is a general endeavor that takes into account the concerns and values of a society as a whole.  Laws are normally created for broader purposes, with the goal of addressing national or sometimes international populations.  Although there is a relationship between ethics and legality, they are separate entities that should be treated as such.  Ethics and law are integrally related. ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-5

6 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-6  American Marketing Association (AMA) Codes of ethics states a commitment to:  Honesty  Integrity  Fairness  Modern technology presents challenges to marketing ethics. Critical issues include:  Ownership of intellectual property  The role of privacy in a virtual world  Freedom of expression  Use of data and its collection  Status of children and digital networks E THICS AND L EGAL I SSUES, C ONT.

7 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-7  Recent U.S. administrations have left the development of the Internet to the free operation of the market.  Supporters of self-regulation stress the private sector’s ability to identify and resolve problems.  Critics argue that incentives for self-regulation are insufficient and true prevention will not be achieved.  Recent policy-making activities indicate that governments are asserting themselves in areas such as fraud prevention and children’s privacy. T HE P ROBLEM OF S ELF -R EGULATION Discuss the implications of ethical codes and self- regulation

8 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-8  The concept of privacy encompasses both ethical and legal aspects.  There is constant debate regarding privacy and it has proved to be an elusive concept, both ethically and legally.  Within society, privacy interests compete with concerns for safety, economics, and even the social and psychological need for association with others. P RIVACY Identify some of the main privacy concerns within traditional and digital contexts.

9 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-9 P RIVACY W ITHIN D IGITAL C ONTEXTS  Conflicts about how data should be collected and used have developed.  AMA Code of Ethics for marketing on the Internet: “information collected from customers should be confidential and used only for expressed purposes.” Online advertising firms such as DoubleClick have traditionally recorded users’ clickstreams to form user profiles for marketing purposes. Controversy arose in 2000 when DoubleClick acquired consumer names, addresses, and buying histories and planned to combine the offline data with clickstream data.

10 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-10 P RIVACY W ITHIN D IGITAL C ONTEXTS O NLINE D ATA C OLLECTION  Data are obtained through the use of digital cookies, packets of data created and stored on the user’s hard drive in response to instructions received from a web page.  Cookies serve many purposes:  Create shopping baskets to hold purchases  Recall stored sales information  Collect user data  Cookies allow marketers to pinpoint an individual’s online behavior.

11 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-11 P RIVACY W ITHIN D IGITAL C ONTEXTS PRIVACY DEBATES AND POLICY  Access to personal data is another important online privacy issue.  Cutting-edge applications also raise additional issues. Hostile applets Intelligent agents  While federals laws relating to Internet privacy remain in debate, many offenses can be addressed by conventional statutes: Fair Credit Reporting Act Electronic Communication Privacy Act

12 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-12 P RIVACY W ITHIN D IGITAL C ONTEXTS O THER P RIVACY I SSUES  Opt-in  Policies that allow consumers to control data  Data collection can only take place if there is an affirmative decision to participate  Opt-out  Presumes data collection will take place  Allows users to withdraw consent by sending an email to those requesting the data  The Children’s Online Privacy Protection Act (COPPA) established policies for ethical collection of information from children 12 or under.  Privacy within electronic mail remains an unsettled aspect of online interaction.

13 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-13 INTERNATIONAL PRIVACY ISSUES  The European Union (EU) and the U.S. reached agreement in 2000 to protect EU citizen data.  The Federal Trade Commission (FTC) has identified the following norms for the ethical use of consumer information:  Notice – before data is collected  Consent – choose to participate  Access – access data and correct if necessary  Security – policies to ensure the integrity of data  Enforcement – effective means to hold data collectors to their policies

14 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-14  The law protects intangible or intellectual property through 3 basic mechanisms:  Patent law is centered on inventions.  Copyright addresses issues of expression.  Trademark is concerned with words or images used in the market. D IGITAL P ROPERTY Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet.

15 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-15  “The registered protection of innovations and the ability to reproduce or manufacture an inventor’s product”.  Applying patent law to computing is an uncertain but developing field.  Patents prevent competitors from doing the same thing a different way.  Patent protection has been claimed for reverse online auctions and secure credit card processing.  The U.S. Patent Office has decided to increase the rigor of reviewing applications for software-related protection. P ATENTS

16 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-16  Copyright is “a protection of the right to publish or duplicate the expressions of ideas”.  Copyright is the primary means of protecting most expression on the Internet.  Doctrine of Fair Use Ability to copy protected material for education and news reporting.  Doctrine of First Sale Limit the ability of copyright holder to obtain profit after the initial time at which the material is sold. C OPYRIGHT

17 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-17 C OPYRIGHT, CONT.  The No Electronic Theft (NET) Act was signed into law in 1997.  Provide copyright protection for computer content and imposes permissions for violation.  The 1998 Digital Millennium Copyright Act (DMCA) contains several provisions.  Protects ISPs from acts of user infringement.  Criminalizes the circumvention of software protections.  Complies with international standards for copyrighted material.

18 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-18  Trademark law concerns the “ownership of intellectual property that identifies goods or services”.  Trademarks may be registered with the government.  Trademark law as been applied to the Internet naming system of domain names.  Similarities in names may result in trademark infringement claims. T RADEMARKS

19 T RADEMARKS C ONT.  A trademark violation, Cybersquatting, involves the registration of domains that resemble or duplicate existing ones.  Metatags – HTML tags that describe a website’s contents Prov ide a valuable means of attracting users to a site Allow search engines to identify sites  Keywords Used within search engines Variations may drive consumers to unlicensed dealers ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-19

20 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-20  Licenses are an increasingly popular method of intellectual property protection.  Licenses are “contractual agreements made between consumers and software vendors”.  Licenses allow the buyer to use the product but restrict duplication or distribution.  Licenses may be two basic types:  Shrinkwrap or break-the-seal licenses  Clickwrap licenses where the user is required to click to accept the terms  Legal trend favors enforcement of software licenses. L ICENSES

21 T RADE S ECRETS  The Economic Espionage Act of 1996 makes it a criminal offense to reveal trade secrets such as commercial, scientific and technical endeavors  Trade secrets may include:  Formulas,  Market data,  Algorithms,  Programs,  Codes, and  Models 5-21

22 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-22 D ATA O WNERSHIP  Legal and ethical debates about data access and ownership questions abound.  Online technologies such as click data and spidering raise concerns about data ownership.  A movement is growing to protect data related to facts, namely specially compiled databases or sui generis data.

23 D ATA O WNERSHIP, CONT.  Click data provides data access from:  Site owners  Marketing professionals  Advertisers  Consumers  Spidering  Using robots to enter targeted website  Obtains data for the use of its owner ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-23

24 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-24 O NLINE E XPRESSION  Internet technology has resulted in what many consider inappropriate or untargeted types of consumer contact.  Spam is the mass distribution of unsolicited electronic mail.  The AMA Code of Ethics addresses the spam issue  The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages  The argument remains between opt-in and opt-out approaches to unsolicited email Highlight key ethical and legal concerns related to online expression

25 O NLINE E XPRESSION, C ONT.  CAN-SPAM Act of 2003 created a comprehensive, national framework for email marketing.  Expression directed to children remains a highly visible issue within online law and ethics.  The boundaries of expression will continue to be challenged by the Internet. ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-25

26 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-26 E MERGING I SSUES  The Internet Corporation for Assigned Names and Numbers (ICANN) was formed in 1998 to resolve conflicts related to domain naming.  A private, non-profit regulatory body  Responsible for the administration of the Internet name and address system Criticisms  Operating under secrecy  Failing to represent the broad range of online users  Jurisdiction is the ability of a court or other authority to gain control over a party.  Traditionally based on physical presence.  Agreements may provide for international resolution and enforcement.

27 ©2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL 5-27  Fraud is the use of deception and false claims to obtain profit.  The Internet provides opportunities for novel deceptions.  The average person is not in a position to understand how information is displayed, transferred, or stored  Spoofing is the use of e-mail or websites to impersonate individuals or corporations.  The FTC, FBI, and state agencies have increased their efforts to track and prosecute fraudulent conduct. E MERGING I SSUES, CONT.

28 5-28 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall


Download ppt "Ethical and Legal Issues E-M ARKETING /6E C HAPTER 5."

Similar presentations


Ads by Google