ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Unit 2-1 Business Law. History of the Law What is the basis of law?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Business Law for the Entrepreneur and Manager
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Unethical use of Computers and Networks
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Nasca The agency relationship involves three parties: the genuine agent, the special agent, and the contractor. the independent.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Understand the nature of business. 1. Understand applications and issues of technology. 2.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Essential Standard 2.00 Understand the nature of business. 1.
Chapter 15 Internet Law and E-Commerce
Understand the nature of business.
Chapter 10 Cyberlaw, Social Media, and Privacy
Chapter 19.1 Cyberlaw and Cybercrime
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 17: E-Contracts and Licensing
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 14 Online Commerce and E-Contracts
Five Unethical Uses of Computers
E-Contracts and Internet Law
Understand the nature of business.
Chapter 13 E-Commerce Contracts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Understand the nature of business.
Lesson 2- Protecting Yourself Online
Cyber Law and E-Commerce
Presentation transcript:

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013

Cyber law BB30 Business Law 6.03Summer 2013  Cyberlaw - Law that pertains to computer and computer-related crimes  Cybercrime – any criminal activity associated with a computer  Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer

Cybercrime BB30 Business Law 6.03Summer 2013  Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud  Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format  Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer  Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure  Cybervandalism – disrupting, damaging, or destroying a website or computer network  Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files

Identity Theft BB30 Business Law 6.03 Summer 2013  Identity theft – using a computer to steal financial, employment, education, medical and personal data  How to report  Other types  Medical Identity  Child Identity

Identity Theft BB30 Business Law 6.03Summer Use the above link to access resource document for identity theft. Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records. Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. Use the above as a resource for activity on identity theft

Cybertorts BB30 Business Law 6.03Summer 2013  Invasion, theft, falsification, misuse, or deletion of information stored in a computer  Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation  Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer

Important Statutes BB30 Business Law 6.03Summer 2013  Computer Software Copyright Act of 1980  added software programs to the types of work protected by copyright laws  Anticybersquatting Consumer Protection Act  provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it  Uniform Computer Information Transactions Act (UCITA)  Governs law for software agreements, licenses, formulation contracts, and maintenance contracts  Contracts entered into electronically will be just as binding as one negotiated outside of the Web.

Important Statutes BB30 Business Law 6.03Summer 2013  Lanham Act of 1976  Provides for the registration and protection of copyrights and trademarks  Trademark Dilution Act of 1996  Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill  Computer Fraud and Abuse Act  An often-amended act that pioneered the treatment of computer- related crimes as unique offenses

Important Statutes BB30 Business Law 6.03Summer 2013  Telecommunications Act of 1996  Also known as the Communications Decency Act of 1996  Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution  Gives protection from defamation suits to Internet service providers  Child Online Protection Act of 1998  Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material