Chapter 10 Cyberlaw, Social Media, and Privacy

Slides:



Advertisements
Similar presentations
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Advertisements

William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
CHAPTER Current Future Contract Law for E-Commerce Current Future Contract Law for E-Commerce 9.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 10 Privacy and Security McGraw-Hill
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Business Law for the Entrepreneur and Manager
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Class Discussion Notes MKT April 10, 2001.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
The Acceptable Use of Technology
Chapter 9: Internet Law, Social Media, and Privacy
MGMT 452 Corporate Social Responsibility
Chapter 15 Internet Law and E-Commerce
Fundamentals of business law, 10e
Using Social Media in the University Setting
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
CHAPTER 33 Cyberlaw.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 14 Online Commerce and E-Contracts
E-Commerce: Regulatory, Ethical, and Social Environments
Internet Safety and Acceptable Use Policies.
CS 5339 Web-Based Systems Contract Law
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Government Regulation of Business
E-Contracts and Internet Law
Essentials of the legal environment today, 5e
Ethical Use of Computers
Chapter 13 E-Commerce Contracts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Legal Terms electronic commerce (p. 284) electronic signature (p.286)
Cyber Law and E-Commerce
Presentation transcript:

Chapter 10 Cyberlaw, Social Media, and Privacy Marianne M. Jennings Business Its Legal, Ethical, and Global Environment 10th Ed. Chapter 10 Cyberlaw, Social Media, and Privacy

Employers, Employees, and Cyberlaw Employers are Held Accountable for Electronic Content Criminal Cases are Built from E-mails Harassment Cases are Built from E-mails

Employers, Employees, and Cyberlaw Electronic Communications Privacy Act Applies to live communications Stored Communications Act Probably covers e-mail May not cover live interactions – “Tweeting”

Employers, Employees, and Cyberlaw Case 10.1 City of Ontario v. Quon (2010) What were the officers warned about? Did the city use the last restrictive means for reviewing content of messages?

Employers, Employees, and Cyberlaw Employer’s Right of Access to E-mails Disclosure to employees Sign-off by employees Privacy disclaimers do not apply

Employers, Employees, and Cyberlaw Case 10.2 Holmes v. Petrovich Development Company, LLC (2011) What was different about the content of the employee’s e-mail? What lessons should employees learn from this case about the use of work e-mail for private communications?

Employers, Employees, and Cyberlaw Employer Screening via Google Can conduct pre-employment monitoring Must use with all applicants, not selectively Employer Requests for “Friending” Some states prohibit this requirement as a condition of employment Some states have laws pending Employer should disclose as a condition of employment Admissions Office Screening of Applicants– Some State Laws Pending or Passed

Employers, Employees, and Cyberlaw Employee Misuse of Computers Giving away your password Using computers for personal reasons Case 10.3 New Jersey v. Riley (2009) – What was the type of misuse? – Why does the court have concerns about applying criminal statutes to workplace excesses on computer use?

User Issues in Cyberspace Use of Information Follows FTC guidelines on all uses of consumer information, regardless of how obtained Disclosure of User Identity by ISPs Case 10.4 Varrenti v. Gannett Co., Inc. (2011)

User Issues in Cyberspace Cloud Issues Liability and protections Scanning of information stored there Cookies and Privacy Consent issues Cyberbullying, Cyberstalking, and Privacy State and federal regulation Statutory definitions of conduct for criminal prosecution

User Issues in Cyberspace Statutory Privacy Protections Privacy Act of 1974 – applies to government use of information (NSA, IRS, and Social Security) Computer Fraud and Abuse Act – protects financial information Children’s Online Privacy Protection Act – regulates sites directed at children

User Issues in Cyberspace Posted Information That is Dangerous Ads that encourage criminal activity Dangerous individuals make connections through sites Responsibility of sites to warn, but not required to screen

Appropriation and Others Forms of Unfair Competition Cannot Use Likeness or Image Online for Commercial Advantage Concealed Identity Issues “sock-puppeting” Economic Espionage Act Copyright Issues Digital Millennium Copyright Act No Electronic Theft Act CAN-SPAM

Contract Issues in Cyberspace Formation Electronic signatures are recognized under Electronic Signatures in Global and National Commerce Act (E-sign) Uniform Electronic Transactions Act (UETA) and Uniform Computer Transaction Act (UCITA) Same standards for misrepresentation and fraud apply

Contract Issues in Cyberspace Tax Issues Internet access is not taxed Sales taxes are collected on Internet sales