ethical issues in business

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Information and resources
The Do Not Call Register Act 2006 and The Spam Act 2003 Jane Cole Manager, Telemarketing Investigations Section Julia Cornwell McKean Manager, Anti Spam.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
INTERNET and CODE OF CONDUCT
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Quiz Review.
ICT Essential Skills. (electronic mail) Snail Mail.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Issues Raised by ICT.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Internet safety By Lydia Snowden.
Spam and E-Security Bruce Matthews Manager, Anti-Spam Team International Training Program 11 September 2006.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? Graeme Crombie Senior Associate Minter Ellison.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
What is Spam? d min.
Security fundamentals Topic 9 Securing internet messaging.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Rules of Engagement Mark Dwyer. AGENDA 1.Spam and Consent 2.Privacy 3.Advice Warnings and Notices 4.Disclosures 5.Other Matters.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By Toby Reed.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Computer Skills (1) .
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Learn how to protect yourself against common attacks
Technology Communication ( )
Lesson 3 Safe Computing.
Working with Google Applications Gmail, a popular
I S P S loss Prevention.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
ethical issues in business
Cyber Issues Facing Medical Practice Managers
Ethics Tutorial Assignment#2
Copyright URLs © EIT, Author Gay Robertson, 2017.
& Social Media Netiquette URLs
Harmful Digital Communications Act 2015 URLs
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
Material Submission template for Corporate Amazon. co
ethical issues in business
Student User Agreement and Policy 2022
Electronic Communication and the Internet
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Citi Commercial Cards – Fraud Early Warning
ethical issues in business
Codes of Conduct EIT, Author Gay Robertson, 2019.
Presentation transcript:

ethical issues in business Unsolicited Electronic Messages Act 2007 EIT, Author Gay Robertson, 2017

What is spam? Current estimates suggest that around 120 billion spam messages are sent every day Spam is the generic term for the electronic commercial email and SMS (short message service) text messages you receive without having requested them

These messages are essentially commercial in nature and may be sent by legitimate businesses which are marketing and promoting their goods and services The messages may also invite the recipient to purchase a product or service Other spam may attempt to trick people into divulging their bank account or credit card details and can also contain offensive or fraudulent material or spread computer viruses Delete SPAM messages without opening them

Can include: Email Fax Instant messaging Mobile/Smart phone texts Image based messages (eg from businesses)

Purpose of the Act Prohibit unsolicited commercial electronic messages (spam) with a New Zealand link (eg messages sent to, from or within New Zealand) Require commercial electronic messages to include accurate information about the person who authorised the sending of the message Include a functional unsubscribe facility to enable the recipient to instruct the sender that no further messages are to be sent to the recipient

Prohibit address-harvesting software being used to create address lists for sending unsolicited commercial electronic messages Deter people from using information and communication technologies inappropriately The Act covers email, instant messaging, SMS and MMS (text and image-based mobile phone messaging) of a commercial nature It does not cover faxes, Internet pop-ups or voice telemarketing Read the next section of your workbook until you need to go to Slide 7 (What is not considered spam? What can companies do to ensure they are not spamming?) Or close the presentation if you want to come back to this later

Implications for business … Spam law in New Zealand URL: https://www.dia.govt.nz/Spam-Information-for-Businesses#one Close the Internet and You will go back to the presentation Read the next section of your workbook (What can computer users do to prevent spam? And Internal Affairs downloads) until you need to go to Slide 8 Or close the presentation if you want to come back to this later

Penalties for breaches … Stuff articles: Auckland spammer URL: http://www.stuff.co.nz/technology/64912239/auckland-spammer-zeljko-aksentijevic-fined-12-000 Trio face fines URL: http://www.stuff.co.nz/national/crime/672932/Trio-face-200-000-fines-in-first-spam-prosecution Email spammer fined URL: http://www.stuff.co.nz/business/5626517/Email-spammer-faces-fines-of-up-to-2-1m Spam fine for business URL: http://www.stuff.co.nz/business/industries/9041805/Spam-leads-to-95-000-fine Close the Internet You will go back to the presentation

Remember … Implications for you… The negative effects are significant and far-reaching These emails clog up the internet and disrupt email delivery reduce business productivity raise internet access fees irritate recipients Failure to comply with the Act and employer policies, will result in Cost recovery from the person committing the breach (YOU) Internet access rights may be removed ESC to close the presentation