© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 17 Legal, Ethical, and Compliance Issues in EC.

Slides:



Advertisements
Similar presentations
Chapter 15 Legal & Ethical Issues
Advertisements

Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe intellectual property law and understand its adjudication.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Ethical and Social Issues in Information Systems
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
Chapter 5 Intellectual Property & Internet Law
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
Regulatory, Ethical, and Compliance Issues in EC.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal.
E-Commerce Strategy, Justification, and Global Implementation
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Government of Brazil Ministry of Justice Department of Consumer Protection and Defense Consumer Protection and Defense in Electronic Commerce Eliane Moreira.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Copyright © 2015 Springer Education 1 Lecture 10 ReF: CH15 E-C OMMERCE : R EGULATORY, E THICAL, AND S OCIAL E NVIRONMENTS.
ELC 200 Day 21. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #7 ed to you in WebCt –Due April 9 at the beginning.
Legal, Ethical, and Social Impacts of EC.  Ethics: The branch of philosophy that deals with what is considered to be right and wrong  What is unethical.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Copyright Law A Guide for Educators. Jolene Hartnett, RDH, BS Seattle Central College © 2015 Certain materials in this program are included under the.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Creative Commons terms and definitions By Chelsey Maton.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
11-1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
The Legal Context of Business
The Legal Context of Business
Legal and Ethical Dimensions of Sport Public Relations
Legal and Ethical Issues in E-Commerce
E-Commerce: Regulatory, Ethical, and Social Environments
Computers and the Internet
A Gift of Fire Third edition Sara Baase
Law and Ethics Lesson 1 Topic 1
Intellectual Property Rights
A Gift of Fire Third edition Sara Baase
Chapter 15 Legal & Ethical Issues
Presentation transcript:

© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 17 Legal, Ethical, and Compliance Issues in EC

17-2 Learning Objectives 1.Understand the foundations for legal and ethical issues in EC. 2.Describe civil, intellectual property, and common law. 3.Understand legal and ethical challenges and how to contain them. 4.Explain privacy, free speech, and defamation and their challenges. 5.Discuss the challenges caused by spam, splogs, and pop-ups. 6.Describe types of fraud on the Internet and how to protect against it.

17-3 Fundamental Legal, Ethical, and Regulatory Issues ethics The branch of philosophy that deals with what is considered to be right and wrong privacy The right to be left alone and free of unreasonable personal intrusions intellectual property Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce

17-4 Splogs and Search Engine Spam to Capture Customer Traffic search engine marketing (SEM) Marketing methods to increase the ranking of a Web site in the search results search engine optimization (SEO) Technique takes into consideration how search engines work (e.g., logical deep linking or strategic keyword) to maximize the number of qualified visitors to a site

17-5 Splogs and Search Engine Spam to Capture Customer Traffic comment spam Spam sent to all types of messaging media, including blogs, IM, and cellular telephones to promote products or services search engine spam Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor quality search results

17-6 Splogs and Search Engine Spam to Capture Customer Traffic spam site Page that uses techniques that deliberately subvert a search engine’s algorithms to artificially inflate the page’s rankings splog Short for spam blog. A site created solely for marketing purposes search engine spamming Collective term referring to deceptive online advertising practices

17-7 Fundamental Legal, Ethical, and Regulatory Issues Laws Are Subject to Interpretation Free speech online versus child protection debate Children’s Internet Protection Act (CIPA) Law that mandates the use of filtering technologies in schools and libraries that received certain types of U.S. federal funding legal precedent A judicial decision that may be used as a standard in subsequent similar cases

17-8 Fundamental Legal, Ethical, and Regulatory Issues Political spam versus dependence on political fund-raising

17-9 Fundamental Legal, Ethical, and Regulatory Issues Law: A System for Social Control due process A guarantee of basic fairness and fair procedures in legal action right Legal claim that others not interfere with an individual’s or organization’s protected interest

17-10 Fundamental Legal, Ethical, and Regulatory Issues Law: A System for Social Control protected interests Interests, such as life, liberty, and property, that a national constitution protects duty Legal obligation imposed on individuals and organizations that prevents them from interfering with another ’s protected interest or right

17-11 Fundamental Legal, Ethical, and Regulatory Issues

17-12 Fundamental Legal, Ethical, and Regulatory Issues Personal and Property Rights civil litigation An adversarial proceeding in which a party (the plaintiff) sues another party (the defendant) to get compensation for a wrong committed by the defendant

17-13 Fundamental Legal, Ethical, and Regulatory Issues Personal and Property Rights Owners of property, including intellectual property, are entitled to: 1.Control of the use of the property 2.The right to any benefit from the property 3.The right to transfer or sell the property 4.The right to exclude others from the property

17-14 Fundamental Legal, Ethical, and Regulatory Issues Criminal Law and Civil Law CAN-SPAM Act Law that makes it a crime to send commercial messages with false or misleading message headers or misleading subject lines

17-15 Fundamental Legal, Ethical, and Regulatory Issues Characteristics of criminal and civil laws crime Offensive act against society that violates a law and is punishable by the government criminal laws Laws to protect the public, human life, or private property statutes Rules that define criminal laws

17-16 Fundamental Legal, Ethical, and Regulatory Issues civil laws Laws that enable a party (individual or organization) that has suffered harm or a loss to bring a lawsuit against whomever is responsible for the harm or loss Computer Fraud and Abuse Act (CFAA) Major computer crime law to protect government computers and other Internet- connected computers

17-17 Civil Law, Intellectual Property Law, and Common Law Intellectual Property Law copyright An exclusive right of the author or creator of a book, movie, musical composition or other artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use infringement Use of the work without permission or contracting for payment of a royalty

17-18 Civil Law, Intellectual Property Law, and Common Law digital rights management (DRM) An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage fair use The legal use of copyrighted material for noncommercial purposes without paying royalties or getting permission

17-19 Civil Law, Intellectual Property Law, and Common Law patent A document that grants the holder exclusive rights to an invention for a fixed number of years trademark A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use

17-20 Civil Law, Intellectual Property Law, and Common Law common law (case law) Law created by judges in court decisions tort Civil wrong that can be grounds for a lawsuit

17-21 Civil Law, Intellectual Property Law, and Common Law Three types of torts: Negligence Nuisance Defamation libel Defamatory statement that is printed or broadcast over the media that causes damage slander Oral or spoken defamatory statement that causes damage

17-22 Legal and Ethical Challenges and Guidelines EC Ethical Issues Non-work-related use of the Internet Codes of ethics

17-23 Privacy, Free Speech, and Defamation Origin of Privacy Rights and the Evolution of Its Meaning Privacy is the right to be left alone and the right to be free of unreasonable personal intrusions To some extent privacy concerns have been overshadowed by post-September 11 terrorism efforts, but consumers still expect and demand that companies behave as responsible custodians of their personal data

17-24 Privacy, Free Speech, and Defamation opt out Business practice that gives consumers the opportunity to refuse sharing information about themselves opt in Agreement that requires computer users to take specific steps to allow the collection of personal information

17-25 Privacy, Free Speech, and Defamation Free Speech Rights to privacy and free speech have an increasingly important role in an information society and to EC The Price of Protection The Internet, in combination with large-scale databases, allows access to vast amounts of data can be used for good or ill

17-26 Privacy, Free Speech, and Defamation

17-27 Privacy, Free Speech, and Defamation Ways of gathering information on the internet: Web site registration Cookies Spyware and similar methods RFID’s threat to privacy Privacy of employees darknet Private online community that is only open to those who belong to it

17-28 Privacy, Free Speech, and Defamation Privacy Protection Ethical principles commonly applied to the collection and use of personal information: Notice or awareness Choice or consent Access or participation Integrity or security Enforcement or redress

17-29 Privacy, Free Speech, and Defamation The USA Patriot Act The intent is to give law enforcement agencies broader range in their efforts to protect the public Concerns about the act include: Expanded surveillance with reduced checks and balances Over breadth with a lack of focus on terrorism Rules that would allow U.S. foreign intelligence agencies to more easily spy on Americans

17-30 Spam, Splogs, and Pop-Ups Spam and Splogs comment spam Spam sent to all types of messaging media, including blogs, IM, and cellular telephones to promote products or services search engine spam Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor quality search results

17-31 Spam, Splogs, and Pop-Ups splog Short for spam blog. A site created solely for marketing purposes trackback An acknowledgment or signal from an originating site to a receiving site

17-32 Spam, Splogs, and Pop-Ups Automated spam Captcha tool Completely Automated Public Turing test to tell Computers and Humans Apart, which uses a verification test on comment pages to stop scripts from posting automatically

17-33 Spam, Splogs, and Pop-Ups

17-34 Spam, Splogs, and Pop-Ups Protecting against Pop-Up Ads Tools for Stopping Pop-Ups Fan and Hate Sites cyberbashing Domain name that criticizes an organization or person

17-35 Fraud and Consumer and Seller Protection Fraud on the Internet click fraud Scams and deceptions that inflate advertising bills by illicitly manipulating keyword-based advertising Other financial fraud

17-36 Fraud and Consumer and Seller Protection Other Legal Issues Electronic contracts electronic signature A generic, technology neutral term that refers to the various methods by which one can “sign” an electronic record digital signature Term for a technology specific type of electronic signature. It involves the use of public key cryptography to “sign” a message

17-37 Fraud and Consumer and Seller Protection Consumer Protection Tips for safe electronic shopping include: Use the real Web site of well-known companies Check any unfamiliar site for an address and telephone and fax numbers and call and quiz a salesperson about the seller Check out the seller with the local chamber of commerce, Better Business Bureau, or TRUSTe Investigate how secure and how well organized the seller’s site is Examine the money-back guarantees, warranties, and service agreements before making a purchase

17-38 Fraud and Consumer and Seller Protection Consumer Protection Tips for safe electronic shopping include: Compare prices online with those in regular stores—too- low prices may be too good to be true Ask friends what they know and find testimonials and endorsements Find out what redress is available in case of a dispute Consult the National Fraud Information Center (fraud.org) Check the resources available at consumerworld.org

17-39 Fraud and Consumer and Seller Protection Third-party assurance services TRUSTe’s “Trustmark” Better Business Bureau WHICHonline Web Trust Seal and others Online Privacy Alliance Evaluation by consumers Authentication and biometric controls

17-40 Fraud and Consumer and Seller Protection Seller Protection The Internet makes fraud by customers or others easier because of the ease of anonymity by: Customers who deny that they placed an order Customers who download copyrighted software and/or knowledge and sell it to others Customers who give false payment Imposter sellers Use of others’ trademarks

17-41 Fraud and Consumer and Seller Protection What Can Sellers Do? Use intelligent software to identify possibly questionable customers Identify warning signals for possible fraudulent transactions Ask customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account

17-42 Managerial Issues 1.What legal and ethical issues should be of major concern to an EC enterprise? 2.What are the most critical ethical issues? 3.Should we obtain patents? 4.What impacts on business is EC expected to make?