Introduction to IT and E- Commerce Law and Policy Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Program in IS Management Department.

Slides:



Advertisements
Similar presentations
Chapter 15 Legal & Ethical Issues
Advertisements

Executive Perspective for Scientists & Engineers (EPSE) A Real World Look at IP Infringement Randall K. Broberg, Esq. April 8, 2013.
Computer Crimes and Security Professor Matt Thatcher.
ISMT 520 Lecture #4: Kira Davis v. WJN Case and E-Commerce Legal Issues Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Programs.
ISMT 520 Lecture #2: Software and Copyright Law Dr. Theodore H. K. Clark Associate Professor and Director of MSc Program in IS Management Department of.
Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
A Public Policy Research Agenda in IST John W. Bagby Professor of IST Co-Dir. Inst. Info. Policy.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
ISMT 520 Lecture #5: TradeMark, Brand & Identity and E-Commerce Law Issues Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Programs.
Tradeoffs in Competitive Positioning Strategy Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc in Information Systems Management.
ISMT 520 Lecture #6: Protecting Technical and Business Process Innovations Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Programs.
Introduction to Business Analysis (and Competitive Strategy) Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc in Information Systems.
ISMT 520 Lecture #3: Fair Use Exceptions, DMCA, and Individual Assignment Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Programs.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
INTERNET and CODE OF CONDUCT
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
What is copyright? the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or.
1 Revised: April 29, What is a Web Domain?  A HOSTNAME that identifies one or more IP addresses (web servers)  IP address (Internet Protocol)
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
> > > > Business Law Appendix A. Legal System & Administrative Agencies The judiciary is the court system, the brand of government responsible for settling.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
C4- Social, Legal, and Ethical Issues in the Digital Firm
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Electronic Use Policies.   Social Media  Internet.
Introduction to Computer Science
Principles and Rules of Copyright Copyright is protection for intellectual property.
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved E-Commerce Specialist.
Bradley Lecture International IP Law IM 350 – Fall 2012 Steven L. Baron November 15, 2012.
Enforcement Mechanisms IT 801 – Information Law and Policy Professor David E. Sorkin Adj. Professor Leslie Ann Reis November 5/2000.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 24 Intellectual Property.
Copyright for Book Artists Ariadni Athanassiadis Kyma Professional Corporation CBBAG, Ottawa December 11, 2013.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Intellectual Property & Ecommerce Issues. What is Intellectual Property? Any product or result of a mental process that is given legal protection against.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 1: OVERVIEW OF THE U.S. INTELLECTUAL PROPERTY SYSTEM.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Copyright Donna Min Shiroma School Library Services Advanced Technology Research Branch Office of Curriculum, Instruction and Student Support © September.
E-Marketing/7E Chapter 5 Ethical and Legal Issues.
Protecting your Managed Services Practice: Are you at Risk?
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Computing, Ethics and The Law
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
MT311 – Business Law I Seminar Presentation UNIT 3 Criminal Law and Cyber Crimes I. Chapter 5, Intellectual Property and Internet Law II. Chapter 6, Criminal.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 7: Intellectual Property.
LEGAL AGREEMENTS AROUND THE WORLD. International legal systems and liability Property and contracts Resolving legal differences Legal Agreements Around.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Chapter 10 Intellectual Property and Internet Law.
Intellectual Property Owner’s Manual
Learning Area 1 Information And Communication Technology and Society
Chapter 15 Legal & Ethical Issues
Presentation transcript:

Introduction to IT and E- Commerce Law and Policy Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Program in IS Management Department of Information & Systems Management Hong Kong University of Science & Technology and Visiting Associate Professor of Operations & Information Management (Information Economics and Strategy Group) The Wharton School of the University of Pennsylvania

HKUST Business School 2 What is CyberLaw? Intellectual Property Laws Internet Laws and Regulations Telecommunications Laws and Regulations Software Laws (including encryption) Copyright Law Patent Law Trademark Law International Trade Laws and Treaties

HKUST Business School 3 Law, Regulation, and Policy What do we mean by the “rule of law”? Who makes laws? How are they made? What is the relationship between laws and regulations or policy? Which of these are most applicable to the different areas of Cyberlaw? Why?

HKUST Business School 4 CyberLaw is a MYTH! There is no CyberLaw. There are many CyberLaws. Noone can make laws in Cyberspace. Everyone makes laws in Cyberspace. Cyberspace is unregulated. Cyberspace is excessively regulated by every jurisdiction applying conflicting laws.

HKUST Business School 5 Internet Governance Internet Law and Telecom Law No laws, many laws, both at once! Evolving slowly for Telecom Law Developing slowly for Internet Law Role of ITU in Telecom and Internet Role of USA in Telecom and Internet Law Law, Regulation, and Policy Why do we need an Internet law at all? Network Solutions, Inc. as Cyberspace Landlord

HKUST Business School 6 CyberLaw: Mice and Elephants There are many laws that apply to Cyberspace, but these laws can be difficult to enforce against small, entrepreneurial firms. Large firms are like elephants, they are easy to see and find and they will crush anything in their way, but they can’t hind for long. Small firms, like mice, might be crushed or killed, but 3 more will rise when one is killed; governments can not effectively stop them.

HKUST Business School 7 Intellectual Property Law Copyright Laws Patent Laws Trademark Laws Trade Secrets Laws Software Law as special application Encryption different from Software Laws Military or Government Security Issues Freedom of Speech Issues

HKUST Business School 8 Software Law Protected by copyright law, not by patent laws Stronger that patents in some ways, but weaker in others Longer protected life than patent Immediate copyright protection upon creation Fair use doctrine as defense Does not protect idea, only expression Stops exact copying, not functional duplication

HKUST Business School Patent Law Protects FUNCTION, not expression Amazon patented its one-click function, as copyright would not have protected this function Replicating code for one-click function easy to do Lengthy application and approval process Significant legal costs may be required Patents may be required in multiple jurisdictions Patent limited to exact terms of application Be careful to limit patent claims narrowly

HKUST Business School 10 Trademark Law Protects brands, corporate names or slogans “It’s the real thing: Coke” Significant source of litigation in Cyberspace Same name of firm in different states, who has right to use the name in Cyberspace? Domain name squaters? Legalized blackmail? New cyberspace domains created – confusion? Can not be generic or functional (Xerox) Strongest defense for fabricated names

HKUST Business School 11 Trade Secret Information must be kept confidential Sharing with any outside party voids rights Must inform employees information is secret Software can be trade secret if compiled Incompatible with copyright – not published Misappropriation illegal, replication legal May include elements of public domain in system, but must have unique secrets

HKUST Business School 12 Software as Expression Justification for applying copyright to software is that it is an expression like that of an artist’s novel or a painting This raises question regarding applicability of freedom of speech for software and code US constitution protects freedom of speech US government tried to stop publishing of encryption code as security law violations Academics claimed code was protected speech

HKUST Business School 13 Copyright, Software, and the Applications to the Internet Any copying in print or electronic form of any expression without author’s consent is violation of copyright protections, even if only for an instant Copyright always exists immediately upon publication Rights can be waived, but need not be asserted to be valid Any copying of expression is violation, unless exception Fair use doctrine not adequate defense for Internet Limited to copying small percentage only for non-profit use Internet copies the entire site many, many times Special exceptions to copyright laws created for ISPs Be careful about copying others’ website code!

HKUST Business School 14 Jurisdiction and Choice of Law Most businesses have the right to choose the laws they will operate under and be subject to Cyberspace firms may be held liable for violations of laws in ANY JURSIDICTION from which citizens of that nation can view their websites! France and eBay auctions for USA – strict liability. German and Compuserve pro-Nazi sites in USA. Italian site subject to US law in New York. State laws in USA – community standards applied Firms responsible for preventing local law violation No automatic membership, check address, age, etc. Alternatively, be small and hard to sue! (e.g., porn sites)

HKUST Business School 15 Contract Law and the Internet Terms of use important for eCommerce Make choice of law and venue clear in contract Require action to affirm customer has read terms Inconsistent or unclear terms favor customers Warrantees trump disclaimers Be careful about express or implied warantees Make terms clear of any intended guarantees Make disclaimers clear and consistent everywhere Puffing allowed, but be careful about bounds

HKUST Business School 16 Computer Crimes Most computer crimes involve insiders Hacking happens, but generally with inside help Increasing computer crime and associated costs More than 30% and possibly more than 50% of major firms experience computer crime Why are reported statistics much lower? Computer crime analogy to sexual assault Cost of prevention versus cost of recovery