Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.

Slides:



Advertisements
Similar presentations
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Advertisements

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 50 Environmental Law and Land Use Controls Twomey Jennings Anderson’s.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 16 Contracts: Legality and Public Policy Twomey Jennings Anderson’s.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
An Introduction to Computer Law Judy Jacobs Miller © 2006.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 7 The Legal Environment of International Trade Twomey Jennings.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Cyber Crimes.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 33 Consumer Protection Twomey Jennings Anderson’s Business Law.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 46 Securities Regulation Twomey Jennings Anderson’s Business.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 8 Crimes.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 47 Accountant’s Liability and Malpractice Twomey Jennings Anderson’s.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Law And Ethics And Ethics.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
by John Bagby and F. William McCarty
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
CHAPTER 33 Cyberlaw.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
E-Commerce: Regulatory, Ethical, and Social Environments
– Communication Technology in a Changing World
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal Environment, Comprehensive 20e Anderson’s Business Law and the Legal Environment, Standard 20e Business Law: Principles for Today’s Commercial Environment 2e

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 2 Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal precedent to new problems presented with the technology of the Internet. Introduction to Cyberlaw

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 3 Tort Issues in Cyberspace Privacy Issues: – sent over an employer’s network is not guaranteed private. – sent over a home-use network may be intercepted; this issue is still developing.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 4 Tort Issues in Cyberspace Privacy: –Web Site Information & Privacy. Websites routinely collect information about their customers; this information may be sold to other businesses. –Identity theft, or the use of someone else’s identity to purchase or obtain credit, is a growing problem. Most web merchants minimize this problem by providing a secure mode of transmitting personal information.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 5 Tort Issues in Cyberlaw Statutory Protections: ECPA, CFAA, COPPA. Appropriation in cyberspace (the unauthorized use of someone’s image) is illegal both on the Internet and elsewhere. Defamation in cyberspace.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 6 Contract Issues in Cyberspace Formation of Contracts. –Though most contract issues have not changed with the Internet, a few new questions have arisen. –At what point is the contract formed? –Is an electronic signature valid? Misrepresentation and Fraud in Cyberspace. –Fraud is the most reported crime committed via the Internet. This is in part due to the high volume of sales transactions over the Internet.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 7 Intellectual Property Issues The Internet has not actually changed intellectual property rights, but has facilitated the illegal copying of copyrighted material. –The best known case dealing with intellectual property via the Internet is the RIAA suit against Napster, the web site which facilitated the free downloading of copyrighted songs.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 8 Criminal Law Issues A computer may be the target of the crime, as when someone “hacks” into a bank’s computer records. Sometimes the computer is the tool of the crime, as in the transporting of pornography across state lines. Criminal Procedures. –The fourth amendment protects against unlawful search and seizures. –Applies to search of homes, offices and computers.

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 9 Constitutional Restraints First Amendment Rights –Internet free speech is protected as it is anywhere. –Violations outside the First Amendment protection are common on the Internet due to ease of communication and anonymity. Commerce Clause issues. –Nexus for Taxes. Where is the office? –Will the Internet Tax Freedom Act pass?

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 10 Constitutional Restraints Due Process Issues. –What about fairness and minimum contacts in interstate commerce? –When should an internet company be required to defend itself in another state?

Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning 11 Securities Law Issues The Internet has facilitated new methods of securities trading, including day trading and minute-by-minute tracking of stock performances. Abuses have arisen from the use of the Internet; most notably the practice of “pump and dump.” This is where a trader spreads false information about a stock to quickly raise its price, then selling existing shares at an inflated price.