E-Marketing/6E Chapter 5

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Advertisements

MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Intellectual Property Boston College Law School February 4, 2009 Copyright – Indirect, Digital Issues.
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Copyright © 2006 Pearson Education, Inc. Slide 9-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 5: Ethical and Legal Issues
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
INTERNET and CODE OF CONDUCT
E-Marketing/7E Chapter 6
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 5 Objectives After reading Chapter 5, you will be able to:
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Unit 30:Chapter 3 Ethical and Legal Issues
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter Two Advertising’s Role in Marketing. Prentice Hall, © Marketing is considered to be: a) The way a product is advertised among target.
E-MARKETING 5/E JUDY STRAUSS AND RAYMOND FROST Chapter 5: Ethical and Legal Issues ©2009 Pearson Education, Inc. Publishing as Prentice Hall 5-1.
Conditions and Terms of Use
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall International Business Environments and Operations, 13/e Part Two Comparative Environmental.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Class Discussion Notes MKT April 10, 2001.
Direct / Online marketing Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17.
Day 7 ELC 310. Copyright 2005 Prentice HallCh 1 -2 Agenda Questions? Assignment 1 Posted – Indentifying target markets – Due Oct 1
Ethical and Legal Issues By Hanniya Abid Assistant Professor COMSATS Institute of Information Technology E-Marketing Lecture 6.
Chapter 17 E-Commerce and Digital Law
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
E-Marketing/7E Chapter 5
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Ethical and Legal Issues E-M ARKETING /6E C HAPTER 5.
©2006 Prentice Hall ELC 310 Day 6. ©2006 Prentice Hall Agenda Questions? Assignment 1 due Assignment 2 Posted Due Sept 26 Exam 1 on Sept 26 Chaps 1-5.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Copyright © 2010 Pearson Education, Inc.Copyright © 2007 Pearson Education, Inc. Slide 1-1 ELC 200 Day 17.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Lecture 9 Ethical and Legal Issues Source: E-Marketing 5/E (Judy Strauss & Raymond Frost) © Sekolah Tinggi Teknik Surabaya 1.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
©2006 Prentice Hall ELC 310 Day 5. ©2006 Prentice Hall Agenda Questions? Assignment 1 Corrected 5 A’s, 1 B, 2 C’s, 2 D’s and 1 non-submit Assignment 2.
E-Marketing/7E Chapter 5 Ethical and Legal Issues.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Chapter 15 Copyright © 2015 Pearson Education. Slide 2 of 34 Chapter 15 Learning Objectives 15.1 To understand the meaning and importance of marketing.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
MGMT 452 Corporate Social Responsibility
Fundamentals of business law, 10e
Ethical, Social, and Political Issues in E-commerce
Ethical and Legal Issues
ELC 310 DAY 5 ©2006 Prentice Hall.
Legal and Ethical Issues in E-Commerce
E-Marketing/6E Chapter 5
6. Politics, Ethics and Law
E-Marketing/7E Chapter 6
E-Marketing/7E Chapter 6
Essentials of the legal environment today, 5e
Presentation transcript:

E-Marketing/6E Chapter 5 Ethical and Legal Issues

Chapter 5 Objectives After reading Chapter 5, you will be able to: Compare and contrast ethics and law. Discuss the implications of ethical codes and self-regulation. Identify some of the main privacy concerns within traditional and digital contexts. Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet. Highlight key ethical and legal concerns related to online expression. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Software Infringement Copyright infringement “violation” occurs when people download copyrighted software without a license, loan software to others for which they have no licenses, or install software on more computers than allowed. Counterfeiting occurs when illegally copied software is duplicated and distributed on a large scale. Globally, over 40% of the software sold is an infringing version. Compare and contrast ethics and law. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Software Infringement, cont. Microsoft uses the following remedies: Proposes intellectual property legislation. Files civil lawsuits. Creates noninfringement technologies such as digital rights management (DRM) security programs embedded in software CDs. Microsoft believes that education is the best weapon against piracy. Do you agree? ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Overview of Ethics and Legal Issues Ethics and law are integrally related. Ethics frequently concerns the values and practices of those (directed toward individual or group endeavors) who have expert knowledge of a specific field. Ethics also is a general endeavor that takes into account the concerns and values of a society as a whole. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Overview of Ethics and Legal Issues, Cont. Law is also an expression of values, but created for broader purposes with the goal of addressing national or sometimes international populations, so that citizens will be familiar with their rights and obligations. Laws regulating the internet are at a disadvantage because they may be nearly obsolete by the time of passage. Although there is a relationship between ethics and legality, they are separate entities that should be treated as such. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Ethics and Ethical Codes The central focus of ethics is the analysis and description of what is right and wrong, and how we judge the difference. American Marketing Association (AMA) Statement of Ethics (or AMA Codes of Ethics) states a commitment to exercise of: Honesty Responsibility Transparency Respect Citizenship Fairness ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Ethics and Ethical Codes, Cont. Modern technology presents challenges to marketing ethics. Critical issues include: Ownership of intellectual property The role of privacy in a virtual world Freedom of expression Use of data and its collection Status of children and digital networks ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

The Problem of Self-Regulation Recent U.S. administrations have left the development of the Internet to the free operation of the market. Supporters of self-regulation stress the private sector’s ability to identify and resolve problems. Critics argue that incentives for self-regulation are insufficient and true prevention will not be achieved. Recent policy-making activities indicate that governments are asserting themselves in internet regulation and control in areas such as privacy, data protection and fraud prevention. Discuss the implications of ethical codes and self-regulation ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy The concept of privacy encompasses both ethical and legal aspects. There is constant debate regarding privacy and it has proved to be an elusive concept, both ethically and legally. No specific privacy provision within the Constitution. Within society, privacy interests compete with concerns for safety, economics, and even the social and psychological need for association with others. Identify some of the main privacy concerns within traditional and digital contexts. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy Within Digital Contexts AMA Code of Ethics for marketing on the Internet: “information collected from customers should be confidential and used only for expressed purposes.” The Internet uses several different ways to gather information, some of which may be considered unethical. Online advertising firms such as DoubleClick have traditionally recorded users’ clickstreams to form user profiles for marketing purposes. Controversy arose in 2000 when DoubleClick acquired Abacus-Direct with list of consumer names, addresses, and buying histories and planned to combine the offline data with clickstream data, a plan later withdrawn. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy Within Digital Contexts, Cont. Cookies are the most common way for online marketers to obtain customer data. Cookies are packets of data created within the hard drive Cookies serve many purposes: Can be retransmitted from a user’s computer to websites Can be used to track user actions and information with no permission This information may be sold or transferred without permission Cookies allow marketers to pinpoint an individual’s online behavior. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy Within Digital Contexts, Cont. Opt-in Policies that allow consumers to control data Data collection can only take place if there is an affirmative decision to participate Opt-out Presumes data collection will take place Allows users to withdraw consent by sending an email to those requesting the data The Children’s Online Privacy Protection Act (COPPA) established policies: Websites cannot collect information from children under 12 years unless conditions are met Notice to parents Verifiable parental agreement Other terms ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy Within Digital Contexts, Cont. Spyware and adware have recently been recognized as possible violations of privacy as well. Web sites such as Facebook and Google have been involved in numerous privacy cases and class actions. Nearly every major Web site collects personally identifiable information, but just over half specify on the site how the information will be used. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Privacy Within Digital Contexts, Cont. Access to personal data is another important online privacy issue. Cutting-edge applications also raise additional issues. Hostile applets: programs that can be used to access and transmit data on hard drive s, including e-mail addresses and credit cards records, etc… Intelligent agents: programs that can function autonomously within the web to make electronic decisions. Cookies, Java applets, and intelligent agents are ubiquitous applications that function without a user’s knowledge or control. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

INTERNATIONAL PRIVACY ISSUES The European Union (EU) and the U.S. reached agreement in 2000 on safe harbor provisions to protect EU citizen data. There is also growing interest in personal data protection in Asia, especially Hong Kong, Japan, South Korea and Singapore. The U.S. Federal Trade Commission (FTC) has identified the following norms for the ethical use of consumer information: Notice – before data is collected Consent – choose to participate Access – access data and correct if necessary Security – policies to ensure the integrity of data Enforcement – effective means to hold data collectors to their policies ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Digital Property The law protects intangible or intellectual property through 3 basic mechanisms: Patent law is centered on covering inventions. Copyright law is centered on covering the expression of ideas. Trademark law is concerned brands and source identifiers in the marketplace. A single communication may contain: A novel way of communicating covered by a patent. Text and pictures protected by copyright; and Proprietary branding covered by trademark law. Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Patents “The registered protection of innovations and the ability to reproduce or manufacture an inventor’s product”. Applying patent law to computing is an uncertain but developing field. Patents prevent competitors from doing the same thing a different way. Patent protection has been claimed for reverse online auctions and secure credit card processing, , and methods for reading Web site ads. The U.S. Patent Office has decided to increase the rigor of reviewing applications for software-related protection. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Copyright Copyright is “a protection of the right to publish or duplicate the expressions of ideas”. Copyright is the primary means of protecting most expression on the Internet. Doctrine of Fair Use Ability to copy protected material for education and news reporting. Doctrine of First Sale Limit the ability of copyright holder to obtain profit after the initial time at which the material is sold. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Copyright, cont. The No Electronic Theft (NET) Act was signed into law in 1997. Provide copyright protection for computer content. Thought to encourage innovation by protecting material placed on the Internet. The 1998 Digital Millennium Copyright Act (DMCA) contains several provisions. Protects ISPs from acts of user infringement. Criminalizes the circumvention of software protections. Complies with international standards for copyrighted material. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Trademarks Trademark law is the area of intellectual property governing source identifiers for goods or services. Trademark law is a consumer protection law. Trademarks may be registered with the government. Trademark law as been applied to the Internet naming system of domain names. Similarities in names may result in trademark infringement claims. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Trademarks Cont. A trademark violation, Cybersquatting, involves the registration of domains names that resemble or duplicate existing ones. Metatags – HTML contents that describe a website’s contents Allow search engines to identify sites. Provide a valuable means of attracting users to a site Keywords Used within search engines Variations may drive consumers to unlicensed dealers ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Licenses Licenses are an increasingly popular method of intellectual property protection. Licenses are “contractual agreements made between consumers and software vendors”. Licenses allow the buyer to use the product but restrict duplication or distribution. Licenses may be two basic types: Shrinkwrap or break-the-seal licenses Clickwrap licenses where the user is required to click to accept the terms Legal trend favors enforcement of software licenses. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Trade Secrets The Economic Espionage Act of 1996 makes it a criminal offense to reveal trade secrets such as commercial, scientific and technical endeavors. Trade secrets may include: Formulas, Market data, Algorithms, Programs, Codes, and Models Computer-based disclosures: emails, downloads, web publications…etc. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Data Ownership Legal and ethical debates about data access and ownership questions abound. Online technologies such as: Click data provides data access from: Site owners Marketing professionals Advertisers Consumers, and Spidering raise concerns about data ownership Using robots (software) to enter targeted website and obtains data for the use of its owner. A movement is growing to protect data related to facts, namely specially compiled databases or sui generis data. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Online Expression Mass distribution of unsolicited email or spam has been the subject of much complaint. Spam is the mass distribution of unsolicited electronic mail. Code of Ethics addresses the spam issue The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages Regulation raises issues of freedom of expression and voluntary opt-in or opt-out Highlight key ethical and legal concerns related to online expression ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Online Expression, Cont. CAN-SPAM Act of 2003 created a comprehensive, national framework for email marketing. Expression directed to children remains a highly visible issue within online law and ethics. The boundaries of expression will continue to be challenged by the Internet. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Emerging Issues Online Governance and ICANN The Internet Corporation for Assigned Names and Numbers (ICANN) was formed to resolve conflicts related to domain naming. A private, non-profit regulatory body Responsible for the administration of the Internet name and address system Criticisms Operating under secrecy Failing to represent the broad range of online users ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Emerging Issues, Cont. Jurisdiction The legal term that describes the ability of a court or other authority to gain control over a party. Traditionally based on physical presence. Agreements may provide for international resolution and enforcement. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Emerging Issues, cont. Fraud The use of deception & false claims to obtain profit. The average person is not in a position to understand how information is displayed, transferred, or stored. Thus, the Internet provides opportunities for novel deceptions. Spoofing is the use of e-mail or websites to impersonate individuals or corporations. Used to extract sensitive information Leads a customer to believe that a request is coming from a reputable source The FTC, FBI, and state agencies have increased their efforts to track and accuse fraudulent conduct. ©2014 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2014 Pearson Education, Inc.   Publishing as Prentice Hall