ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Unit 2-1 Business Law. History of the Law What is the basis of law?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Business Law for the Entrepreneur and Manager
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Unethical use of Computers and Networks
Nasca The agency relationship involves three parties: the genuine agent, the special agent, and the contractor. the independent.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
LANDMARK DECISIONS and STATUTES IN CYBERLAW Business Law I Chapter 2 Angela Creech, Instructor.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Add video notes to lecture
Chapter 15 Internet Law and E-Commerce
Understand the nature of business.
Chapter 10 Cyberlaw, Social Media, and Privacy
Chapter 19.1 Cyberlaw and Cybercrime
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 17: E-Contracts and Licensing
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 14 Online Commerce and E-Contracts
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
E-Contracts and Internet Law
Understand the nature of business.
Chapter 13 E-Commerce Contracts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Understand the nature of business.
Lesson 2- Protecting Yourself Online
Cyber Law and E-Commerce
Presentation transcript:

ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013

Cyber law Cyberlaw - Law that pertains to computer and computer-related crimes –Cybercrime – any criminal activity associated with a computer –Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer BB30 Business Law 6.03Summer 2013

Cybercrime Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure Cybervandalism – disrupting, damaging, or destroying a website or computer network Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files BB30 Business Law 6.03Summer 2013

Identity Theft Identity theft – using a computer to steal financial, employment, education, medical and personal data How to report Other types –Medical Identity Theft - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records –Child Identity Theft - Child identity theft happens when someone uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges. BB30 Business Law 6.03Summer 2013

Cybertorts Invasion, theft, falsification, misuse, or deletion of information stored in a computer –Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation –Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer BB30 Business Law 6.03Summer 2013

Important Statutes Computer Software Copyright Act of 1980 – added software programs to the types of work protected by copyright laws Anticybersquatting Consumer Protection Act –provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it Uniform Computer Information Transactions Act (UCITA) –Governs law for software agreements, licenses, formulation contracts, and maintenance contracts –Contracts entered into electronically will be just as binding as one negotiated outside of the Web. BB30 Business Law 6.03Summer 2013

Important Statutes Lanham Act of 1976 –Provides for the registration and protection of copyrights and trademarks Trademark Dilution Act of 1996 –Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill Computer Fraud and Abuse Act –An often-amended act that pioneered the treatment of computer- related crimes as unique offenses BB30 Business Law 6.03Summer 2013

Important Statutes Telecommunications Act of 1996 –Also known as the Communications Decency Act of 1996 –Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution –Gives protection from defamation suits to Internet service providers Child Online Protection Act of 1998 –Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material BB30 Business Law 6.03Summer 2013