Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.

Slides:



Advertisements
Similar presentations
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Legal and Ethical Issues: Privacy and Security Chapter Five.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
INTERNET and CODE OF CONDUCT
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 17 E-Commerce and Digital Law
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Dimensions of E – Commerce Security
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles,
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Any criminal action perpetrated primarily through the use of a computer.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 10 Cyberlaw, Social Media, and Privacy
CHAPTER 23 Creating a Negotiable Instrument
CHAPTER 21 Warranties and Product Liability
CHAPTER 33 Cyberlaw.
Computer Programming I
Presentation transcript:

Legal Environment for a New Century

Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles, the slide is completely shown. You may click one of the blue triangles to move to the next slide or the previous slide.

Legal Environment for a New Century Quote of the Day “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears wash out a word of it.” Omar Khayyam (1050?-1123?), Persian poet, astronomer and mathematician

Legal Environment for a New Century Cyberlaw Issues  Contract law has to deal with the validity of electronic signatures.  Securities law has to determine proper methods of online transactions.  Intellectual property law has been challenged by the ease of downloading copyrighted material and the potential for abuse.  The new area of cyberlaw itself is dealing with issues such as online privacy, hacking and spam.

Legal Environment for a New Century Privacy  Personal communications and private information such as financial data may be exposed when transmitted via the internet from three main sources: Internet tracking Computer hard drive

Legal Environment for a New Century Internet Tracking  A cookie is a small file that includes an identification number and personal data such as your name, address, phone and credit card numbers and internet searches you have made. Cookies are used to target ads to the specific interests of a user. Cookies allow “one-stop-shopping” on sites where the user has registered information. Some cookies work only on a specific web site; others follow a user from site to site.

Legal Environment for a New Century Self-Regulation of Online Privacy  Web advertisers have few restrictions about the use of personal data.  The Network Advertising Initiative is a voluntary organization with guidelines. NAI member websites should provide “clear and conspicuous notice” of their privacy policy. Consumers should be able to choose if personal data is collected. Web sites should provide reasonable access to collected data. (What is reasonable?) Web sites should provide reasonable security for collected data. Click here for internet links about NAI principles.

Legal Environment for a New Century Government Regulation of Online Privacy  Children’s Online Privacy Protection Act of 1998 (COPPA) This statute prohibits internet operators from collecting information from children under age 13 without parental permission. It also requires sites to disclose how they will use any information they acquire.  Federal regulations The FTC has asked Congress to enact Federal standards, to prevent having 50 different state laws. Federal courts are increasingly becoming involved through cases involving internet privacy.

Legal Environment for a New Century Your Hard Drive as a Witness  In some cases, a computer hard drive may be seized as evidence.  Seizure must be reasonable and conducted with a warrant.  Extra protections are given to those involved in the publishing industry.

Legal Environment for a New Century Electronic Communications Privacy Act of 1986  Prohibits the unauthorized interception or disclosure of wire and electronic communication. The intended recipient of an may disclose it to anyone she desires. ISPs are generally prohibited from disclosing electronic messages to anyone other than the addresee. An employer may monitor only in certain situations. The government must have a search warrant to access e- mail messages.

Legal Environment for a New Century Common Law Regulation of Privacy  Under the common law, intrusion onto someone’s private life is a tort if a reasonable person would find it offensive.

Legal Environment for a New Century Encryption  Encryption software is designed to safeguard the confidentiality of internet communication. This software makes transmitted material unreadable while in “transit” and then readable only to those with the decoder.  Due to potential military use, encryption software is banned for export to many parts of the world, including posting to the internet.

Legal Environment for a New Century Crime on the Internet  Hacking: gaining unauthorized access to a computer.  Fraud: deception of a person for the purpose of gaining money or property from him. Internet auctions are a venue for fraud –Shilling: bidding on your own items for sale or agreeing to cross-bid with a group of sellers –Selling defective or non-existent items  Identity Theft: not a new crime, but made easier with the internet.

Legal Environment for a New Century Spam  Unsolicited Commercial (or Bulk) Creates additional cost to internet users, from the ISP’s costs for processing many s.  Fraudulent Spam Up to 30% of all is spam; roughly half of all spam is fraudulent. FTC has attacked fraudulent spam in the same ways as other fraud.  Non-Fraudulent Spam Harder to fight, but many ISP’s block all mail from other ISP’s known to promote spam.

Legal Environment for a New Century Constitutional Issues  Free Speech Commercial speech is protected by the First Amendment; what about spam?  Commerce Clause Due to the interstate nature of the internet, communication conducted over it cannot be adequately controlled by state laws.

Legal Environment for a New Century Communications Decency Act of 1996  An ISP is not liable for information that is provided by someone else, even if it is transmitted through its service.

Legal Environment for a New Century “The law in this area is so young and unformed that oftentimes we must ask not only, ‘What is the law?’ but also, ‘What should the law be?’”

Legal Environment for a New Century Link to the Internet  Clicking on the orange button below will link you the website for this book. (You must first have an active link to the internet on this computer.)  Once there, click: Online Study Guide, then Your choice of a chapter, then Practice, then Internet Applications.  You should then see web links related to that chapter. Click above to return to the slide show. Click Here!