Spam, Phishing, Spyware, and VOIP Law of eCommerce October 6, 2008 Copyright, Peter Vogel, 2004-08.

Slides:



Advertisements
Similar presentations
A Litigators View of the Law on Message Abuse A Presentation to the Messaging Anti-Abuse Working Group Summit May 18, 2004 Jon Praed Internet Law Group.
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Electronic Contracts- eSign & UETA Copyright, Peter S. Vogel,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
1 Office of the Attorney General Commonwealth of Virginia Identity Theft.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
Cyber safety and ID Theft Assistant Attorney General Jack Zurlini Washington State Attorney General’s Office.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Computer Ethics: Privacy Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology, Second Edition, 2006.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Types of Laws video video CRIMINAL LAW CIVIL LAW.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Anonymity and SPAM The Good, the Bad and the Ugly!
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend.
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
E-Commerce: Regulatory, Ethical, and Social Environments
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Issues Raised by ICT.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
Suing Spammers for Fun and Profit Serge Egelman. Background Over 50% of all mail Less than 200 people responsible.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
MIT Spam Conference 2006 How Spammers Deal with CAN-Spam: Costa Rica, “microbranding” & 18 USC §2257 Jon Praed Internet Law Group jon.praed(at)i-lawgroup.com.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Unit 1: Law, Justice, and You
Phishing: Trends and Countermeasures Blaine Wilson.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
An Introduction to the Fundamentals of Dynamic Business Law
Chapter 19. Laws: rules, enforced by governments 1.Need for Order 2.Protecting Safety and Property 3.Protecting Individual Freedoms 4.Promoting the Common.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Module 3 Consumer Privacy.
Ethics in E-Commerce Spyware
E&O Risk Management: Meeting the Challenge of Change
ALL ABOUT THE FTC By: Brandon Baldwin.
CHAPTER 33 Cyberlaw.
CHAPTER 22 E-COMMERCE 2011 Thomson Reuters Legal & Regulatory Ltd. All Rights Reserved. PowerPoint slides to accompany A Guide to Business Law, 19th.
The E-Commerce Act and the Right to Privacy
The Role of Public Policy in the Fight Against Spam
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Spam, Phishing, Spyware, and VOIP Law of eCommerce October 6, 2008 Copyright, Peter Vogel,

“Spam”

spamlaws.com

Spammers convicted; first felony case

CAN-SPAM

FTC

OnGuardOnline.gov

Authentication Summit

Honeypots

Electronic Frontier Foundation

Goodmail

Rpost

Coalition Against Unsolicited Commercial

JupiterResearch

hotmail

aol

AOL Legal Department

Postini

Phishing

September 1, 2005 New Texas Laws HB 1098 Anti-Phishing Act –Civil Relief SB 122 Identity Theft Enforcement & Protection Act –Civil penalty from $2K to $50K for each violation –Allows for individuals to file court declarations about being a victim SB 327 Consumer Protection Against Computer Spyware Act –Maximum penalty to state $100K Chapter 48 Business & Commerce Code

OnGuardOnline.gov

Anti-Phishing Working Group

Spyware

FTC- Spyware

WashingtonPost.com

FCC- VOIP

Vonage

Skype