© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 16 Contracts: Legality and Public Policy Twomey Jennings Anderson’s.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 16 Legality.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 7 Intellectual Property.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 37 Regulation.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 8 Crimes.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
CRIMES Used by permission. For Educational purposes only.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 7 The.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
©2005 by West Legal Studies in Business A Division of Thomson Learning Fundamentals of Business Law 6 th Edition Chapter 5 Intellectual Property and Internet.
Privacy and the Law.
by John Bagby and F. William McCarty
Chapter 10 Cyberlaw, Social Media, and Privacy
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
CHAPTER 33 Cyberlaw.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
E-Commerce: Regulatory, Ethical, and Social Environments
– Communication Technology in a Changing World
Ethical Use of Computers
Computer Security Social Legal and Ethical issues
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw Chapter 11 Cyberlaw

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 2 Introduction to Cyberlaw Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal precedent to new problems presented with the technology of the Internet. Cyberlaw issues include: Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal precedent to new problems presented with the technology of the Internet. Cyberlaw issues include: TortsContracts Intellectual Property Criminal Law Constitutional Restraints and Protections Securities Law

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 3 Tort Issues in Cyberspace Privacy: – sent over an employer’s network is not guaranteed private. – sent over a home-use network may be intercepted; this issue is still developing. Privacy: – sent over an employer’s network is not guaranteed private. – sent over a home-use network may be intercepted; this issue is still developing. Smyth v Pillsbury Co. (1996) Did the Employee have a Right to Privacy?

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 4 Tort Issues in Cyberspace Privacy: –Web sites routinely collect information about their customers; this information may be sold to other businesses. –Identity theft, or the use of someone else’s identity to purchase or obtain credit, is a growing problem. Most web merchants minimize this problem by providing a secure mode of transmitting personal information. Privacy: –Web sites routinely collect information about their customers; this information may be sold to other businesses. –Identity theft, or the use of someone else’s identity to purchase or obtain credit, is a growing problem. Most web merchants minimize this problem by providing a secure mode of transmitting personal information.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 5 Tort Issues in Cyberlaw Appropriation (the unauthorized use of someone’s image) is illegal both on the Internet and elsewhere. Defamation. Appropriation (the unauthorized use of someone’s image) is illegal both on the Internet and elsewhere. Defamation. Doe v 2TheMart.com Inc. (2001) You’ve Got Mail, but Only the ISP Knows Who It’s From.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 6 Contract Issues in Cyberlaw Though most contract issues have not changed with the Internet, a few new questions have arisen. –At what point is the contract formed? –Is an electronic signature valid? Misrepresentation and Fraud. –Fraud is the most reported crime committed via the Internet. This is in part due to the high volume of sales transactions over the Internet. Though most contract issues have not changed with the Internet, a few new questions have arisen. –At what point is the contract formed? –Is an electronic signature valid? Misrepresentation and Fraud. –Fraud is the most reported crime committed via the Internet. This is in part due to the high volume of sales transactions over the Internet.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 7 Intellectual Property Issues The Internet has not actually changed intellectual property rights, but has facilitated the illegal copying of copyrighted material. –The best known case dealing with intellectual property via the Internet is the suit against Napster, the web site which facilitated the free downloading of copyrighted songs. The Internet has not actually changed intellectual property rights, but has facilitated the illegal copying of copyrighted material. –The best known case dealing with intellectual property via the Internet is the suit against Napster, the web site which facilitated the free downloading of copyrighted songs.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 8 Criminal Law Issues A computer may be the target of the crime, as when someone “hacks” into a bank’s computer records. Sometimes the computer is the tool of the crime, as in the transporting of pornography across state lines. A computer may be the target of the crime, as when someone “hacks” into a bank’s computer records. Sometimes the computer is the tool of the crime, as in the transporting of pornography across state lines. United States v Czubinski (1997) Surfing the Net for Tax Info: Criminal or Curious?

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 9 Criminal Procedure and Rights Kyllo v United States (2001) Is thermal imaging a “search” under the Fourth Amendment? The fourth amendment protects against unlawful search and seizures. Applies to search of homes, offices and computers. The fourth amendment protects against unlawful search and seizures. Applies to search of homes, offices and computers.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 10 Constitutional Restraints First Amendment Rights –Internet free speech is protected as it is anywhere. –Violations outside the First Amendment protection are common on the Internet due to ease of communication and anonymity. Commerce Clause issues. –Nexus for Taxes. Where is the office? First Amendment Rights –Internet free speech is protected as it is anywhere. –Violations outside the First Amendment protection are common on the Internet due to ease of communication and anonymity. Commerce Clause issues. –Nexus for Taxes. Where is the office?

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 11 Constitutional Restraints Due Process Issues. –What about fairness and minimum contacts in interstate commerce? –When should an internet company be required to defend itself in another state? Due Process Issues. –What about fairness and minimum contacts in interstate commerce? –When should an internet company be required to defend itself in another state? Bensusan Restaurant Corp. v King (1997) Jurisdiction Hits a Blue Note.

© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. 12 Securities Law Issues The Internet has facilitated new methods of securities trading, including day trading and minute-by-minute tracking of stock performances. Abuses have arisen from the use of the Internet; most notably the practice of “pump and dump.” This is where a trader spreads false information about a stock to quickly raise its price, then selling existing shares at an inflated price. The Internet has facilitated new methods of securities trading, including day trading and minute-by-minute tracking of stock performances. Abuses have arisen from the use of the Internet; most notably the practice of “pump and dump.” This is where a trader spreads false information about a stock to quickly raise its price, then selling existing shares at an inflated price.