Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.

Slides:



Advertisements
Similar presentations
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Advertisements

Legal and Ethical Issues: Privacy and Security Chapter Five.
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
INTERNET and CODE OF CONDUCT
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Business Law for the Entrepreneur and Manager
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Electronic Use Policies.   Social Media  Internet.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
LEE BURGUNDER LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed. LEGAL ASPECTS of MANAGING TECHNOLOGY Third Ed.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Chapter 6 Business Torts and Cyber Considerations.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Copyright © 2008 Pearson Education Canada4-1 Chapter 4: Intentional Torts.
Duty of Loyalty Employees owe duty of loyalty to employer -- even if no non-compete agreement Breaches: competing while employed, “seducing” customers.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Law for Business, 15e by Ashcroft Chapter 3: Business Torts and Crimes Law for Business, 15e, by Ashcroft, © 2005 West Legal Studies in Business,
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Cyber Liability Insurance for an unsecure world
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 15 Internet Law and E-Commerce
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
This is the prescribed textbook for your course.
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 14 Online Commerce and E-Contracts
Essentials of the legal environment today, 5e
Ethical Use of Computers
Chapter 13 E-Commerce Contracts
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Cyber Law and E-Commerce
Presentation transcript:

Intellectual Property

Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or bring personal benefit duty created by a business relationship duty stems from common law, trusts and fiduciary obligations information should be identified as confidential

Trade Secrets Confidential information that creates a competitive advantage information must be valuable to the business not commonly known or readily available disclosure may be prohibited by contract in a restrictive covenant non-disclosure agreement protects employer

Remedies Plaintiff must show that the disclosure of information has caused harm Remedies - injunction, damages - general and punitive, accounting contract may provide remedies for breach claims in tort - trade slander, invasion of privacy Criminal Code - theft, fraud, mischief

Question for Discussion Employees leaving their jobs may be restricted from using the information they have gained in another job, restricting their chances of new employment. What social and public policy issues are associated with these kinds of employment restrictions?

Breach of Privacy Privacy legislation prohibits using another person’s name or photograph without permission Injurious falsehood - Misleading a customer about the nature of a product is a crime Note application of federal Personal Information Protection and Electronic Documents Act

Challenges Determining which jurisdiction’s rules apply Identity of the participants not always easily established Security or accuracy of information cannot be guaranteed Difficult to enforce legal rights when a party has been injured

Implications for Tort Law Defamation On-line publication is considered broadcasting and therefore an offence can be treated as libel No intervention to exert controls on what is published on or in a chat room Identification of perpetrator Determining the appropriate jurisdiction in which to sue Obligations of Internet Service Providers

Electronic Commerce Uniform Electronic Commerce Act Has been adopted in some jurisdictions Methods for recognizing electronic signatures Sale of Goods Contract law offers some protection

Criminal Activities Jurisdictional boundaries – important consideration Gambling Pornography Operators frequently move their base of operation to a jurisdiction where the activity is not illegal – but must notify participants

Criminal Activities / 2 Sale of securities on line subject to same regulations as other trading methods Retail scams proliferate and ‘buyer beware’ advice applies

Abusive Activities Self-regulation essential to control Unreliable information Unsolicited advertising – spam Virus purveyors ISP may be responsible to stop abuses Legal enforcement is difficult

Security and Privacy Misuse of private information growing concern Care must be taken about giving personal information over the internet Unauthorized interception of private communications difficult to control Data stored on computers is vulnerable to hackers

Statutory Controls Personal Information Protection and Electronic Documents Act Federal legislation being applied where no similar provincial legislation is currently in place Check for new federal and provincial legislation

Employer Concerns Employer should have policies in place to monitor and restrict employee use of internet Opportunity and means for employees to interfere with company data Employer may be vicariously liable for defamation by employee

Intellectual Property Copyright law protects software and original work published on the internet Trademark law applies to domain names and website logos Music downloading continues to be a problem but is being addressed with new software and new approaches

The Internet Need for international regulation Self-regulation has not been very successful Individual jurisdictions are creating laws in attempt to control illegal or abusive activity on the internet but – global control presents unique challenges

Dispute Resolution On-line Services May be efficient and effective way to resolve disputes between users of the Internet Mediation offered in domain name and consumer disputes