Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.

Slides:



Advertisements
Similar presentations
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Advertisements

Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Introduction to Computer Ethics: Privacy Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology, Second Edition, 2006.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February , 2006.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Computer Programming I
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Class Discussion Notes MKT April 10, 2001.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Ethics. Ethics are the principles and standards we use to decide how to act.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 12 Privacy and Children. Naïve Kids Soupy Sales encourages kids to take money from parents wallets, send to him They do- $80,000.00! Sales is.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Chapter 10 Cyberlaw, Social Media, and Privacy
CHAPTER 33 Cyberlaw.
Computer Programming I
Protecting Yourself from Fraud including Identity Theft
Computer Security.
A Gift of Fire Third edition Sara Baase
Essentials of the legal environment today, 5e
IA455 Chris Danieli and Zachary gibson
A Gift of Fire Third edition Sara Baase
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Cyberlaw

“The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears wash out a word of it.” Omar Khayyam (1050?-1123?), Persian poet, astronomer and mathematician

 Tracking tools ◦ Popular websites install thousands of tracking tools on the computers of people who visit their sites ◦ Placed on computers without notice or warning to the consumer

 Self-regulation ◦ Self-regulatory Principles for Online Behavioral Advertising – Require websites that use tracking tools to provide notice of data collection that is “clear, prominent, and conveniently located”  The First Amendment – Protects free speech ◦ Includes postings which have appeared on Internet message boards and blogs

 The Fourth Amendment – Prohibits unreasonable searches and seizures by the government  The FTC – Prohibits unfair and deceptive acts or practices  Electronic Communications Privacy Act (ECPA) of 1986

 Any intended recipient of an electronic communication has the right to disclose it  Internet service providers are generally prohibited from disclosing electronic messages to anyone other than the addressee  An employer has the right to monitor workers’ electronic communications if: ◦ The employee consents ◦ Monitoring is in the ordinary course of business ◦ In the case of , if the employer provides the computer system

 Prohibits Internet operators from collecting information from children under age 13 without parental permission  It also requires sites to disclose how they will use any information they acquire

 State regulation ◦ Some states have passed own online privacy laws  European law ◦ The EU’s e-privacy directive requires an opt-in system under which tracking tools cannot be used unless:  The consumer is told how the tools will be used  The specifically grants permission for their use  Spyware: A computer program that enters a user’s computer without permission ◦ Monitors and reports the user’s activities

 The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM) ◦ A federal statute that does not prohibit spam but regulates it ◦ Under this Statute, commercial  May not have deceptive headings  Must offer an opt-out system permitting the recipient to unsubscribe  Must clearly indicate that the is an advertisement  Must provide a valid physical return address  Must clearly indicate the nature of pornographic messages

 Under the CDA, ISPs and web hosts are not liable for information that is provided by someone else ◦ Only content providers are liable

 Hacking: Gaining unauthorized access to a computer system ◦ Illegal under the federal Computer Fraud and Abuse Act (CFAA) of 1986

◦ CFAA prohibits:  Accessing a computer without authorization and obtaining information from it  Computer espionage  Theft of financial information  Theft of information from the U.S. government  Theft from a computer  Computer fraud  Intentional, reckless, and negligent damage to a computer  Trafficking in computer passwords  Computer extortion

 Fraud: Deception of another person for the purpose of obtaining money or property from him ◦ Auctions – A major source of consumer complaints about online fraud  Shilling: When a seller at auction either bids on his own goods or agrees to cross-bid with a group of other sellers

◦ Identity theft - The Identity Theft and Assumption Deterrence Act of 1998:  Prohibits use of false identification to commit fraud or other crime  Permits the victim to seek restitution in court ◦ Phishing: A fraudster sends a message directing the recipient to enter personal information on a website that is an illegal imitation of a legitimate site  Spear phishing: Involves personalized messages sent from someone the victim knows

“The Internet has changed our lives in ways that were inconceivable a generation ago, and the law is rushing to catch up. Courts will apply some old laws in new ways and, as legislators and courts learn from experience, new laws will be enacted.”