Beruflich Dokumente
Kultur Dokumente
www.prestonians.webnode.com
Free Speech
Internet provides the largest opportunity for free speech; but, some postings are offensive to people
Taxation
Illegal to impose new sales taxes on Internet business at the present time (U.S. and some other countries)
www.prestonians.webnode.com 2
Consumer Protection
Many legal issues are related to electronic trade
Ethical Issues
What is considered to be right and wrong? What is unethical is not necessarily illegal. Whether these actions are considered unethical depends on the organization, country, and the specific circumstances surrounding the scenarios.
www.prestonians.webnode.com
Property
Ownership and value of information and intellectual property
www.prestonians.webnode.com 6
Accessibility
Right to access information Payment of fees for the access
www.prestonians.webnode.com
Protecting Privacy
Privacy
The right to be left alone and the right to be free of unreasonable personal intrusions
Information Privacy
The claim of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others
www.prestonians.webnode.com
www.prestonians.webnode.com
Making your browser record information about you Recording what your browsers say about you Reading your e-mail
www.prestonians.webnode.com 10
Use anonymous remailers Use encryption Reroute your mail away from your office Ask your ISP or employer about a privacy policy
www.prestonians.webnode.com
11
Legislation
The Consumer Internet Privacy Act The Federal Internet Privacy Protection Act The Communications Privacy and Consumer Empowerment Act The Data Privacy Act
www.prestonians.webnode.com
12
www.prestonians.webnode.com
14
Trade Secret
Intellectual work such as a business plan, which is a company secret and is not based on public information
Patent
A document that grants the holder exclusive rights on an invention for 17 years (U.S.)
www.prestonians.webnode.com 15
Copyrights
Protects original expression of ideas
Literary works Musical works Dramatic works Artistic works Sound recordings, films, broadcasts, cable programs Published editions of literary and musical works
www.prestonians.webnode.com
16
www.prestonians.webnode.com
17
www.prestonians.webnode.com
18
Patents
Patenta document that grants the holder
Satisfy following legal criteria
Noveldoes not already exist as part of the public domain Involves sufficiently inventive step Capable of individual application (be put to practical use)
exclusive rights on an invention for 17 years
www.prestonians.webnode.com
19
Trademarks
Trademarksgraphical sign used by businesses to identify their goods and services Gives exclusive rights to:
Use trademark on goods and services registered to that sign Take legal action to prevent anyone from using trademark without consent
www.prestonians.webnode.com
20
Domain Names
Domain name refers to the upper category of Internet address (URL) Three controversies
Whether top-level domain names (similar to com, org and gov) should be added The use of trademark names by companies for domain names that belong to other companies If companies in different countries have the same name, who can use it as the domain name?
www.prestonians.webnode.com 21
www.prestonians.webnode.com
22
www.prestonians.webnode.com
23
Protecting Children
3 approaches (regarding the protection of
children from inappropriate material on the Internet) No information should be held back and parents should be responsible for monitoring their own children The government is the only one who can truly protect children from this material To hold the Internet providers responsible for all the material and information they provide, or enable access to it
www.prestonians.webnode.com 25
Parents governing their own children Government protecting the children Responsibility of the Internet providers Forcing Internet providers to be accountable, or enable access to information
www.prestonians.webnode.com
26
Child Online Protection Act Internet Tax Freedom Act Family Friendly Internet Access Act Internet Protection Act Internet School Filtering Act
www.prestonians.webnode.com
27
Controlling Spamming
What is spamming, why is it bad?
Spamming
The practice of indiscriminate distribution of messages (for example junk mail) without permission of the receiver and without consideration for the messages appropriateness
Spam comprised 30% of all mail sent on America Online (in the past, now less than 10%) Slows the internet in general Shuts ISPs down completely
www.prestonians.webnode.com
28
www.prestonians.webnode.com
29
www.prestonians.webnode.com
32
Electronic Contracts
Uniform Electronic Transactions Act Uniform Commercial Code (UCC) Shrink-wrap agreements (or box-top licenses)
The user is bound to the license by opening the package
www.prestonians.webnode.com
33
Computer Crimes
Computer crimes refers to computer fraud and/or computer abuse Computer fraud committed by:
Alteration of input Alteration of computer data Alteration/misuse of programs Destruction/suppression/misappropriation of output
www.prestonians.webnode.com 34
35
www.prestonians.webnode.com
38
www.prestonians.webnode.com
39
Authentication
If authentication online can be verified
Students will be able to take exams online from home Fraud of recipients of government entitlements and other payments will be reduced to a bare minimum Buyers will be assured who the sellers are and sellers will know who the buyers are with a very high degree of confidence
www.prestonians.webnode.com 40
Biometric Controls
Matching against a template:
Photo of face Fingerprints Hand geometry Blood vessel pattern in the retina of a persons eye Voice Signature Keystroke dynamics Iris
www.prestonians.webnode.com 41
Managerial Issues
Multinational corporations face different cultures in the different countries in which they are doing business Issues of privacy, ethics, and so on may seem to be tangential to running a business, but ignoring them may hinder the operation of many organizations
www.prestonians.webnode.com
43