Published on

Published in: Business, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Do onto others, hillel
  • Universalization immanuel kant the idea needs to work every where
  • Descarte once you start it might lead to something bad in the future
  • In europe its illegal to retarget
  • 1) Beware the Wolf in Sheep's Clothing: While your biggest concern may be the loss of credit card information, the fact is that much litigation is coming from inside jobs. Maintain your data internally on a "need to access" basis, and be vigilant in guarding against employee and contractor misappropriation. Don't let those with access to your data do any affiliate marketing on the side, for instance, and have strong written contracts with employees and contractors that will discourage the "borrowing" of your data. 2) Use Salt Liberally: Place your own (preferably fictitious) personally identifiable information in your databases so if they are stolen you will be the recipient of the end use of the data. Banks have been doing this for years. It's called "salting". Sprinkle into your databases information like an anonymous email address so if your data is stolen you'll get an email if someone decides to spam with it.  3) Put it on the Other Guy: No, don't just blame someone else. That's nothing new. Actually anticipate this issue arising and guard against assuming liability brought about by others. Make sure you have indemnification provisions in your web development, web hosting and other third party contracts so if the access is not your fault, you can look to a third party for reimbursement of your losses. 4) Under Promise, Over Deliver: Make sure that your privacy practices are well understood internally and are accurately set forth in your privacy policy. Make sure that your privacy policy provisions do not conflict with your User Agreement and other contracts. And then make sure that your website content is consistent with your Privacy Policy and privacy practices. This is where you will get nailed by the Federal Trade Commission and others even if the loss was not due to your own neglect. Don't promise more than you are prepared to deliver. And in doubt, under promise. For most businesses, you can offer up no promises about data security in your privacy policies and avoid this contract based obligation. Other laws may apply if you have a data loss, but at least you will have limited your exposure. 
  • 3) Google loses in New York City and has to identify an anonymous blogger. Expect an appeal.
  • Copyright is on a process or item Trademark is on an item itself
  • Yet Another (Yes, Another) Study Shows File Sharers Buy More ( Studies ) by Mike Masnick from the how-many-more-do-we-need? dept on Monday, November 2nd, 2009 @ 10:44AM Pretty much every single non-industry-backed study has shown this same thing, but just for the record, here's yet another study showing that those who engage in unauthori zed file sharing end up buying more media . The study, looking at the UK (home of the new proposal to kick people off the internet), wasn't even close. Those who engaged in unauthorized file sharing tended to spend £77 on media per year, while those who did not spent about £44. And yet file sharers are the enemy? And the industry wants to kick them offline so they discover less new content? How will that hel
  • U own the song can you copy it on your computer and back it up and use it for the ipad iPod.... The lawers have been arguing about this
  • 4) Oprah files suit in federal court in New York against a laundry list of defendants allegedly using her name and/or likeness to sell products online.  ant destitute for sure. The original verdict was for $9,250 per song. The new verdict is for $80,000 each song. The verdict has increased from $222,000 to $1.92 Million. And these groups, headed up by the Elec
  • Kentucky trying to sue for gambling rights
  • Amazon has fired all of its affiliate marketers in Rhode Island and North Carolina. has done them two better, and just announced the termination of affiliates in North Carolina, Rhode Island, Hawaii, and California in response to taxation issues.
  • Ethics

    1. 1. Ethics & LegalSocial Behaviour
    2. 2. Learning Objectives • Laws that govern electronic commerce activities • Laws that govern the use of intellectual property by online businesses • Online crime, terrorism, and warfareElectronic Commerce, Ninth Edition 2
    3. 3. Learning Objectives (cont’d.) • Ethics issues that arise for companies conducting electronic commerce • Conflicts between companies’ desire to collect and use data about their customers and the privacy rights of those customers • Taxes that are levied on electronic commerce activitiesElectronic Commerce, Ninth Edition 3
    4. 4. The Legal Environment of Electronic Commerce • All businesses: – Must comply with the same laws and regulations – Face the same set of penalties • Web businesses face additional complicating factors – Web extends reach beyond traditional boundaries • Subject to more laws more quickly • Web businesses are international businesses – More interactive and complex customer relationships • Due to increased communications speed and efficiencyElectronic Commerce, Ninth Edition 4
    5. 5. Socially Responsible ethical Not ethical Not legal but legal
    6. 6. Borders and Jurisdiction • Physical world of traditional commerce – Territorial borders clearly: • Mark range of culture • Mark reach of applicable laws • Physical travel across international borders – People made aware of transition through: • Formal document examination • Language and currency changeElectronic Commerce, Ninth Edition 6
    7. 7. FIGURE 7-1 Culture helps determine laws and ethical standards • Geographic influences of area’s dominant culture – Limit acceptable ethical behavior and laws adopted • Culture affects laws directly and indirectly – Through its effect on ethical standardsElectronic Commerce, Ninth Edition 7
    8. 8. 8
    9. 9. Borders and Jurisdiction (cont’d.) • Power – Form of control over: • Physical space • People and objects residing in physical space – Defining characteristic of statehood – Effective laws require effective enforcement – Effective enforcement requires ability to: • Exercise physical control over residents • Impose sanctions on violatorsElectronic Commerce, Ninth Edition 9
    10. 10. Free the Grapes 10
    12. 12. • Identify and Define the Facts• Define, Higher Order• Stake Holders• Options• Consequences
    13. 13. • Golden Rule Golden Rule
    14. 14. Emmanuel Kant
    15. 15. Descarte: Text Once you start it might lead to something bad
    16. 16. Advertising Regulation • Policy statements cover specific areas – Bait advertising – Consumer lending and leasing – Endorsements and testimonials – Energy consumption statements for home appliances – Guarantees and warranties – Prices • Other regulatory agencies – Food and Drug Administration (FDA); Bureau of Alcohol, Tobacco, and Firearms (BATF); Department of Transportation (DOT)Electronic Commerce, Ninth Edition 64
    17. 17. What right do you have to own my DATA
    18. 18. • Cookies• Spyware• Shopping carts (PII)• Behavioural targeting• Search engines & Gmail
    19. 19. Informed Consent
    20. 20. Privacy Rights and Obligations (cont’d.) • Opt-out approach – Assumes customer does not object to company’s use of information • Unless customer specifically denies permission • Opt-in approach – Company collecting information does not use it for any other purpose • Unless customer specifically chooses to allow useElectronic Commerce, Ninth Edition 78
    21. 21. Retargeting data mining
    22. 22.
    23. 23. Pay per post
    24. 24. Monitor Employees
    25. 25. Congress shall have the the power to “promote the progress of science anduseful arts, by securing for limited timesthe authors and inventors the exclusive right to their perspective writings and discoveries” Article 1, section 8 Article 1, section 8 Article 1, section 8
    26. 26. 1790
    27. 27. 3 types of trademarks• Copyright• Patent• Trademark
    28. 28. Trademark is “any word name, or device or combinationthereof... Used in commerce... To identify and distinguish goods from those manufactured or sold by others and to indicate the source of the goods”
    29. 29. Business Process Patent
    30. 30. One Click Checkout
    31. 31. Patents Dynamic Delivery of Banners
    32. 32. Typo Squatting
    33. 33.
    34. 34. john zuccarini What connection do they have?
    35. 35. Sting differs from Barry Diller why?
    36. 36. VS.
    37. 37. Online Crime • Online versions of physical world crimes – Theft, stalking, pornography distribution, gambling • New online crime – Commandeering computer to attack other computers • Law enforcement obstacles – Jurisdiction issues • Tricky to determine – Prosecuting across international boundaries • Internet provides new life to old fraud scams – Advance fee fraud – Nigerian scam (419 scam)Electronic Commerce, Ninth Edition 66
    38. 38. Child security
    39. 39. Online Crime, Terrorism, and Warfare • Internet – Opened up worldwide possibilities for people to communicate – Opened doors for businesses to: • Reach new markets • Create opportunities for economic growth – Useful tool for perpetrating crimes, conducting terrorism, waging warElectronic Commerce, Ninth Edition 65
    40. 40. COPA child protection
    41. 41. Gamblingand porn
    42. 42. Privacy & Confidentiality
    43. 43. • v=BGrji2bIiG8hyperlink
    44. 44. Affiliatetaxes
    45. 45. Net Neutrality