SlideShare a Scribd company logo
1 of 83
E-Marketing, 3rd edition
Judy Strauss, Adel I. El-Ansary, and Raymond Frost
Chapter 5: Ethical and Legal
Issues
Š Prentice Hall 2003
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Overview of Ethics and Legal Issues
īŽ Ethics:
īŽ The values and practices of professionals,
īŽ The concerns and values of society as a whole,
īŽ Directed toward individual or group endeavors,
īŽ Important contributions to legal developments
= The experiences and practices of those who work in the
field are helpful to those who are charged with
regulation and legal decision-making.
Overview of Ethics and Legal Issues
īŽ Law:
īŽ Also an expression of values,
īŽ Created for broader purposes = national or sometimes
international populations,
īŽ It is a public endeavor = made by legislatures such as
Congress or Parliament, enforced by executives or
agencies, and interpreted by the courts,
īŽ Progress in the law can be slow, and particularly within
the new context of digital communication.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Ethics & Ethical Codes
īŽ The study of ethics:
īŽ Central focus = analysis and description of basic concepts as what is right
and wrong,
īŽ The examination of responsibilities, rights, and obligations,
īŽ Not limited to purely theoretical boundaries but study all levels of human
interaction,
īŽ Important aspect: the study of professional activities,
īŽ Groups of individuals possessing special skills or knowledge have
established codes and systems of fair practice,
īŽ E.g. The American Marketing Association’s (AMA) Code of Ethics =
Professional codes provide members with guidelines which are specific to
their pursuits.
Ethics & Ethical Codes
īŽ Digital processes and potentialities are so new that ethics is only
beginning to adapt itself to the Computer Revolution.
īŽ Critical issues:
īŽ The ownership of intangible data (intellectual property),
īŽ The role of privacy in a virtual world without walls,
īŽ The extent to which freedom of expression should be allowed,
īŽ The uses of data.
Ethics & Ethical Codes
īŽ Difficulties:
īŽ Lack of comparative historical situations,
īŽ The inability to analogize computers to objects or institutions with
which society has had greater experience,
īŽ Electronic spaces are global in nature. What is accepted in Europe
may be rejected in Asia or America,
īŽ Each participant in electronic marketing has to adhere to
professional codes, but also to contribute to them.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-
Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
The Problem of Self-Regulation
īŽ Emerging area of conflict: the role of formal law in the
regulation of online conduct.
īŽ The Administration answer: the development of the
Internet should be largely left to the free operation of the
market.
īŽ The proper behaviors of participants are typically set forth
in ethical codes developed by trade associations,
commercial standards groups and the professions.
The Problem of Self-Regulation
īŽ Supporters of the self-regulation:
īŽ The private sector’s is able to rapidly identify and
resolve problems specific to its areas of competence,
īŽ Once consensus is reached, uniformity is achieved
through members’ compliance with ethical codes as
well as by ongoing education of providers and
consumers,
īŽ The law cannot force participation in these codes, but
improved consumer confidence and enhanced economic
opportunities will ensure voluntary compliance.
The Problem of Self-Regulation
īŽ Critics of self-regulation:
īŽ These incentives are insufficiently compelling,
īŽ Perpetrators of fraud benefit from schemes of short duration and
are rarely interested in the long-term gains offered by adherence
to ethical codes,
īŽ Commercial self-interest and pressures to maximize profits
compromise the private sphere’s ability to police itself and only the
sanctions the law can provide will make a difference.
īŽ This debate is far from over but governments are asserting themselves
at least in the area of fraud prevention and in issues involving
children’s privacy.
Consumer Protection at the FTC Source: www.ftc.gov
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Privacy
īŽ The concept of privacy:
īŽ Both ethical and legal aspects and is relatively new to both
disciplines,
īŽ Privacy is a product of the twentieth century: reactions to the
phenomena of a maturing industrial and technological age, including
the mass distribution of newspapers, the development of listening
devices and the widespread use of photography,
īŽ Privacy has always been about information and the means of its
delivery.
īŽ BUT lack of definition within the Constitution.
Privacy
īŽ The common law has established a series of privacy
violations:
īŽ Unreasonable intrusion into the seclusion of another,
īŽ Unreasonable publicity of another’s private life,
īŽ The appropriation of another’s name or likeness,
īŽ The publication of another’s personal information in a
false light.
Privacy
īŽ Disagreement remains:
īŽ The seclusion theory = the ability to remain isolated from society.
īƒž This model encourages laws and ethical standards which are oriented
toward maintaining personal distance and punishing those who cross
the limits set by individuals.
īŽ The access-control:
īƒž Places its emphasis upon laws and standards which enable persons
to reasonably regulate the information which they are giving up.
īŽ The autonomy model:
īƒž Define what constitutes private data = those which are necessary for
a person to make life decisions.
Privacy
īŽ Within society, privacy interests compete against
concerns of personal and public safety, economics and
even the social and psychological need for association
with others.
īƒž People are willing to give up personal information to get
certain benefits - credit cards or frequent flyer mileage.
īƒž Ethics and law attempt to provide guidelines in the final
decision.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital
Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Privacy within Digital Contexts
īŽ Information plays a pivotal role in the concept of privacy.
īƒž Conflicts about how data should be collected and used.
īŽ AMA Code of Ethics for Marketing on the Internet:
“information collected from customers should be
confidential and used only for expressed purposes.”
Privacy within Digital Contexts
īŽ DoubleClick:
īŽ An online advertising firm,
īŽ Collects and compiles large amounts of personal consumer
information,
īŽ Developed a system of over 11,000 Web sites that carry
advertising which, when clicked, enables users to visit product
sites,
īŽ The system records the responses (clickstreams) to form a user
profile and transmit individually-targeted advertising,
īŽ Active consent of the users is not required,
īŽ 100,000 online profiles have been filed.
Privacy within Digital Contexts
īŽ DoubleClick acquired Abacus-Direct:
Specialized in the acquisition of off-line consumer data
(names, addresses and buying histories of a large
percentage of American households).
īŽ Plans to integrate this data linking real life identities to
DoubleClick’s online personalities.
īŽ Complain was filed by a coalition of privacy, civil rights
and consumer groups for obtaining consent from each
subject.
Privacy within Digital Contexts
īŽ How does it work?
īƒž With cookies:
īŽ Packets of data created within the hard-drive of a user
in response to instructions received from a Web page,
īŽ Once stored, they can be re-transmitted from a user’s
computer to a pertinent Web site.
Privacy within Digital Contexts
īŽ Many purposes:
īŽ Handle online information, creating such features as shopping
baskets to hold purchases.
īŽ Recall stored sales information to remind users of items already
ordered or to suggest new products.
īŽ Store data = full name, email and postal addresses, phone
numbers, a computer’s geographic location and time logged
online.
īŽ Normally automatically executed without any user action.
īŽ Cookie packets may be combined with other digital information
and may be transferred between servers or sold to anyone with
the capacity to read computer-generated data.
īŽ User tracking: when cookies are examined to determine an
individual’s online behavior.
Privacy within Digital Contexts
īŽ This controversy reflects the unsettled nature of privacy
itself:
īŽ A closely-guarded right = the ability to remain secluded
from unwelcome intrusion + the capability to control the
disclosure of personal data.
īƒž Advocates the implementation of policies which allow
individuals to be explicitly informed of any data collection
event and to have collection take place only if there is an
affirmative decision to participate or opt-in.
īŽ Supporters of DoubleClick: argue that most users wish to
receive the benefits of targeted advertising.
Privacy within Digital Contexts
īŽ The preliminary terms of an agreement include:
īŽ The obligation to provide clear notice of data collection,
īŽ A ban on combining existing data with personal
information unless explicit permission,
īŽ Data obtained from cookies will be routinely deleted,
īŽ DoubleClick will initiate an extensive program of
consumer privacy education.
īŽ There is a trend toward the reduction of the use of
cookies:
īŽ Prominence of privacy policies,
īŽ Use of opt-in routines.
Privacy within Digital Contexts
īŽ Some cutting edge applications are raising additional issues:
JAVA
īŽ A Web-friendly programming language allowing the
downloading and running of programs or applets on
individual computers,
īŽ Increasingly used to provide enhancements = dynamic
animation, Web-based simulations,
īŽ Used to design programs = hostile applets used to
surreptitiously access and transmit data on hard-drives,
including email addresses, credit card records and other
account information.
Privacy within Digital Contexts
īŽ Intelligent agents:
īŽ Programs which, once released by a user, can function
autonomously within the Web to make electronic
decisions,
īŽ Tasks: the searching of sites or the buying of products
which conform to an individual’s tastes or interests,
īŽ Critics worry that the preferences which they hold may be
chosen or controlled by entities other than their “owner.”
Privacy within Digital Contexts
īŽ Cookies, Java applets and intelligent agents are ubiquitous
applications
= Able to function in any online session, without a user’s
knowledge or control.
īŽ Online forms and electronic mail are used to gather information
in exchange for browsing privileges or other benefits.
īŽ BUT most average users are uncertain of the ultimate value of
the data they provide.
īŽ Solution: Consumer education about all uses of revealed data
to increase the ability to make informed judgments.
Privacy within Digital Contexts
īŽ The collection of material from children:
Congress passed the Children’s Online Protection Act (COPPA), it
requires that Web sites and other online media which knowingly
collect information from children 12 years of age or under:
īŽ Provide notice to parents,
īŽ Obtain verifiable parental consent prior to the collection, use or
disclosure of most information,
īŽ Allow parents to view and correct this information,
īŽ Enable parents to prevent further use or collection of data,
īŽ Limit personal information collection for a child’s participation in
games, prize offers or related activities,
īŽ Establish procedures which protect the “confidentiality, security,
and integrity of the personal information collected.”
Privacy within Digital Contexts
īŽ The problem of privacy within electronic mail
= Unsettled aspect of online interaction.
īŽ U.S. Law
= Users who operate email accounts on private services
are assured of their legal privacy through service
agreements with their ISP.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
International Privacy Issues
īŽ 1998: The European Union’s Data Protection Directive
= Requires its member states to enact national laws to
protect “fundamental rights + freedoms of natural
persons, and in particular their right to privacy with
respect to the processing of personal data.”
īŽ Subjects:
īŽ Are informed on how their data is used,
īŽ Are given opportunities to review and correct
information.
International Privacy Issues
īŽ Data:
īŽ Use is restricted to the announced purpose,
īŽ Origin is disclosed.
īŽ Procedures to punish illegal activities are established.
īŽ Consumer collection contains opt-out capabilities.
īŽ Sensitive data collection cannot be accomplished without
explicit permission.
īŽ Any international transfer of data is executed only with
countries possessing adequate privacy protection laws.
International Privacy Issues
īŽ 2000: The U.S. Department of Commerce and the
European Commission agreement = U.S. organizations
would submit to a series of safe harbor provisions for
the protection of EU citizen data:
īŽ Notice about collection, purpose and use,
īŽ Choice in ability to opt-out of disclosure and third-party
dissemination,
īŽ Third-party transfer, protection, and provisions for
security, data integrity, redress and enforcement.
International Privacy Issues
īŽ Norms representing the present consensus for the minimum requirements
essential to the ethical use of consumer information:
īŽ Notice: Users should be aware of a site’s information policy before data is
collected,
īŽ Consent: Users should be allowed to choose participation or exclusion from
the collection,
īŽ Access: Users should have the ability to access their data and correct it if
erroneous,
īŽ Security: Policies to ensure the integrity of data and the prevention of
misuse should be in place,
īŽ Enforcement: Users should have effective means to hold data collectors to
their policies.
FTC Monitors Online Privacy Source: www.ftc.gov
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Digital Property
īŽ Traditionally, the law has protected intangible or intellectual
property through three basic mechanisms:
īŽ Copyright = the right to publish or duplicate the
expressions of ideas,
īŽ Patent law = the ability to reproduce or manufacture
an inventor’s product,
īŽ Trademark = images, symbols, words or other
indicators which are registered with the government and
have become positively associated with a product’s
identity in the market.
Digital Property
īŽ Computer-based communication has posed particularly
difficult problems for intellectual property:
īŽ The electronic medium by which messages are carried
= inventions,
īŽ The messages
= expressions of ideas,
īŽ Graphical and animation objects
= creations
= associated with a commercial entity.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Copyright
īŽ Copyright = the primary means of protecting most on the
Internet, including text and other data.
īŽ Limitations created for the public’s benefit:
īŽ The doctrine of Fair Use: ability to copy without cost,
reasonable portions of protected material for purposes
relating to such public activities as education, news reporting
and editorial comment,
īŽ The doctrine of First Sale: limits the ability of a copyright
holder to obtain profit from the sale of her work after the
initial time at which the material is sold. Purchasers are
subsequently given the ability to transfer or otherwise dispose
of their copy.
Copyright
īŽ 1997: The No Electronic Theft Act = The NET Act
= copyright protection for computer content + sanctions
when infringement is committed for commercial or private
financial gain or by the reproduction or distribution of one
or more copies of copyrighted works having $1000 or more
in retail value.
īŽ Proponents believe that it will encourage innovation by
protecting material placed on the Internet.
īŽ Critics believe that the definition of infringement has
been made problematically broad = electronic
distribution without reproduction.
Copyright
īŽ 1998: The Digital Millennium Copyright Act:
īŽ The DMCA grant ISP’s protection from acts of user
infringement as long as certain procedures are followed,
including the prompt reporting and disabling of
infringing material.
īƒž Supporters claim that it will free ISP’s from liability for its
users’ illegal actions and encourage industry growth.
īƒž Critics believe that the reporting and disabling
requirements may cause innocent behavior to be presumed
infringing and wrongfully censored.
Copyright
īŽ 1998: The Digital Millennium Copyright Act:
īŽ The DMCA criminalizes the circumvention of software
protections and the development or distribution of
circumvention products.
īƒž Supporters believe that this law will increase commercial
willingness to place material on the Internet by deterring
online piracy.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Trademarks
īŽ Trademark law is concerned with the ownership of intellectual
property which identifies goods or services.
īŽ The federal Lanham Act:
īŽ Trademarks may be registered and protected with the government,
īŽ In order to pursue, claimants must prove that the mark is
protectable,
īŽ The Act also prohibits dilution - the diminishment of the ability to
identify or distinguish a good or service.
īŽ Trademark law has recently been applied to the Internet naming
system:
īŽ Domains are unique configurations of letters or numbers which are
used to route data,
īŽ The most familiar www.someplace.com.
Trademarks
īŽ Trademark violations:
īŽ Similarities in names,
īŽ Cybersquatting: Registration of domains which resemble or
duplicate the names of existing corporations
+ Offer the domain for sale at a price set significantly higher
than that originally paid,
īƒž 1999: the Anticybersquatting Consumer Protection Act
= A person is liable to suit if he registers, traffics or sells a
domain bearing a name which is identical or confusingly
similar to a protected mark or would dilute the worth of the
mark.
Trademarks
īŽ Trademark violations:
īŽ Metatags = HTML statements which describe a Web site’s
contents:
īŽ Allow search engines to identify sites relevant to topics of their
inquiries,
īŽ It is possible to insert words or phrases which are calculated to
provide optimal attractiveness, including material protected by
trademark.
īŽ Keywords assigned within search engines. Trademark-protected
keywords are raising issues when the result of the search is not
directed to the trademark holder.
īŽ Hyperlinks which take users to areas other than their
introductory page may cause confusion or deprive the target sites
of revenue obtained through the selling of advertising.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Patents
īŽ Patents are granted, by the United States government, for inventive
processes or steps.
īƒž Tailored toward industrial or mechanical concerns.
īŽ Creators of software are attempting to make use of its protections:
īŽ Material is not subject to acquisition through the doctrines of Fair Use or
First Sale,
īŽ Patent powers are derived from constitutional concerns, public access to
patented material is assured after the term of the patent has expired +
the patent itself is always on file with the government.
īŽ The use of business patents = activities such as marketing approaches
and methods for conducting commerce.
īƒž Patent protection claimed for reverse online auctions, secure credit
card processing, and incentive-based methods for reading Web site
advertising.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Licenses
īŽ Licenses = contractual agreements made between
consumers and software vendors which allow the buyer to
use the product, but restrict duplication or distribution.
īŽ Within the computer environment, two license format:
īŽ Shrinkwrap or break-the-seal licenses,
īŽ Clickwrap licenses when a user is required to click a
button within a program to demonstrate acceptance of
terms.
Licenses
īŽ Effort to enforce the terms of software licenses
= The Uniform Computer Information Transactions Act.
īŽ If adopted by the states, this model would govern all legal agreements
pertaining to software transactions, including sales.
īŽ Supporters: the majority of software manufacturers and publishers.
īŽ Critics: they argue that UCITA will enforce license provisions
including those restricting copying and resale of material, liability for
damages incurred from defective software, and, it has been
suggested, the ability to criticize software performance.
United States Patent Office Reviews Patent Applications Source: www.uspto.gov
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Trade Secrets
īŽ The federal Economic Espionage Act of 1996
= Address digital advances + makes it a criminal offense to divulge
trade secrets.
īŽ Trade secrets:
īŽ Can include, but are not restricted to, formulas, plans, market data,
algorithms, programs, codes and models,
īŽ May be stored online or in tangible formats,
īŽ Computer-based disclosures such as emails, downloads, Web
publication and similar means are within the ambit of the Act.
īŽ Employees possessing trade secrets may be prohibited from engaging in
similar businesses for a period of time.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Data Ownership
īŽ Increased competition on the electronic market
īƒž Measures to obtain the advantages that control of
information can provide.
īŽ Data relating to such technical issues as Web site usage:
īŽ Have been easy to access and under informal practices,
īŽ Have often been shared among site owners, marketing
professionals, advertisers and consumers.
īŽ Click data: make information collected from banner
advertisements invisible to site owners and their clients.
īŽ Protective technologies raise new issues concerning the
ownership of information.
Data Ownership
īŽ Spidering: Use of software applications = robots to enter
targeted Web sites and obtain data for the use of its owner.
īƒž This activity constitutes a trespass to property.
īŽ The special protection of data relating to facts:
īŽ American copyright law protects expressions of ideas, but not the
ideas themselves.
īŽ Electronic databases often contain arrangements of facts, there is a
movement within the law to offer protection for specially compiled
data.
īƒž The Trade Related Intellectual Property Rights (TRIPs)
Agreement of 1995: Provisions exist within this Agreement
to afford this kind of protection.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Online Expression
īŽ The mass distribution of unsolicited electronic mail = Spam
īŽ Users complain of unwanted intrusion into their affairs,
īŽ Information given to individuals or entities for one purpose may be
collected and sold for mass distribution.
īŽ Regulation needs to be approached with caution: It
implicates freedom of expression.
īŽ Disagreement between:
īŽ Those who believe that participation in mass emails should be
restricted to those who voluntarily agree to receive mailing,
īŽ Those who advocate an opt-out only approach.
Online Expression
īŽ ISP:
īŽ Questions about the liability of network owners for defamatory
messages posted on its bulletin boards or other public areas,
īŽ For most courts like publishers, ISP’s are not normally susceptible to
suit.
īŽ Regulations for children’s content: use of filtering models
have been considered.
īŽ The Platform for Internet Content Selection Rules (PICS):
allows the filtering of sites which are deemed to be
inappropriate for minors placing control into the hands of
parents and schools.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Emerging Issues
īŽ A number of issues have arisen which are particularly
unique to the Internet at its current stage of its
development.
īŽ The responses are requiring imagination & creativity.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance &
ICANN
Jurisdiction
Fraud
Conclusion
Online Governance and ICANN
īŽ Need: A private, non-profit regulatory body which would be responsible
for the administration of the Internet name and address system.
īŽ Answer: The Internet Corporation for Assigned Names and
Numbers (ICANN).
īŽ Purpose: The resolution of conflicts which surround the assignment and
possession of domains.
īŽ Today, ICANN is comprised of a governing board which currently faces
substantial criticism for operating under secrecy and for failing to
represent the broad range of online users.
īƒž Many questions remain concerning the ability of any private regulatory
organization to enforce its decisions within the online community.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Jurisdiction
īŽ Jurisdiction is the legal term which describes the ability of
a court or other authority to gain control over a party.
īŽ Jurisdiction is traditionally based upon physical presence,
but within the online world, commonality of physical
location is never assured.
īŽ The majority of cases decided within the United States
have focused upon the character and quality of contacts
with the forum state, generally, the more active the
involvement, the more likely that jurisdiction will be
conferred.
Jurisdiction
īŽ Virtual Magistrate, mediation-oriented programs, have
been developed to resolve online disputes.
= Attempt to tailor their procedures toward the special
circumstances of the Internet:
īŽ Advocates argue that their online orientation will
encourage users to work out difficulties within a non-
confrontational framework,
īŽ Critics voice concerns that online arbitration cannot
adequately ensure enforcement or recognition of their
judgments.
Jurisdiction
īŽ International disputes:
īŽ Goal: achieve a level of international cooperation is
through the mediation of organizations.
īƒž The WIPO Arbitration and Mediation Center exists to
resolve commercial disputes relating to intellectual
property.
īŽ The Model Law on Electronic Commerce by the United
Nations Commission of International Trade Law provides
global uniformity in digital commerce.
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Fraud
īŽ The use of deception and false claims to obtain profit is not
unique to the Internet.
īŽ The technical nature of networked communication
īƒž The average person is not in a position to understand
exactly how information is displayed, transferred or stored
and this lack of knowledge provides opportunities for novel
deceptions.
īƒž E.g. of abuse = Spoofing:
īŽ Use of email or Web sites to impersonate individuals or
corporations,
īŽ Used to extract sensitive information by leading a user to believe
that a request is coming from a reputable source.
Fraud
īŽ The psychology of digital environments. The media is full
of stories concerning technological advances and
opportunities for profit.
īƒž Most people are unable to differentiate genuinely
worthwhile endeavors from those presented by mere
opportunists.
īƒž Many investment opportunities make use of The Digital
Revolution, often promoting breakthrough technologies
and applications.
Fraud
īŽ The problem of consumer fraud is being addressed on
several dimensions:
īŽ Federal agencies (the FTC and the FBI) have increased their efforts
to track and prosecute fraudulent conduct,
īŽ State agencies have begun to prosecute criminal activity within their
borders.
īŽ Sanctions = stipulated lifetime bans in the conduct of
Internet commerce, civil judgments, forfeiture of property
and referrals for criminal prosecution.
īŽ The establishment and prosecution of laws are necessary
responses to the problem of fraud.
Fraud
īŽ The basis of fraud is usually incomplete or false information.
īƒž Ability to evaluate online material is a primary importance.
īŽ Solutions include:
īŽ Promotion and adherence to codes of ethics are one
means of inspiring consumer confidence,
īŽ Encouragement of general consumer education,
Professional associations have particular abilities to
establish sites which outline and explain minimum
standards and consumer protections.
FBI Investigates Online Fraud Source: www.fbi.gov
Overview
Ethics and Legal Issues
Ethics & Ethical Codes
The Problem of Self-Regulation
Privacy
Privacy within Digital Contexts
International Privacy Issues
Digital Property
Copyright
Trademarks
Patents
Licenses
Trade Secrets
Data Ownership
Online Expression
Emerging Issues
Online Governance & ICANN
Jurisdiction
Fraud
Conclusion
Conclusion
īŽ Changes within the ethical and legal framework of
networked communication are occurring at a fast pace.
īŽ Marketing professionals are:
īŽ Required to remain well-informed of regulations and
accepted practices,
īŽ Called upon to contribute to the global dialogue about
electronic spaces.
Key Terms
â€ĸAgents
â€ĸClickstreams
â€ĸClickwrap
â€ĸCopyright
â€ĸCybersquatting
â€ĸDigital Millennium Copyright Act
(DMCA)
â€ĸDilution
â€ĸEthics
â€ĸFraud
â€ĸInternet Corporation For
Assigned Names And Numbers
(Icann)
â€ĸJurisdiction
â€ĸKeywords
â€ĸLanham Act
Key Terms
â€ĸLaw
â€ĸLicenses
â€ĸMetatags
â€ĸNo Electronic Theft Act (NET)
â€ĸPatents
â€ĸPrivacy
â€ĸSafe harbor
â€ĸSelf-regulation
â€ĸShrinkwrap
â€ĸSpam
â€ĸSpidering
â€ĸSpoofing
â€ĸTrademark
â€ĸUbiquitous applications
â€ĸUniform Computer
Information Transactions Act
(UCITA)
â€ĸVirtual Magistrate
Review Questions
1. Define ethics and law and show how they are
different and similar.
2. What are some of the threats to Internet user
privacy?
3. According to the FTC, what are the minimum
requirements for ethical use of consumer
information?
4. How does copyright differ from patent and
trademark law?
5. What does it mean to clickwrap a license?
Discussion Questions
1. Is it better to regulate industry via laws or let industry self-regulate? Support
your claim.
2. Which is more ethically problematic: Attacking a former employer via online
discussion or making the same attack by e-mailing current employees?
3. Deep linking takes place regularly over the Internet. Anytime you make a
Web page that links to another site and bypasses the home page of that site
you are deep linking. Should this be allowed? Explain your position.
4. Framing takes place regularly over the Internet. To see an example of
framing, look up information at AskJeeves (www.ask.com). Should framing
be allowed? Support your claim.
5. The CEO of Amazon, has publicly questioned the advisability of granting
patents for business processes such as his company’s 1-Click ordering
process. Do such patents put a chilling effect on the expansion of e-
commerce? Justify your position.
6. What court should have jurisdiction over the Internet? Why?

More Related Content

What's hot

ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt Saiqa Hashmi
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce HELEN UBA-UGOCHUKWU
 
Chapter 6 e-marketing research
Chapter 6   e-marketing researchChapter 6   e-marketing research
Chapter 6 e-marketing researchDr. Ankit Kesharwani
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Ethical e-Marketing
Ethical e-MarketingEthical e-Marketing
Ethical e-MarketingThom. Poole
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdfTanayMalhotra
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesFellowBuddy.com
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerceHarshit Gupta
 
Security concerns for Electronic business
Security concerns for Electronic businessSecurity concerns for Electronic business
Security concerns for Electronic businessDr. Prashant Vats
 
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
Ethical issues in electronic commerce  focus on privacy   barbra dozier's blogEthical issues in electronic commerce  focus on privacy   barbra dozier's blog
Ethical issues in electronic commerce focus on privacy barbra dozier's blogParag Barman
 

What's hot (18)

ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1
 
Chapter 6 e-marketing research
Chapter 6   e-marketing researchChapter 6   e-marketing research
Chapter 6 e-marketing research
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Ethical e-Marketing
Ethical e-MarketingEthical e-Marketing
Ethical e-Marketing
 
9781423903055 ppt ch07
9781423903055 ppt ch079781423903055 ppt ch07
9781423903055 ppt ch07
 
Ali
AliAli
Ali
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentation
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
E commerce course
E commerce courseE commerce course
E commerce course
 
E commerce
E commerceE commerce
E commerce
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
 
Electronic commerce
Electronic commerceElectronic commerce
Electronic commerce
 
1637 copy
1637   copy1637   copy
1637 copy
 
Security concerns for Electronic business
Security concerns for Electronic businessSecurity concerns for Electronic business
Security concerns for Electronic business
 
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
Ethical issues in electronic commerce  focus on privacy   barbra dozier's blogEthical issues in electronic commerce  focus on privacy   barbra dozier's blog
Ethical issues in electronic commerce focus on privacy barbra dozier's blog
 

Similar to 5362098

Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Chapter 4
Chapter 4Chapter 4
Chapter 4ghghghghgh
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
Review questions
Review questionsReview questions
Review questionsAnura Kumara
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxSANSKAR20
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxshanaeacklam
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08BookStoreLib
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08BookStoreLib
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08BookStoreLib
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical mallisonshavon
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 

Similar to 5362098 (20)

Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
S719a
S719aS719a
S719a
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethical
EthicalEthical
Ethical
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Review questions
Review questionsReview questions
Review questions
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08
 
Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08Laudon traver ec10-im_ch08
Laudon traver ec10-im_ch08
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08Laudon traver ec11-im_ch08
Laudon traver ec11-im_ch08
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 

Recently uploaded

Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...afaqsaeed463
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯åŽŸį‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯jdkhjh
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 

Recently uploaded (17)

sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯åŽŸį‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯
原į‰ˆ1:1复åˆģ密čĨŋčĨŋ比大å­Ļæ¯•ä¸šč¯Mississippiæ¯•ä¸šč¯į•™äŋĄå­ĻåŽ†čŽ¤č¯
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 

5362098

  • 1. E-Marketing, 3rd edition Judy Strauss, Adel I. El-Ansary, and Raymond Frost Chapter 5: Ethical and Legal Issues Š Prentice Hall 2003
  • 2. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 3. Overview of Ethics and Legal Issues īŽ Ethics: īŽ The values and practices of professionals, īŽ The concerns and values of society as a whole, īŽ Directed toward individual or group endeavors, īŽ Important contributions to legal developments = The experiences and practices of those who work in the field are helpful to those who are charged with regulation and legal decision-making.
  • 4. Overview of Ethics and Legal Issues īŽ Law: īŽ Also an expression of values, īŽ Created for broader purposes = national or sometimes international populations, īŽ It is a public endeavor = made by legislatures such as Congress or Parliament, enforced by executives or agencies, and interpreted by the courts, īŽ Progress in the law can be slow, and particularly within the new context of digital communication.
  • 5. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 6. Ethics & Ethical Codes īŽ The study of ethics: īŽ Central focus = analysis and description of basic concepts as what is right and wrong, īŽ The examination of responsibilities, rights, and obligations, īŽ Not limited to purely theoretical boundaries but study all levels of human interaction, īŽ Important aspect: the study of professional activities, īŽ Groups of individuals possessing special skills or knowledge have established codes and systems of fair practice, īŽ E.g. The American Marketing Association’s (AMA) Code of Ethics = Professional codes provide members with guidelines which are specific to their pursuits.
  • 7. Ethics & Ethical Codes īŽ Digital processes and potentialities are so new that ethics is only beginning to adapt itself to the Computer Revolution. īŽ Critical issues: īŽ The ownership of intangible data (intellectual property), īŽ The role of privacy in a virtual world without walls, īŽ The extent to which freedom of expression should be allowed, īŽ The uses of data.
  • 8. Ethics & Ethical Codes īŽ Difficulties: īŽ Lack of comparative historical situations, īŽ The inability to analogize computers to objects or institutions with which society has had greater experience, īŽ Electronic spaces are global in nature. What is accepted in Europe may be rejected in Asia or America, īŽ Each participant in electronic marketing has to adhere to professional codes, but also to contribute to them.
  • 9. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self- Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 10. The Problem of Self-Regulation īŽ Emerging area of conflict: the role of formal law in the regulation of online conduct. īŽ The Administration answer: the development of the Internet should be largely left to the free operation of the market. īŽ The proper behaviors of participants are typically set forth in ethical codes developed by trade associations, commercial standards groups and the professions.
  • 11. The Problem of Self-Regulation īŽ Supporters of the self-regulation: īŽ The private sector’s is able to rapidly identify and resolve problems specific to its areas of competence, īŽ Once consensus is reached, uniformity is achieved through members’ compliance with ethical codes as well as by ongoing education of providers and consumers, īŽ The law cannot force participation in these codes, but improved consumer confidence and enhanced economic opportunities will ensure voluntary compliance.
  • 12. The Problem of Self-Regulation īŽ Critics of self-regulation: īŽ These incentives are insufficiently compelling, īŽ Perpetrators of fraud benefit from schemes of short duration and are rarely interested in the long-term gains offered by adherence to ethical codes, īŽ Commercial self-interest and pressures to maximize profits compromise the private sphere’s ability to police itself and only the sanctions the law can provide will make a difference. īŽ This debate is far from over but governments are asserting themselves at least in the area of fraud prevention and in issues involving children’s privacy.
  • 13. Consumer Protection at the FTC Source: www.ftc.gov
  • 14. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 15. Privacy īŽ The concept of privacy: īŽ Both ethical and legal aspects and is relatively new to both disciplines, īŽ Privacy is a product of the twentieth century: reactions to the phenomena of a maturing industrial and technological age, including the mass distribution of newspapers, the development of listening devices and the widespread use of photography, īŽ Privacy has always been about information and the means of its delivery. īŽ BUT lack of definition within the Constitution.
  • 16. Privacy īŽ The common law has established a series of privacy violations: īŽ Unreasonable intrusion into the seclusion of another, īŽ Unreasonable publicity of another’s private life, īŽ The appropriation of another’s name or likeness, īŽ The publication of another’s personal information in a false light.
  • 17. Privacy īŽ Disagreement remains: īŽ The seclusion theory = the ability to remain isolated from society. īƒž This model encourages laws and ethical standards which are oriented toward maintaining personal distance and punishing those who cross the limits set by individuals. īŽ The access-control: īƒž Places its emphasis upon laws and standards which enable persons to reasonably regulate the information which they are giving up. īŽ The autonomy model: īƒž Define what constitutes private data = those which are necessary for a person to make life decisions.
  • 18. Privacy īŽ Within society, privacy interests compete against concerns of personal and public safety, economics and even the social and psychological need for association with others. īƒž People are willing to give up personal information to get certain benefits - credit cards or frequent flyer mileage. īƒž Ethics and law attempt to provide guidelines in the final decision.
  • 19. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 20. Privacy within Digital Contexts īŽ Information plays a pivotal role in the concept of privacy. īƒž Conflicts about how data should be collected and used. īŽ AMA Code of Ethics for Marketing on the Internet: “information collected from customers should be confidential and used only for expressed purposes.”
  • 21. Privacy within Digital Contexts īŽ DoubleClick: īŽ An online advertising firm, īŽ Collects and compiles large amounts of personal consumer information, īŽ Developed a system of over 11,000 Web sites that carry advertising which, when clicked, enables users to visit product sites, īŽ The system records the responses (clickstreams) to form a user profile and transmit individually-targeted advertising, īŽ Active consent of the users is not required, īŽ 100,000 online profiles have been filed.
  • 22. Privacy within Digital Contexts īŽ DoubleClick acquired Abacus-Direct: Specialized in the acquisition of off-line consumer data (names, addresses and buying histories of a large percentage of American households). īŽ Plans to integrate this data linking real life identities to DoubleClick’s online personalities. īŽ Complain was filed by a coalition of privacy, civil rights and consumer groups for obtaining consent from each subject.
  • 23. Privacy within Digital Contexts īŽ How does it work? īƒž With cookies: īŽ Packets of data created within the hard-drive of a user in response to instructions received from a Web page, īŽ Once stored, they can be re-transmitted from a user’s computer to a pertinent Web site.
  • 24. Privacy within Digital Contexts īŽ Many purposes: īŽ Handle online information, creating such features as shopping baskets to hold purchases. īŽ Recall stored sales information to remind users of items already ordered or to suggest new products. īŽ Store data = full name, email and postal addresses, phone numbers, a computer’s geographic location and time logged online. īŽ Normally automatically executed without any user action. īŽ Cookie packets may be combined with other digital information and may be transferred between servers or sold to anyone with the capacity to read computer-generated data. īŽ User tracking: when cookies are examined to determine an individual’s online behavior.
  • 25. Privacy within Digital Contexts īŽ This controversy reflects the unsettled nature of privacy itself: īŽ A closely-guarded right = the ability to remain secluded from unwelcome intrusion + the capability to control the disclosure of personal data. īƒž Advocates the implementation of policies which allow individuals to be explicitly informed of any data collection event and to have collection take place only if there is an affirmative decision to participate or opt-in. īŽ Supporters of DoubleClick: argue that most users wish to receive the benefits of targeted advertising.
  • 26. Privacy within Digital Contexts īŽ The preliminary terms of an agreement include: īŽ The obligation to provide clear notice of data collection, īŽ A ban on combining existing data with personal information unless explicit permission, īŽ Data obtained from cookies will be routinely deleted, īŽ DoubleClick will initiate an extensive program of consumer privacy education. īŽ There is a trend toward the reduction of the use of cookies: īŽ Prominence of privacy policies, īŽ Use of opt-in routines.
  • 27. Privacy within Digital Contexts īŽ Some cutting edge applications are raising additional issues: JAVA īŽ A Web-friendly programming language allowing the downloading and running of programs or applets on individual computers, īŽ Increasingly used to provide enhancements = dynamic animation, Web-based simulations, īŽ Used to design programs = hostile applets used to surreptitiously access and transmit data on hard-drives, including email addresses, credit card records and other account information.
  • 28. Privacy within Digital Contexts īŽ Intelligent agents: īŽ Programs which, once released by a user, can function autonomously within the Web to make electronic decisions, īŽ Tasks: the searching of sites or the buying of products which conform to an individual’s tastes or interests, īŽ Critics worry that the preferences which they hold may be chosen or controlled by entities other than their “owner.”
  • 29. Privacy within Digital Contexts īŽ Cookies, Java applets and intelligent agents are ubiquitous applications = Able to function in any online session, without a user’s knowledge or control. īŽ Online forms and electronic mail are used to gather information in exchange for browsing privileges or other benefits. īŽ BUT most average users are uncertain of the ultimate value of the data they provide. īŽ Solution: Consumer education about all uses of revealed data to increase the ability to make informed judgments.
  • 30. Privacy within Digital Contexts īŽ The collection of material from children: Congress passed the Children’s Online Protection Act (COPPA), it requires that Web sites and other online media which knowingly collect information from children 12 years of age or under: īŽ Provide notice to parents, īŽ Obtain verifiable parental consent prior to the collection, use or disclosure of most information, īŽ Allow parents to view and correct this information, īŽ Enable parents to prevent further use or collection of data, īŽ Limit personal information collection for a child’s participation in games, prize offers or related activities, īŽ Establish procedures which protect the “confidentiality, security, and integrity of the personal information collected.”
  • 31. Privacy within Digital Contexts īŽ The problem of privacy within electronic mail = Unsettled aspect of online interaction. īŽ U.S. Law = Users who operate email accounts on private services are assured of their legal privacy through service agreements with their ISP.
  • 32. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 33. International Privacy Issues īŽ 1998: The European Union’s Data Protection Directive = Requires its member states to enact national laws to protect “fundamental rights + freedoms of natural persons, and in particular their right to privacy with respect to the processing of personal data.” īŽ Subjects: īŽ Are informed on how their data is used, īŽ Are given opportunities to review and correct information.
  • 34. International Privacy Issues īŽ Data: īŽ Use is restricted to the announced purpose, īŽ Origin is disclosed. īŽ Procedures to punish illegal activities are established. īŽ Consumer collection contains opt-out capabilities. īŽ Sensitive data collection cannot be accomplished without explicit permission. īŽ Any international transfer of data is executed only with countries possessing adequate privacy protection laws.
  • 35. International Privacy Issues īŽ 2000: The U.S. Department of Commerce and the European Commission agreement = U.S. organizations would submit to a series of safe harbor provisions for the protection of EU citizen data: īŽ Notice about collection, purpose and use, īŽ Choice in ability to opt-out of disclosure and third-party dissemination, īŽ Third-party transfer, protection, and provisions for security, data integrity, redress and enforcement.
  • 36. International Privacy Issues īŽ Norms representing the present consensus for the minimum requirements essential to the ethical use of consumer information: īŽ Notice: Users should be aware of a site’s information policy before data is collected, īŽ Consent: Users should be allowed to choose participation or exclusion from the collection, īŽ Access: Users should have the ability to access their data and correct it if erroneous, īŽ Security: Policies to ensure the integrity of data and the prevention of misuse should be in place, īŽ Enforcement: Users should have effective means to hold data collectors to their policies.
  • 37. FTC Monitors Online Privacy Source: www.ftc.gov
  • 38. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 39. Digital Property īŽ Traditionally, the law has protected intangible or intellectual property through three basic mechanisms: īŽ Copyright = the right to publish or duplicate the expressions of ideas, īŽ Patent law = the ability to reproduce or manufacture an inventor’s product, īŽ Trademark = images, symbols, words or other indicators which are registered with the government and have become positively associated with a product’s identity in the market.
  • 40. Digital Property īŽ Computer-based communication has posed particularly difficult problems for intellectual property: īŽ The electronic medium by which messages are carried = inventions, īŽ The messages = expressions of ideas, īŽ Graphical and animation objects = creations = associated with a commercial entity.
  • 41. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 42. Copyright īŽ Copyright = the primary means of protecting most on the Internet, including text and other data. īŽ Limitations created for the public’s benefit: īŽ The doctrine of Fair Use: ability to copy without cost, reasonable portions of protected material for purposes relating to such public activities as education, news reporting and editorial comment, īŽ The doctrine of First Sale: limits the ability of a copyright holder to obtain profit from the sale of her work after the initial time at which the material is sold. Purchasers are subsequently given the ability to transfer or otherwise dispose of their copy.
  • 43. Copyright īŽ 1997: The No Electronic Theft Act = The NET Act = copyright protection for computer content + sanctions when infringement is committed for commercial or private financial gain or by the reproduction or distribution of one or more copies of copyrighted works having $1000 or more in retail value. īŽ Proponents believe that it will encourage innovation by protecting material placed on the Internet. īŽ Critics believe that the definition of infringement has been made problematically broad = electronic distribution without reproduction.
  • 44. Copyright īŽ 1998: The Digital Millennium Copyright Act: īŽ The DMCA grant ISP’s protection from acts of user infringement as long as certain procedures are followed, including the prompt reporting and disabling of infringing material. īƒž Supporters claim that it will free ISP’s from liability for its users’ illegal actions and encourage industry growth. īƒž Critics believe that the reporting and disabling requirements may cause innocent behavior to be presumed infringing and wrongfully censored.
  • 45. Copyright īŽ 1998: The Digital Millennium Copyright Act: īŽ The DMCA criminalizes the circumvention of software protections and the development or distribution of circumvention products. īƒž Supporters believe that this law will increase commercial willingness to place material on the Internet by deterring online piracy.
  • 46. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 47. Trademarks īŽ Trademark law is concerned with the ownership of intellectual property which identifies goods or services. īŽ The federal Lanham Act: īŽ Trademarks may be registered and protected with the government, īŽ In order to pursue, claimants must prove that the mark is protectable, īŽ The Act also prohibits dilution - the diminishment of the ability to identify or distinguish a good or service. īŽ Trademark law has recently been applied to the Internet naming system: īŽ Domains are unique configurations of letters or numbers which are used to route data, īŽ The most familiar www.someplace.com.
  • 48. Trademarks īŽ Trademark violations: īŽ Similarities in names, īŽ Cybersquatting: Registration of domains which resemble or duplicate the names of existing corporations + Offer the domain for sale at a price set significantly higher than that originally paid, īƒž 1999: the Anticybersquatting Consumer Protection Act = A person is liable to suit if he registers, traffics or sells a domain bearing a name which is identical or confusingly similar to a protected mark or would dilute the worth of the mark.
  • 49. Trademarks īŽ Trademark violations: īŽ Metatags = HTML statements which describe a Web site’s contents: īŽ Allow search engines to identify sites relevant to topics of their inquiries, īŽ It is possible to insert words or phrases which are calculated to provide optimal attractiveness, including material protected by trademark. īŽ Keywords assigned within search engines. Trademark-protected keywords are raising issues when the result of the search is not directed to the trademark holder. īŽ Hyperlinks which take users to areas other than their introductory page may cause confusion or deprive the target sites of revenue obtained through the selling of advertising.
  • 50. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 51. Patents īŽ Patents are granted, by the United States government, for inventive processes or steps. īƒž Tailored toward industrial or mechanical concerns. īŽ Creators of software are attempting to make use of its protections: īŽ Material is not subject to acquisition through the doctrines of Fair Use or First Sale, īŽ Patent powers are derived from constitutional concerns, public access to patented material is assured after the term of the patent has expired + the patent itself is always on file with the government. īŽ The use of business patents = activities such as marketing approaches and methods for conducting commerce. īƒž Patent protection claimed for reverse online auctions, secure credit card processing, and incentive-based methods for reading Web site advertising.
  • 52. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 53. Licenses īŽ Licenses = contractual agreements made between consumers and software vendors which allow the buyer to use the product, but restrict duplication or distribution. īŽ Within the computer environment, two license format: īŽ Shrinkwrap or break-the-seal licenses, īŽ Clickwrap licenses when a user is required to click a button within a program to demonstrate acceptance of terms.
  • 54. Licenses īŽ Effort to enforce the terms of software licenses = The Uniform Computer Information Transactions Act. īŽ If adopted by the states, this model would govern all legal agreements pertaining to software transactions, including sales. īŽ Supporters: the majority of software manufacturers and publishers. īŽ Critics: they argue that UCITA will enforce license provisions including those restricting copying and resale of material, liability for damages incurred from defective software, and, it has been suggested, the ability to criticize software performance.
  • 55. United States Patent Office Reviews Patent Applications Source: www.uspto.gov
  • 56. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 57. Trade Secrets īŽ The federal Economic Espionage Act of 1996 = Address digital advances + makes it a criminal offense to divulge trade secrets. īŽ Trade secrets: īŽ Can include, but are not restricted to, formulas, plans, market data, algorithms, programs, codes and models, īŽ May be stored online or in tangible formats, īŽ Computer-based disclosures such as emails, downloads, Web publication and similar means are within the ambit of the Act. īŽ Employees possessing trade secrets may be prohibited from engaging in similar businesses for a period of time.
  • 58. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 59. Data Ownership īŽ Increased competition on the electronic market īƒž Measures to obtain the advantages that control of information can provide. īŽ Data relating to such technical issues as Web site usage: īŽ Have been easy to access and under informal practices, īŽ Have often been shared among site owners, marketing professionals, advertisers and consumers. īŽ Click data: make information collected from banner advertisements invisible to site owners and their clients. īŽ Protective technologies raise new issues concerning the ownership of information.
  • 60. Data Ownership īŽ Spidering: Use of software applications = robots to enter targeted Web sites and obtain data for the use of its owner. īƒž This activity constitutes a trespass to property. īŽ The special protection of data relating to facts: īŽ American copyright law protects expressions of ideas, but not the ideas themselves. īŽ Electronic databases often contain arrangements of facts, there is a movement within the law to offer protection for specially compiled data. īƒž The Trade Related Intellectual Property Rights (TRIPs) Agreement of 1995: Provisions exist within this Agreement to afford this kind of protection.
  • 61. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 62. Online Expression īŽ The mass distribution of unsolicited electronic mail = Spam īŽ Users complain of unwanted intrusion into their affairs, īŽ Information given to individuals or entities for one purpose may be collected and sold for mass distribution. īŽ Regulation needs to be approached with caution: It implicates freedom of expression. īŽ Disagreement between: īŽ Those who believe that participation in mass emails should be restricted to those who voluntarily agree to receive mailing, īŽ Those who advocate an opt-out only approach.
  • 63. Online Expression īŽ ISP: īŽ Questions about the liability of network owners for defamatory messages posted on its bulletin boards or other public areas, īŽ For most courts like publishers, ISP’s are not normally susceptible to suit. īŽ Regulations for children’s content: use of filtering models have been considered. īŽ The Platform for Internet Content Selection Rules (PICS): allows the filtering of sites which are deemed to be inappropriate for minors placing control into the hands of parents and schools.
  • 64. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 65. Emerging Issues īŽ A number of issues have arisen which are particularly unique to the Internet at its current stage of its development. īŽ The responses are requiring imagination & creativity.
  • 66. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 67. Online Governance and ICANN īŽ Need: A private, non-profit regulatory body which would be responsible for the administration of the Internet name and address system. īŽ Answer: The Internet Corporation for Assigned Names and Numbers (ICANN). īŽ Purpose: The resolution of conflicts which surround the assignment and possession of domains. īŽ Today, ICANN is comprised of a governing board which currently faces substantial criticism for operating under secrecy and for failing to represent the broad range of online users. īƒž Many questions remain concerning the ability of any private regulatory organization to enforce its decisions within the online community.
  • 68. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 69. Jurisdiction īŽ Jurisdiction is the legal term which describes the ability of a court or other authority to gain control over a party. īŽ Jurisdiction is traditionally based upon physical presence, but within the online world, commonality of physical location is never assured. īŽ The majority of cases decided within the United States have focused upon the character and quality of contacts with the forum state, generally, the more active the involvement, the more likely that jurisdiction will be conferred.
  • 70. Jurisdiction īŽ Virtual Magistrate, mediation-oriented programs, have been developed to resolve online disputes. = Attempt to tailor their procedures toward the special circumstances of the Internet: īŽ Advocates argue that their online orientation will encourage users to work out difficulties within a non- confrontational framework, īŽ Critics voice concerns that online arbitration cannot adequately ensure enforcement or recognition of their judgments.
  • 71. Jurisdiction īŽ International disputes: īŽ Goal: achieve a level of international cooperation is through the mediation of organizations. īƒž The WIPO Arbitration and Mediation Center exists to resolve commercial disputes relating to intellectual property. īŽ The Model Law on Electronic Commerce by the United Nations Commission of International Trade Law provides global uniformity in digital commerce.
  • 72. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 73. Fraud īŽ The use of deception and false claims to obtain profit is not unique to the Internet. īŽ The technical nature of networked communication īƒž The average person is not in a position to understand exactly how information is displayed, transferred or stored and this lack of knowledge provides opportunities for novel deceptions. īƒž E.g. of abuse = Spoofing: īŽ Use of email or Web sites to impersonate individuals or corporations, īŽ Used to extract sensitive information by leading a user to believe that a request is coming from a reputable source.
  • 74. Fraud īŽ The psychology of digital environments. The media is full of stories concerning technological advances and opportunities for profit. īƒž Most people are unable to differentiate genuinely worthwhile endeavors from those presented by mere opportunists. īƒž Many investment opportunities make use of The Digital Revolution, often promoting breakthrough technologies and applications.
  • 75. Fraud īŽ The problem of consumer fraud is being addressed on several dimensions: īŽ Federal agencies (the FTC and the FBI) have increased their efforts to track and prosecute fraudulent conduct, īŽ State agencies have begun to prosecute criminal activity within their borders. īŽ Sanctions = stipulated lifetime bans in the conduct of Internet commerce, civil judgments, forfeiture of property and referrals for criminal prosecution. īŽ The establishment and prosecution of laws are necessary responses to the problem of fraud.
  • 76. Fraud īŽ The basis of fraud is usually incomplete or false information. īƒž Ability to evaluate online material is a primary importance. īŽ Solutions include: īŽ Promotion and adherence to codes of ethics are one means of inspiring consumer confidence, īŽ Encouragement of general consumer education, Professional associations have particular abilities to establish sites which outline and explain minimum standards and consumer protections.
  • 77. FBI Investigates Online Fraud Source: www.fbi.gov
  • 78. Overview Ethics and Legal Issues Ethics & Ethical Codes The Problem of Self-Regulation Privacy Privacy within Digital Contexts International Privacy Issues Digital Property Copyright Trademarks Patents Licenses Trade Secrets Data Ownership Online Expression Emerging Issues Online Governance & ICANN Jurisdiction Fraud Conclusion
  • 79. Conclusion īŽ Changes within the ethical and legal framework of networked communication are occurring at a fast pace. īŽ Marketing professionals are: īŽ Required to remain well-informed of regulations and accepted practices, īŽ Called upon to contribute to the global dialogue about electronic spaces.
  • 80. Key Terms â€ĸAgents â€ĸClickstreams â€ĸClickwrap â€ĸCopyright â€ĸCybersquatting â€ĸDigital Millennium Copyright Act (DMCA) â€ĸDilution â€ĸEthics â€ĸFraud â€ĸInternet Corporation For Assigned Names And Numbers (Icann) â€ĸJurisdiction â€ĸKeywords â€ĸLanham Act
  • 81. Key Terms â€ĸLaw â€ĸLicenses â€ĸMetatags â€ĸNo Electronic Theft Act (NET) â€ĸPatents â€ĸPrivacy â€ĸSafe harbor â€ĸSelf-regulation â€ĸShrinkwrap â€ĸSpam â€ĸSpidering â€ĸSpoofing â€ĸTrademark â€ĸUbiquitous applications â€ĸUniform Computer Information Transactions Act (UCITA) â€ĸVirtual Magistrate
  • 82. Review Questions 1. Define ethics and law and show how they are different and similar. 2. What are some of the threats to Internet user privacy? 3. According to the FTC, what are the minimum requirements for ethical use of consumer information? 4. How does copyright differ from patent and trademark law? 5. What does it mean to clickwrap a license?
  • 83. Discussion Questions 1. Is it better to regulate industry via laws or let industry self-regulate? Support your claim. 2. Which is more ethically problematic: Attacking a former employer via online discussion or making the same attack by e-mailing current employees? 3. Deep linking takes place regularly over the Internet. Anytime you make a Web page that links to another site and bypasses the home page of that site you are deep linking. Should this be allowed? Explain your position. 4. Framing takes place regularly over the Internet. To see an example of framing, look up information at AskJeeves (www.ask.com). Should framing be allowed? Support your claim. 5. The CEO of Amazon, has publicly questioned the advisability of granting patents for business processes such as his company’s 1-Click ordering process. Do such patents put a chilling effect on the expansion of e- commerce? Justify your position. 6. What court should have jurisdiction over the Internet? Why?