SlideShare a Scribd company logo
1 of 11
LEGAL ISSUES IN E-MARKETING
- DISHA DEY
SHIVANI SINGH
Legal requirements
 Domain name
 Trademark
 Copyright
 Pay per click
 Virus
 Spam
 Cyber law
 Directive of copy right
 The CAN-SPAM Act of 2003
 Data protection act 1998.
DOMAIN NAME:
 Domain names have a first and second
level. In the bitlaw.com domain name,
the ".com" portion is considered the first
or top level domain name, and "bitlaw" is
considered a second level domain name.
The most common top level domain
(.COM, .ORG, .NET, .GOV, .EDU) names
are administered by InterNIC, although
other top level domains are available and
still more will be available soon.
 Different Top Level Domains. Because of
the new top level domain names that are
currently proposed, it may be wise for the
owner of a strong trademark to obtain
domain name registrations under
multiple top-level domain names. For
example, the BitLaw web site might be
found under "bitlaw.com", "bitlaw.firm", "
TRADEMARK LEGAL:
 A trademark is a word, image,
slogan, or other device
designed to identify the goods
or services of a particular party.
Trademark infringement occurs
when one party utilizes the
mark of another in such a way
as to create a likelihood of
confusion, mistake and/or
deception with the consuming
public.
 Protecting a trademark the
best way to protect a mark (in
the United States) is through a
federal trademark registration.
If the goods or services sold
under the mark will be sold
Copyright Laws for E-marketers
•Copyright is a form of protection provided by the laws of the
United States to the authors of "original works of authorship"
including literary, dramatic, musical, artistic, architectural
and certain other intellectual works.
•This protection is available to both published and
unpublished works.
WWW protected
•The unique underlying design of a Web page and its
contents, including:
•links
•original text
•graphics
•audio
•video
•html,
•List of Web sites compiled by an individual or organization
•and all other unique elements that make up the original
nature of the material.
“Cyberlaw”
•Describes the legal issues related to use of communications technology,
particularly "cyberspace" i.e. the Internet.
•It is distinctly different from traditional field of law.
•An attempt to integrate the challenges presented by human activity on the
Internet with a legacy system of laws applicable to the physical world.
“virus”
•A computer program that can copy itself and infect a computer without permission
or knowledge of the user.
•A virus can only spread from one computer to another when its host is taken to the
uninfected computer.
•Viruses can spread to other computers by infecting files on a network file system
or a file system that is accessed by another computer.
•Viruses are sometimes confused with computer worms and Trojan horses.
•To curb this problem, ANTIVIRUS
software are used.
To curb worm and virus we use: FIREWELLS.
“Spam”
•The abuse of electronic messaging systems to indiscriminately send unsolicited
bulk messages.
•Spam is also called junk mail.
•Spam can be used to spread computer viruses.
The CAN-SPAM Act was
updated with some new
regulations including a no fee
provision for opting out, further
definition of "sender", post office
or private mail boxes count as a
"valid physical postal address"
and definition of "person". These
new provisions went into effect
on July 7, 2008.
PRIVACY
Privacy refers to moral right of individual to avoid
intrusion into their personal affairs by third party.
Information like:
• contact information
• Profile information
• Behavioral information.
DATA PROTECTION ACT 1998
 Notification.
 It has 8 guide lines to be followed:
 Fairly and lawfully processed.
• Schedule 2 and
• Data controller and data subject
 Process for limited purpose.
• Future communication ,third parties and how long data will be kept.
 Adequate , relevant and not excessive
 Accurate
 Note kept longer than necessary.
 Processed in accordance with data subject rights
 Secure
 Not transferred to other countries without permission.
 In addition to satisfying legal requirements, email service
providers (ESPs) began to help customers establish and
manage their own email marketing campaigns. The service
providers supply email templates and general best practices,
as well as methods for handling subscriptions and
cancellations automatically. Some ESPs will provide
insight/assistance with deliverability issues for major email
providers. They also provide statistics pertaining to the
number of messages received and opened, and whether the
recipients clicked on any links within the messages.

More Related Content

What's hot

Digital law pwpt with zach
Digital law pwpt with zachDigital law pwpt with zach
Digital law pwpt with zachBPIER02
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
E discovery3
E discovery3E discovery3
E discovery3elijaht
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
Protecting Your Brand: Trademarks, Copyrights, and the Internet
Protecting Your Brand: Trademarks, Copyrights, and the InternetProtecting Your Brand: Trademarks, Copyrights, and the Internet
Protecting Your Brand: Trademarks, Copyrights, and the Internetventureneer
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 

What's hot (20)

Digital law pwpt with zach
Digital law pwpt with zachDigital law pwpt with zach
Digital law pwpt with zach
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Unit 1
Unit 1Unit 1
Unit 1
 
E discovery3
E discovery3E discovery3
E discovery3
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
Polinter10
Polinter10Polinter10
Polinter10
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Protecting Your Brand: Trademarks, Copyrights, and the Internet
Protecting Your Brand: Trademarks, Copyrights, and the InternetProtecting Your Brand: Trademarks, Copyrights, and the Internet
Protecting Your Brand: Trademarks, Copyrights, and the Internet
 
It legislation
It legislationIt legislation
It legislation
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
DRM Powerpoint
DRM PowerpointDRM Powerpoint
DRM Powerpoint
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 

Viewers also liked

Finartmultiple - NOAH15 London
Finartmultiple - NOAH15 LondonFinartmultiple - NOAH15 London
Finartmultiple - NOAH15 LondonNOAH Advisors
 
Artica ST - Presentacion corporativa
Artica ST - Presentacion corporativaArtica ST - Presentacion corporativa
Artica ST - Presentacion corporativaPandora FMS
 
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)Videoconferencias UTPL
 
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013Dani Ortega
 
Ifei De Lengua
Ifei De LenguaIfei De Lengua
Ifei De Lenguaeze17
 
Cuenca medieval magica
Cuenca medieval magicaCuenca medieval magica
Cuenca medieval magicaCulmay
 
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...Corimbus GmbH
 
AG-VIP SQL CRM
AG-VIP SQL CRMAG-VIP SQL CRM
AG-VIP SQL CRMGrutzeck
 
55 Business Models to Revolutionize your Business by Michaela Csik
55 Business Models to Revolutionize your Business by Michaela Csik55 Business Models to Revolutionize your Business by Michaela Csik
55 Business Models to Revolutionize your Business by Michaela Csikjindrichweiss
 

Viewers also liked (11)

Finartmultiple - NOAH15 London
Finartmultiple - NOAH15 LondonFinartmultiple - NOAH15 London
Finartmultiple - NOAH15 London
 
CONECTATE 086: NAVIDAD
CONECTATE 086: NAVIDADCONECTATE 086: NAVIDAD
CONECTATE 086: NAVIDAD
 
Artica ST - Presentacion corporativa
Artica ST - Presentacion corporativaArtica ST - Presentacion corporativa
Artica ST - Presentacion corporativa
 
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)
COMMUNICATIVE GRAMMAR IV (II Bimestre Abril Agosto 2011)
 
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013
PROGRAMA SUPERIOR DE COMUNICACION Y MARKETING ONLINE-III EDICION - Enero 2013
 
Ifei De Lengua
Ifei De LenguaIfei De Lengua
Ifei De Lengua
 
resume
resumeresume
resume
 
Cuenca medieval magica
Cuenca medieval magicaCuenca medieval magica
Cuenca medieval magica
 
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...
Kennzahlen im Produktmanagement und Produktlebenszyklus - Ulrike Laubner, Cor...
 
AG-VIP SQL CRM
AG-VIP SQL CRMAG-VIP SQL CRM
AG-VIP SQL CRM
 
55 Business Models to Revolutionize your Business by Michaela Csik
55 Business Models to Revolutionize your Business by Michaela Csik55 Business Models to Revolutionize your Business by Michaela Csik
55 Business Models to Revolutionize your Business by Michaela Csik
 

Similar to legal aspects in e marketing

The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the LawDavid Phillips
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxjameshagwen
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptssuserd26df0
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsMartha Hardy
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesDr. Prashant Vats
 

Similar to legal aspects in e marketing (20)

Ipr
IprIpr
Ipr
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Legal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptxLegal anf]d Ethical Use of Technology.pptx
Legal anf]d Ethical Use of Technology.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Wipo 2011
Wipo 2011Wipo 2011
Wipo 2011
 
wipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).pptwipo_iis_05_ledwards_cwaelde (1).ppt
wipo_iis_05_ledwards_cwaelde (1).ppt
 
Copyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative CommonsCopyright or Copyleft - Creative Commons
Copyright or Copyleft - Creative Commons
 
E commerce
E commerceE commerce
E commerce
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

legal aspects in e marketing

  • 1. LEGAL ISSUES IN E-MARKETING - DISHA DEY SHIVANI SINGH
  • 2. Legal requirements  Domain name  Trademark  Copyright  Pay per click  Virus  Spam  Cyber law  Directive of copy right  The CAN-SPAM Act of 2003  Data protection act 1998.
  • 3. DOMAIN NAME:  Domain names have a first and second level. In the bitlaw.com domain name, the ".com" portion is considered the first or top level domain name, and "bitlaw" is considered a second level domain name. The most common top level domain (.COM, .ORG, .NET, .GOV, .EDU) names are administered by InterNIC, although other top level domains are available and still more will be available soon.  Different Top Level Domains. Because of the new top level domain names that are currently proposed, it may be wise for the owner of a strong trademark to obtain domain name registrations under multiple top-level domain names. For example, the BitLaw web site might be found under "bitlaw.com", "bitlaw.firm", "
  • 4. TRADEMARK LEGAL:  A trademark is a word, image, slogan, or other device designed to identify the goods or services of a particular party. Trademark infringement occurs when one party utilizes the mark of another in such a way as to create a likelihood of confusion, mistake and/or deception with the consuming public.  Protecting a trademark the best way to protect a mark (in the United States) is through a federal trademark registration. If the goods or services sold under the mark will be sold
  • 5. Copyright Laws for E-marketers •Copyright is a form of protection provided by the laws of the United States to the authors of "original works of authorship" including literary, dramatic, musical, artistic, architectural and certain other intellectual works. •This protection is available to both published and unpublished works. WWW protected •The unique underlying design of a Web page and its contents, including: •links •original text •graphics •audio •video •html, •List of Web sites compiled by an individual or organization •and all other unique elements that make up the original nature of the material.
  • 6. “Cyberlaw” •Describes the legal issues related to use of communications technology, particularly "cyberspace" i.e. the Internet. •It is distinctly different from traditional field of law. •An attempt to integrate the challenges presented by human activity on the Internet with a legacy system of laws applicable to the physical world.
  • 7. “virus” •A computer program that can copy itself and infect a computer without permission or knowledge of the user. •A virus can only spread from one computer to another when its host is taken to the uninfected computer. •Viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. •Viruses are sometimes confused with computer worms and Trojan horses. •To curb this problem, ANTIVIRUS software are used. To curb worm and virus we use: FIREWELLS.
  • 8. “Spam” •The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. •Spam is also called junk mail. •Spam can be used to spread computer viruses. The CAN-SPAM Act was updated with some new regulations including a no fee provision for opting out, further definition of "sender", post office or private mail boxes count as a "valid physical postal address" and definition of "person". These new provisions went into effect on July 7, 2008.
  • 9. PRIVACY Privacy refers to moral right of individual to avoid intrusion into their personal affairs by third party. Information like: • contact information • Profile information • Behavioral information.
  • 10. DATA PROTECTION ACT 1998  Notification.  It has 8 guide lines to be followed:  Fairly and lawfully processed. • Schedule 2 and • Data controller and data subject  Process for limited purpose. • Future communication ,third parties and how long data will be kept.  Adequate , relevant and not excessive  Accurate  Note kept longer than necessary.  Processed in accordance with data subject rights  Secure  Not transferred to other countries without permission.
  • 11.  In addition to satisfying legal requirements, email service providers (ESPs) began to help customers establish and manage their own email marketing campaigns. The service providers supply email templates and general best practices, as well as methods for handling subscriptions and cancellations automatically. Some ESPs will provide insight/assistance with deliverability issues for major email providers. They also provide statistics pertaining to the number of messages received and opened, and whether the recipients clicked on any links within the messages.