2. Legal requirements
Domain name
Trademark
Copyright
Pay per click
Virus
Spam
Cyber law
Directive of copy right
The CAN-SPAM Act of 2003
Data protection act 1998.
3. DOMAIN NAME:
Domain names have a first and second
level. In the bitlaw.com domain name,
the ".com" portion is considered the first
or top level domain name, and "bitlaw" is
considered a second level domain name.
The most common top level domain
(.COM, .ORG, .NET, .GOV, .EDU) names
are administered by InterNIC, although
other top level domains are available and
still more will be available soon.
Different Top Level Domains. Because of
the new top level domain names that are
currently proposed, it may be wise for the
owner of a strong trademark to obtain
domain name registrations under
multiple top-level domain names. For
example, the BitLaw web site might be
found under "bitlaw.com", "bitlaw.firm", "
4. TRADEMARK LEGAL:
A trademark is a word, image,
slogan, or other device
designed to identify the goods
or services of a particular party.
Trademark infringement occurs
when one party utilizes the
mark of another in such a way
as to create a likelihood of
confusion, mistake and/or
deception with the consuming
public.
Protecting a trademark the
best way to protect a mark (in
the United States) is through a
federal trademark registration.
If the goods or services sold
under the mark will be sold
5. Copyright Laws for E-marketers
•Copyright is a form of protection provided by the laws of the
United States to the authors of "original works of authorship"
including literary, dramatic, musical, artistic, architectural
and certain other intellectual works.
•This protection is available to both published and
unpublished works.
WWW protected
•The unique underlying design of a Web page and its
contents, including:
•links
•original text
•graphics
•audio
•video
•html,
•List of Web sites compiled by an individual or organization
•and all other unique elements that make up the original
nature of the material.
6. “Cyberlaw”
•Describes the legal issues related to use of communications technology,
particularly "cyberspace" i.e. the Internet.
•It is distinctly different from traditional field of law.
•An attempt to integrate the challenges presented by human activity on the
Internet with a legacy system of laws applicable to the physical world.
7. “virus”
•A computer program that can copy itself and infect a computer without permission
or knowledge of the user.
•A virus can only spread from one computer to another when its host is taken to the
uninfected computer.
•Viruses can spread to other computers by infecting files on a network file system
or a file system that is accessed by another computer.
•Viruses are sometimes confused with computer worms and Trojan horses.
•To curb this problem, ANTIVIRUS
software are used.
To curb worm and virus we use: FIREWELLS.
8. “Spam”
•The abuse of electronic messaging systems to indiscriminately send unsolicited
bulk messages.
•Spam is also called junk mail.
•Spam can be used to spread computer viruses.
The CAN-SPAM Act was
updated with some new
regulations including a no fee
provision for opting out, further
definition of "sender", post office
or private mail boxes count as a
"valid physical postal address"
and definition of "person". These
new provisions went into effect
on July 7, 2008.
9. PRIVACY
Privacy refers to moral right of individual to avoid
intrusion into their personal affairs by third party.
Information like:
• contact information
• Profile information
• Behavioral information.
10. DATA PROTECTION ACT 1998
Notification.
It has 8 guide lines to be followed:
Fairly and lawfully processed.
• Schedule 2 and
• Data controller and data subject
Process for limited purpose.
• Future communication ,third parties and how long data will be kept.
Adequate , relevant and not excessive
Accurate
Note kept longer than necessary.
Processed in accordance with data subject rights
Secure
Not transferred to other countries without permission.
11. In addition to satisfying legal requirements, email service
providers (ESPs) began to help customers establish and
manage their own email marketing campaigns. The service
providers supply email templates and general best practices,
as well as methods for handling subscriptions and
cancellations automatically. Some ESPs will provide
insight/assistance with deliverability issues for major email
providers. They also provide statistics pertaining to the
number of messages received and opened, and whether the
recipients clicked on any links within the messages.