SlideShare a Scribd company logo
Cyberlaw &
Cyberlegislation
What are they?
 The growth and impact of the Internet has been widely
documented (Anandarajan, Teo and Simmers 2006,
Barfield, Heiduk and Welfens 2003, Devezas, Linstone
and Santos 2005).
 Most organizations use the Internet today in some way
or other and the intensity of their use has been rapidly
increasing (June 2005, Loomis and Taylor 2001,
Macgregor and Vrazalic 2007).
 The adoption of the Internet by individual users has
also increased dramatically.
What are they?
 Along with these developments, the incidence and
phenomenon of cybercrime has become a significant
issue and has been much discussed in the media,
policy-making arenas and scholarly research (Clifford
2001, Furnell 2002, Grabosky, Smith and Demsey
2001; Hunter 2002, Newman, and Clar- ke 2003,
Power 2000, Taylor, et al. 2006, Thomas and Loader
2000, Wall 2007, Yount 2006).
 All this attention has resulted in the promulgation of a
variety of com- puter-related laws and cyber laws in
almost all countries (Brenner and Schwerha 2004,
Broadhurst and Grabosky 2005, Koops and Brenner
2006, Suri and Chhabra 2003, Westby 2003).
Intellectual Property Issue
Areas
 Intellectual Property is a broad category of law concerning
the rights of the owners of intangible products of invention
or creativity.
 For example, IP law grants exclusive rights to certain
owners of
 artistic works
 technological inventions
 and symbols or designs
 Subcategories of IP law include
 patent, copyright
 trademark
 trade secrets
IP in KM
 IP lawyers work in litigation, licensing,
technology transfer, venture capital, IP asset
management, and trademark and patent
prosecution
 IP is a rapidly expanding field that offers
increasing job opportunities to lawyers. In
1985, 32% of the market value of S&P 500
companies was based on intangible assets,
mostly some form of intellectual property.
IP in KM
 In 2005, these assets represented almost 80%
of the same companies’ market value.1 IP,
therefore, plays an increasingly important role
in business; correspondingly, its regulation and
study has an ever-larger place in government,
nonprofits, and academia.
There are numerous sub-
specialties of IP law
IP law:
patent
copyright
trademark
trade
secrets
technology
transfer
Patent Law
 Patents are exclusive rights granted to inventors to
incentivize the creation and dissemination of useful
inventions.
 In the United States, patents are issued by the U.S.
Patent and Trademark Office and grant “the right to
exclude others from making, using, offering for sale, or
selling” an invention within the U.S. or from importing
the invention to the U.S.2
Copyright Law
 Copyright grants rights to the creator of an original
work, including literary, dramatic, musical, and artistic
works, and other intellectual works such as software
code.
 Copyright law is intended to incentivize the creation
and dissemination of such works and protects work
whether it is published or unpublished.
 Thoughts and ideas that are never recorded or
expressed cannot be copyrighted because copyrighted
expression must be tangible. Moreover, copyright
protects a form of expression, not the subject matter of
a work.
Copyright Law
 Copyrights are governed by the 1976 Copyright Act,
which gives authors exclusive rights to reproduce their
work, prepare derivative works, distribute copies of the
work, or perform or display the work in public.
 Once an “original work of authorship” is created,
copyright is automatically granted, whether or not the
copyright is registered.
Trademark Law
 A trademark is “a word, phrase, symbol, or design, or a
combination thereof, that identifies and distinguishes
the source of the goods of one party from those of
others.”4 It is an exclusive right to use a certain design
in commerce. Trademark law is intended to help
consumers readily identify the source of a product and
to prevent confusion between brands. Registering a
trademark does not prevent others from producing a
similar good, but it prohibits them from marketing the
good with a mark that is similar enough to confuse
consumers about the item’s origin.
Trade Secrets
 Trade secrets allow companies to maintain the confidentiality of
economically beneficial information.
 For example, the food industry has many trade secrets, from the
recipe for Coca-Cola to the eleven herbs and spices in KFC fried
chicken. Many companies rely on trade secrets instead of patents,
which are more institutionalized, because obtaining a patent
requires full disclosure and because patents expire after twenty
years, whereas trade secrets can be kept indefinitely. There is no
formal way to protect a trade secret, and there is no legal recourse
to prevent someone from using a trade secret once it has been
made public.
 Lawyers, therefore, craft non-disclosure and non-compete
employment contracts that both protect trade secrets and comply
with employment law.
Technology Transfer
 Technology transfer refers to the process by which
governments, universities, and other organizations transfer
inventions, knowledge, or materials subject to IP restrictions
amongst themselves. Transfer from universities or
governments to the private sector is also called technology
commercialization. Technology transfer typically entails
licensing, which grants IP rights by contract. In these
situations, lawyers determine what is being transferred
(royalties, patents, copyrights, etc.) and draft contracts.
Because the U.S. government and universities
commercialize huge amounts of technology, technology
transfer is a fast-growing field of IP law.
Criminal Law
Internet
‘groom’:
Financial
Crimes and
Fraud
Stalking and
Harassment
Human
Trafficking
It is estimated that
there are at least 27
million victims of
human trafficking
worldwide
Social media make
information about private
individuals more readily
accessible than ever.
Identity fraud is also a
growing concern, as
more and more personal
information is stored
online and may be
vulnerable to theft.
NSA Proof Internet
CyberLaw, Legal Issues, Regimes &
Challenges
 Today, world is concerned about the security and
sovereignty of its computer resources and computer
networks.
 Countries do not want powers outside the territorial
boundaries to listen to their communications or access
their data that is running on their domestic networks
 it is only natural to expect countries start looking in
direction establishing country specific internets.
Online Privacy
 Privacy issues are raised when governments, other organizations,
or individuals use the Internet to gather information about
individuals or groups.
As people transmit more and more private information
via the Internet and store private data on computers
not under their physical control, privacy concerns
have become increasingly important.
Freedom of Expression and
Human Rights
 The Internet has become vital to freedom of expression
and human rights issues. As the Internet has become
one of the primary means of obtaining and distributing
information, many have come to see Internet access as
a human right, not a luxury.
 Lawyers in many countries work to expand and protect
Internet access and freedom of expression. In the
United States, lawyers often grapple with these issues
in the context of the First Amendment.
True Story
 Organizational Profile: Google, Inc.
 As the company that controls many of the most famous
and widely used Internet services and products,
Google’s work
deals with nearly
every facet of
intellectual
property and cyber
law.
It is said that…
 Google likely to know more about your
spouse than you do.
True Story
 Google employs a Legal and Government Relations
team and maintains a web page dedicated to its public
policy platform. The company’s stated goal is “[to
defend] the Internet as a free and open platform for
information, communication, and innovation.”
Accordingly the company concerns itself with issues
such as open access, privacy, security, intellectual
property, and freedom of expression.
https://www.google.com/intl/en/about/careers/teams/legal-public-
policy/
True Story
 Google lawyers work at the intersection of law, policy,
and new technology..
They both help
Google develop
new, innovative
products that
comply with the
law and
advocate for
public policy
issues
True Story
 Google employs in-house lawyers who ensure
compliance with U.S. and international law, advise the
Engineering, Marketing, and Product Management
teams, perform patent litigation, and develop terms of
service, privacy notices, and other disclosures.
True Story
 Google also employs attorneys who lead public policy campaigns,
shape the company’s policy position, and monitor policy
developments that might affect the company. Google’s advocacy
and policy work requires lawyers to engage with policy makers,
politicians, non-profit organizations, and industry partners to
advance the company’s policy objectives and protect its products
and profitability.
The Concept of Cybersecurity
 Over the past several years, experts and policy makers
have expressed increasing concerns about protecting
ICT systems from cyberattacks—deliberate attempts by
unauthorized persons to access ICT systems, usually
with the goal of theft, disruption, damage, or other
unlawful actions. Many experts expect the number and
severity of cyberattacks to increase over the next
several years.
Management of Cybersecurity
Risks
 The risks associated with any attack depend on three
factors: threats (who is attacking), vulnerabilities (how
they are attacking), and impacts (what the attack does).
 The management of risk to information systems is
considered fundamental to effective cybersecurity.

More Related Content

What's hot

Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
Sarah Jamieson
 
Com 300 dl
Com 300 dlCom 300 dl
Com 300 dl
chiameity
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
Wisnu Dewobroto
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
VALLOYD
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
Willislwhite12
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
Erik Kokkonen
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
UNIVERSITAS TEKNOKRAT INDONESIA
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Review questions
Review questionsReview questions
Review questions
Anura Kumara
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Nor Ayuzi Deraman
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
Mercatus Center
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
mjsale781
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
FLUZO
 
Online marketing legal issues
Online marketing legal issuesOnline marketing legal issues
Online marketing legal issues
Ramakrishna Kongalla
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
Saiqa Hashmi
 

What's hot (20)

Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
 
Com 300 dl
Com 300 dlCom 300 dl
Com 300 dl
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Review questions
Review questionsReview questions
Review questions
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Online marketing legal issues
Online marketing legal issuesOnline marketing legal issues
Online marketing legal issues
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 

Similar to Cyber law and introduction for undergrad

UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
nycgarcia
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
Largest Catholic University
 
Guidelines on Intellectual Property Rights
Guidelines on Intellectual Property RightsGuidelines on Intellectual Property Rights
Guidelines on Intellectual Property Rights
Bienvenido "Nonoy" Oplas, Jr.
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
nykobap01
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information
Katherine Villaluna
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
Engr Razaque
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
JeydeeeYhudieee
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
Roxanne St Ives
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
Wendy Lile
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
10420130401002
1042013040100210420130401002
10420130401002
IAEME Publication
 

Similar to Cyber law and introduction for undergrad (18)

UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final UOP - AET/531 - Legal and Ethical Issue PPT - Final
UOP - AET/531 - Legal and Ethical Issue PPT - Final
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Guidelines on Intellectual Property Rights
Guidelines on Intellectual Property RightsGuidelines on Intellectual Property Rights
Guidelines on Intellectual Property Rights
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information Legal, Ethical, and Societal Issues in Media and Information
Legal, Ethical, and Societal Issues in Media and Information
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Information-Control.pptx
Information-Control.pptxInformation-Control.pptx
Information-Control.pptx
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
10420130401002
1042013040100210420130401002
10420130401002
 

More from Azmawati Lazim

Last lecture
Last lectureLast lecture
Last lecture
Azmawati Lazim
 
Week 6 Designing Identity
Week 6 Designing IdentityWeek 6 Designing Identity
Week 6 Designing Identity
Azmawati Lazim
 
Week 4 Conducting Research Strategy for Brand
Week 4 Conducting Research Strategy for BrandWeek 4 Conducting Research Strategy for Brand
Week 4 Conducting Research Strategy for Brand
Azmawati Lazim
 
Week 2 Lecturer on Corporate Indentity
Week 2 Lecturer on Corporate IndentityWeek 2 Lecturer on Corporate Indentity
Week 2 Lecturer on Corporate Indentity
Azmawati Lazim
 
Corporate Identity - Final Presentation Strategy
Corporate Identity - Final Presentation StrategyCorporate Identity - Final Presentation Strategy
Corporate Identity - Final Presentation Strategy
Azmawati Lazim
 
Sound digitalisation
Sound digitalisationSound digitalisation
Sound digitalisation
Azmawati Lazim
 
Digital audio
Digital audioDigital audio
Digital audio
Azmawati Lazim
 
Impat of it
Impat of itImpat of it
Impat of it
Azmawati Lazim
 
Groupware tech
Groupware techGroupware tech
Groupware tech
Azmawati Lazim
 
E business
E businessE business
E business
Azmawati Lazim
 
Keconomy 1
Keconomy 1Keconomy 1
Keconomy 1
Azmawati Lazim
 
Digital audio
Digital audioDigital audio
Digital audio
Azmawati Lazim
 
Gagne’s nine event activity
Gagne’s nine event activityGagne’s nine event activity
Gagne’s nine event activity
Azmawati Lazim
 
Week 3 Content Structure
Week 3 Content StructureWeek 3 Content Structure
Week 3 Content Structure
Azmawati Lazim
 
Azmawati Mohd Lazim_Creating learning objectives
Azmawati Mohd Lazim_Creating learning objectivesAzmawati Mohd Lazim_Creating learning objectives
Azmawati Mohd Lazim_Creating learning objectives
Azmawati Lazim
 
Weekly title
Weekly titleWeekly title
Weekly title
Azmawati Lazim
 
Project timeline
Project timelineProject timeline
Project timeline
Azmawati Lazim
 
Project timeline
Project timelineProject timeline
Project timeline
Azmawati Lazim
 
Week 1 introduction
Week 1 introductionWeek 1 introduction
Week 1 introduction
Azmawati Lazim
 
Proposal elearning content developement
Proposal elearning content developementProposal elearning content developement
Proposal elearning content developement
Azmawati Lazim
 

More from Azmawati Lazim (20)

Last lecture
Last lectureLast lecture
Last lecture
 
Week 6 Designing Identity
Week 6 Designing IdentityWeek 6 Designing Identity
Week 6 Designing Identity
 
Week 4 Conducting Research Strategy for Brand
Week 4 Conducting Research Strategy for BrandWeek 4 Conducting Research Strategy for Brand
Week 4 Conducting Research Strategy for Brand
 
Week 2 Lecturer on Corporate Indentity
Week 2 Lecturer on Corporate IndentityWeek 2 Lecturer on Corporate Indentity
Week 2 Lecturer on Corporate Indentity
 
Corporate Identity - Final Presentation Strategy
Corporate Identity - Final Presentation StrategyCorporate Identity - Final Presentation Strategy
Corporate Identity - Final Presentation Strategy
 
Sound digitalisation
Sound digitalisationSound digitalisation
Sound digitalisation
 
Digital audio
Digital audioDigital audio
Digital audio
 
Impat of it
Impat of itImpat of it
Impat of it
 
Groupware tech
Groupware techGroupware tech
Groupware tech
 
E business
E businessE business
E business
 
Keconomy 1
Keconomy 1Keconomy 1
Keconomy 1
 
Digital audio
Digital audioDigital audio
Digital audio
 
Gagne’s nine event activity
Gagne’s nine event activityGagne’s nine event activity
Gagne’s nine event activity
 
Week 3 Content Structure
Week 3 Content StructureWeek 3 Content Structure
Week 3 Content Structure
 
Azmawati Mohd Lazim_Creating learning objectives
Azmawati Mohd Lazim_Creating learning objectivesAzmawati Mohd Lazim_Creating learning objectives
Azmawati Mohd Lazim_Creating learning objectives
 
Weekly title
Weekly titleWeekly title
Weekly title
 
Project timeline
Project timelineProject timeline
Project timeline
 
Project timeline
Project timelineProject timeline
Project timeline
 
Week 1 introduction
Week 1 introductionWeek 1 introduction
Week 1 introduction
 
Proposal elearning content developement
Proposal elearning content developementProposal elearning content developement
Proposal elearning content developement
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

Cyber law and introduction for undergrad

  • 2. What are they?  The growth and impact of the Internet has been widely documented (Anandarajan, Teo and Simmers 2006, Barfield, Heiduk and Welfens 2003, Devezas, Linstone and Santos 2005).  Most organizations use the Internet today in some way or other and the intensity of their use has been rapidly increasing (June 2005, Loomis and Taylor 2001, Macgregor and Vrazalic 2007).  The adoption of the Internet by individual users has also increased dramatically.
  • 3. What are they?  Along with these developments, the incidence and phenomenon of cybercrime has become a significant issue and has been much discussed in the media, policy-making arenas and scholarly research (Clifford 2001, Furnell 2002, Grabosky, Smith and Demsey 2001; Hunter 2002, Newman, and Clar- ke 2003, Power 2000, Taylor, et al. 2006, Thomas and Loader 2000, Wall 2007, Yount 2006).  All this attention has resulted in the promulgation of a variety of com- puter-related laws and cyber laws in almost all countries (Brenner and Schwerha 2004, Broadhurst and Grabosky 2005, Koops and Brenner 2006, Suri and Chhabra 2003, Westby 2003).
  • 4. Intellectual Property Issue Areas  Intellectual Property is a broad category of law concerning the rights of the owners of intangible products of invention or creativity.  For example, IP law grants exclusive rights to certain owners of  artistic works  technological inventions  and symbols or designs  Subcategories of IP law include  patent, copyright  trademark  trade secrets
  • 5. IP in KM  IP lawyers work in litigation, licensing, technology transfer, venture capital, IP asset management, and trademark and patent prosecution  IP is a rapidly expanding field that offers increasing job opportunities to lawyers. In 1985, 32% of the market value of S&P 500 companies was based on intangible assets, mostly some form of intellectual property.
  • 6. IP in KM  In 2005, these assets represented almost 80% of the same companies’ market value.1 IP, therefore, plays an increasingly important role in business; correspondingly, its regulation and study has an ever-larger place in government, nonprofits, and academia.
  • 7. There are numerous sub- specialties of IP law IP law: patent copyright trademark trade secrets technology transfer
  • 8. Patent Law  Patents are exclusive rights granted to inventors to incentivize the creation and dissemination of useful inventions.  In the United States, patents are issued by the U.S. Patent and Trademark Office and grant “the right to exclude others from making, using, offering for sale, or selling” an invention within the U.S. or from importing the invention to the U.S.2
  • 9. Copyright Law  Copyright grants rights to the creator of an original work, including literary, dramatic, musical, and artistic works, and other intellectual works such as software code.  Copyright law is intended to incentivize the creation and dissemination of such works and protects work whether it is published or unpublished.  Thoughts and ideas that are never recorded or expressed cannot be copyrighted because copyrighted expression must be tangible. Moreover, copyright protects a form of expression, not the subject matter of a work.
  • 10. Copyright Law  Copyrights are governed by the 1976 Copyright Act, which gives authors exclusive rights to reproduce their work, prepare derivative works, distribute copies of the work, or perform or display the work in public.  Once an “original work of authorship” is created, copyright is automatically granted, whether or not the copyright is registered.
  • 11. Trademark Law  A trademark is “a word, phrase, symbol, or design, or a combination thereof, that identifies and distinguishes the source of the goods of one party from those of others.”4 It is an exclusive right to use a certain design in commerce. Trademark law is intended to help consumers readily identify the source of a product and to prevent confusion between brands. Registering a trademark does not prevent others from producing a similar good, but it prohibits them from marketing the good with a mark that is similar enough to confuse consumers about the item’s origin.
  • 12. Trade Secrets  Trade secrets allow companies to maintain the confidentiality of economically beneficial information.  For example, the food industry has many trade secrets, from the recipe for Coca-Cola to the eleven herbs and spices in KFC fried chicken. Many companies rely on trade secrets instead of patents, which are more institutionalized, because obtaining a patent requires full disclosure and because patents expire after twenty years, whereas trade secrets can be kept indefinitely. There is no formal way to protect a trade secret, and there is no legal recourse to prevent someone from using a trade secret once it has been made public.  Lawyers, therefore, craft non-disclosure and non-compete employment contracts that both protect trade secrets and comply with employment law.
  • 13. Technology Transfer  Technology transfer refers to the process by which governments, universities, and other organizations transfer inventions, knowledge, or materials subject to IP restrictions amongst themselves. Transfer from universities or governments to the private sector is also called technology commercialization. Technology transfer typically entails licensing, which grants IP rights by contract. In these situations, lawyers determine what is being transferred (royalties, patents, copyrights, etc.) and draft contracts. Because the U.S. government and universities commercialize huge amounts of technology, technology transfer is a fast-growing field of IP law.
  • 14. Criminal Law Internet ‘groom’: Financial Crimes and Fraud Stalking and Harassment Human Trafficking It is estimated that there are at least 27 million victims of human trafficking worldwide Social media make information about private individuals more readily accessible than ever. Identity fraud is also a growing concern, as more and more personal information is stored online and may be vulnerable to theft.
  • 16. CyberLaw, Legal Issues, Regimes & Challenges  Today, world is concerned about the security and sovereignty of its computer resources and computer networks.  Countries do not want powers outside the territorial boundaries to listen to their communications or access their data that is running on their domestic networks  it is only natural to expect countries start looking in direction establishing country specific internets.
  • 17. Online Privacy  Privacy issues are raised when governments, other organizations, or individuals use the Internet to gather information about individuals or groups. As people transmit more and more private information via the Internet and store private data on computers not under their physical control, privacy concerns have become increasingly important.
  • 18. Freedom of Expression and Human Rights  The Internet has become vital to freedom of expression and human rights issues. As the Internet has become one of the primary means of obtaining and distributing information, many have come to see Internet access as a human right, not a luxury.  Lawyers in many countries work to expand and protect Internet access and freedom of expression. In the United States, lawyers often grapple with these issues in the context of the First Amendment.
  • 19. True Story  Organizational Profile: Google, Inc.  As the company that controls many of the most famous and widely used Internet services and products, Google’s work deals with nearly every facet of intellectual property and cyber law.
  • 20. It is said that…  Google likely to know more about your spouse than you do.
  • 21. True Story  Google employs a Legal and Government Relations team and maintains a web page dedicated to its public policy platform. The company’s stated goal is “[to defend] the Internet as a free and open platform for information, communication, and innovation.” Accordingly the company concerns itself with issues such as open access, privacy, security, intellectual property, and freedom of expression. https://www.google.com/intl/en/about/careers/teams/legal-public- policy/
  • 22. True Story  Google lawyers work at the intersection of law, policy, and new technology.. They both help Google develop new, innovative products that comply with the law and advocate for public policy issues
  • 23. True Story  Google employs in-house lawyers who ensure compliance with U.S. and international law, advise the Engineering, Marketing, and Product Management teams, perform patent litigation, and develop terms of service, privacy notices, and other disclosures.
  • 24. True Story  Google also employs attorneys who lead public policy campaigns, shape the company’s policy position, and monitor policy developments that might affect the company. Google’s advocacy and policy work requires lawyers to engage with policy makers, politicians, non-profit organizations, and industry partners to advance the company’s policy objectives and protect its products and profitability.
  • 25. The Concept of Cybersecurity  Over the past several years, experts and policy makers have expressed increasing concerns about protecting ICT systems from cyberattacks—deliberate attempts by unauthorized persons to access ICT systems, usually with the goal of theft, disruption, damage, or other unlawful actions. Many experts expect the number and severity of cyberattacks to increase over the next several years.
  • 26. Management of Cybersecurity Risks  The risks associated with any attack depend on three factors: threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does).  The management of risk to information systems is considered fundamental to effective cybersecurity.