SlideShare a Scribd company logo
1 of 15
ESSENTIALS OF THE LEGAL
ENVIRONMENT TODAY, 5E
ROGER LEROY MILLER
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
CHAPTER 9
INTERNET LAW, SOCIAL
MEDIA, AND PRIVACY
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LEARNING OBJECTIVES
1. What is cybersquatting, and when is
it illegal?
2. What steps have been taken to
protect intellectual property rights in
the digital age?
3. When does the law protect a
person’s electronic communications
from being intercepted or accessed?
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LEARNING OBJECTIVES (CONT’D)
4. What law governs whether Internet
service providers are liable for online
defamatory statements made by
users?
5. How do online retailers track their
users’ Web browsing activities?
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
INTERNET LAW
• Laws specifically address issues that
only arise on the Internet
• Spam
• State regulation of spam
• The Federal CAN-SPAM Act
• Enacted by Congress in 2003
• Controlling the Assault of Non-Solicited Pornography and
Marketing Act
• U.S. Safe Web Act
• Allows FTC to work with foreign agencies
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
INTERNET LAW
• Domain Names
• Structure of domain names
• Top-level domain (TLD) indicates type of entity operating
the site
• Second-level domain (SLD) chosen by the business or
entity or individual registering the domain name
• Distribution system
• Internet Corporation for Assigned Names and Numbers
(ICANN) oversees distribution of domain names
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
INTERNET LAW
• Cybersquatting
• Anticybersquatting legislation
• Anticybersquatting Consumer Protection Act (ACPA)
• Cybersquatting is illegal when:
• The name is identical or confusingly similar to the trademark of
another.
• The one registering, trafficking in, or using the domain name has a
“bad faith intent” to profit from that trademark.
• Ongoing problem of cybersquatting
• Typosquatting
• Applicability and sanctions of the ACPA
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LO-1
INTERNET LAW
• Meta Tags
• Trademark Dilution in the Online World
• Licensing
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
COPYRIGHTS IN DIGITAL
INFORMATION
• Copyright law is most important form
of intellectual property protection on
the Internet.
• Digital Millennium Copyright Act
(DMCA)
• Congress passed in 1998
• Significant protection to owners of
copyrights in digital information
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LO-2
COPYRIGHTS IN DIGITAL
INFORMATION
• MP3 and File-Sharing Technology
• Programmers created software to
compress large data files
• Methods of file-sharing
• Sharing stored music files
• DVDs and file-sharing
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
SOCIAL MEDIA
• Studies show Internet users spend more
time on social networks than other sites
• Legal Issues
• Criminal investigations
• Administrative agencies
• Employers’ social media policies
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
SOCIAL MEDIA
• The Electronic Communications
Privacy Act (ECPA)
• Amended federal wiretapping law to
cover electronic forms of communications
• Prohibits the intentional interception and
disclosure of any wire, oral, or electronic
communication
• Exclusions
• Stored communications
• Stored Communications Act (SCA) – part of ECPA
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LO-3
SOCIAL MEDIA
• Protection of Social Media Passwords
• States have enacted legislation to protect
individuals from having to disclose
passwords
• Company-wide Social Media Networks
• Protection of trade secrets
• Other advantages
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
ONLINE DEFAMATION
• Identifying the Author of Online
Defamation
• Liability of Internet Service Providers
• General rule – Communications Decency
Act (DCA)
• Exceptions
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LO-4
PRIVACY
• Data Collection and Cookies
• Retailers collect information about
consumers to personalize online services
• Internet Companies’ Privacy Policies
• FTC investigates consumer complaints of
privacy violations
© 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-
protected website for classroom use.
LO-5

More Related Content

What's hot

How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & HygineAmit Arya
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruizlilyanariz
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingcdasLLP
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 

What's hot (20)

How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
File000160
File000160File000160
File000160
 
File000161
File000161File000161
File000161
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Funsec3e ppt ch03
Funsec3e ppt ch03Funsec3e ppt ch03
Funsec3e ppt ch03
 
Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Social media security
Social media securitySocial media security
Social media security
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 

Similar to Essentials of Internet Law, Social Media, and Privacy

4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.pptAlvinOdion
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxkarlhennesey
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Protecting you, online.
Protecting you, online.Protecting you, online.
Protecting you, online.e-Strategy
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docxlorainedeserre
 
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
541341322-3-ITE403-Whitman-Ch03-W3C1.pdfubaidullah75790
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Steve Guinan
 
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Net Impact
 

Similar to Essentials of Internet Law, Social Media, and Privacy (20)

Elet5e ch07
Elet5e ch07Elet5e ch07
Elet5e ch07
 
Elet5e ch08
Elet5e ch08Elet5e ch08
Elet5e ch08
 
Elet5e ch02
Elet5e ch02Elet5e ch02
Elet5e ch02
 
Elet5e ch10
Elet5e ch10Elet5e ch10
Elet5e ch10
 
4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
 
4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt4LTR_MIS6_Ch04.ppt
4LTR_MIS6_Ch04.ppt
 
Elet5e ch19
Elet5e ch19Elet5e ch19
Elet5e ch19
 
Personal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docxPersonal, Legal, Ethical, and Organizational Issues of .docx
Personal, Legal, Ethical, and Organizational Issues of .docx
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Week 4.5.ppt
Week 4.5.pptWeek 4.5.ppt
Week 4.5.ppt
 
Elet5e ch20
Elet5e ch20Elet5e ch20
Elet5e ch20
 
Elet5e ch01
Elet5e ch01Elet5e ch01
Elet5e ch01
 
Protecting you, online.
Protecting you, online.Protecting you, online.
Protecting you, online.
 
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx1WebDesign6EChapter1TheEnvironmentandtheTools.docx
1WebDesign6EChapter1TheEnvironmentandtheTools.docx
 
Elet5e ch06
Elet5e ch06Elet5e ch06
Elet5e ch06
 
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
541341322-3-ITE403-Whitman-Ch03-W3C1.pdf
 
Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1Intro to Web Design 6e Chapter 1
Intro to Web Design 6e Chapter 1
 
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff SchultzThe Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
The Wild, Wild Web, Social Media Law TXCHANGE with Jeff Schultz
 
Elet5e ch18
Elet5e ch18Elet5e ch18
Elet5e ch18
 
WordCamp Talk 2014
WordCamp Talk 2014WordCamp Talk 2014
WordCamp Talk 2014
 

More from DeAnna Gossett (20)

Chapter14
Chapter14Chapter14
Chapter14
 
Chapter13
Chapter13Chapter13
Chapter13
 
Chapter12
Chapter12Chapter12
Chapter12
 
Chapter11
Chapter11Chapter11
Chapter11
 
Chapter10
Chapter10Chapter10
Chapter10
 
Chapter9
Chapter9Chapter9
Chapter9
 
Chapter8
Chapter8Chapter8
Chapter8
 
Chapter7
Chapter7Chapter7
Chapter7
 
Chapter6
Chapter6Chapter6
Chapter6
 
Chapter5
Chapter5Chapter5
Chapter5
 
Chapter4
Chapter4Chapter4
Chapter4
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter2
Chapter2Chapter2
Chapter2
 
Chapter1
Chapter1Chapter1
Chapter1
 
Elet5e ch17
Elet5e ch17Elet5e ch17
Elet5e ch17
 
Elet5e ch16
Elet5e ch16Elet5e ch16
Elet5e ch16
 
Elet5e ch15
Elet5e ch15Elet5e ch15
Elet5e ch15
 
Elet5e ch14
Elet5e ch14Elet5e ch14
Elet5e ch14
 
Elet5e ch13
Elet5e ch13Elet5e ch13
Elet5e ch13
 
Elet5e ch12
Elet5e ch12Elet5e ch12
Elet5e ch12
 

Recently uploaded

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Recently uploaded (20)

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Essentials of Internet Law, Social Media, and Privacy

  • 1. ESSENTIALS OF THE LEGAL ENVIRONMENT TODAY, 5E ROGER LEROY MILLER © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 2. CHAPTER 9 INTERNET LAW, SOCIAL MEDIA, AND PRIVACY © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 3. LEARNING OBJECTIVES 1. What is cybersquatting, and when is it illegal? 2. What steps have been taken to protect intellectual property rights in the digital age? 3. When does the law protect a person’s electronic communications from being intercepted or accessed? © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 4. LEARNING OBJECTIVES (CONT’D) 4. What law governs whether Internet service providers are liable for online defamatory statements made by users? 5. How do online retailers track their users’ Web browsing activities? © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 5. INTERNET LAW • Laws specifically address issues that only arise on the Internet • Spam • State regulation of spam • The Federal CAN-SPAM Act • Enacted by Congress in 2003 • Controlling the Assault of Non-Solicited Pornography and Marketing Act • U.S. Safe Web Act • Allows FTC to work with foreign agencies © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 6. INTERNET LAW • Domain Names • Structure of domain names • Top-level domain (TLD) indicates type of entity operating the site • Second-level domain (SLD) chosen by the business or entity or individual registering the domain name • Distribution system • Internet Corporation for Assigned Names and Numbers (ICANN) oversees distribution of domain names © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 7. INTERNET LAW • Cybersquatting • Anticybersquatting legislation • Anticybersquatting Consumer Protection Act (ACPA) • Cybersquatting is illegal when: • The name is identical or confusingly similar to the trademark of another. • The one registering, trafficking in, or using the domain name has a “bad faith intent” to profit from that trademark. • Ongoing problem of cybersquatting • Typosquatting • Applicability and sanctions of the ACPA © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use. LO-1
  • 8. INTERNET LAW • Meta Tags • Trademark Dilution in the Online World • Licensing © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 9. COPYRIGHTS IN DIGITAL INFORMATION • Copyright law is most important form of intellectual property protection on the Internet. • Digital Millennium Copyright Act (DMCA) • Congress passed in 1998 • Significant protection to owners of copyrights in digital information © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use. LO-2
  • 10. COPYRIGHTS IN DIGITAL INFORMATION • MP3 and File-Sharing Technology • Programmers created software to compress large data files • Methods of file-sharing • Sharing stored music files • DVDs and file-sharing © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 11. SOCIAL MEDIA • Studies show Internet users spend more time on social networks than other sites • Legal Issues • Criminal investigations • Administrative agencies • Employers’ social media policies © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 12. SOCIAL MEDIA • The Electronic Communications Privacy Act (ECPA) • Amended federal wiretapping law to cover electronic forms of communications • Prohibits the intentional interception and disclosure of any wire, oral, or electronic communication • Exclusions • Stored communications • Stored Communications Act (SCA) – part of ECPA © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use. LO-3
  • 13. SOCIAL MEDIA • Protection of Social Media Passwords • States have enacted legislation to protect individuals from having to disclose passwords • Company-wide Social Media Networks • Protection of trade secrets • Other advantages © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use.
  • 14. ONLINE DEFAMATION • Identifying the Author of Online Defamation • Liability of Internet Service Providers • General rule – Communications Decency Act (DCA) • Exceptions © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use. LO-4
  • 15. PRIVACY • Data Collection and Cookies • Retailers collect information about consumers to personalize online services • Internet Companies’ Privacy Policies • FTC investigates consumer complaints of privacy violations © 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password- protected website for classroom use. LO-5