SlideShare a Scribd company logo
1www.assignmenthelpexperts.com
2
www.assignmenthelpexperts.com
 Protection of Inventions and Creations
 Creation of Trade Marks
 Similarity of Trademarks Issue
 Sue for Trademark Infringement
3
www.assignmenthelpexperts.com
 Protect the Use of Information Technology on
Cyberspace
 Use of electronic digital interchange (EDI)
 Privacy Issue
 Negative impact on Trading Relationship
4
www.assignmenthelpexperts.com
 Regulation of rights and obligations in a contract
 Need to fulfill all contract requisites
 Communicating Consent Issue
 Proper clarification of Contracts
5
www.assignmenthelpexperts.com
 Intentionally harm to other
 Leakage of information for personal benefits
 Lose of brand reputation in market
6
www.assignmenthelpexperts.com
 Overview:
 Concerns related to safety and protection of
collected personal information
 Case of Life Lock company Vs FTC
 Failure of Life Lock company on its services to
provide data security
7
www.assignmenthelpexperts.com
 What Happened:
 Failure of Life Lock company on its services to
provide data security
 Leakage of information of FTC’s customers
 Information hacked by unauthorized person due to
inefficient software
8
www.assignmenthelpexperts.com
 Outcomes:
 Establishing effective data security measures
 Compensate FTC for loss of information
 Payment by Life Lock to each customer
9
www.assignmenthelpexperts.com
 Andersen, B. (2006) Intellectual Property Rights: Innovation,
Governance and the Institutional Environment. UK: Edward Elgar
Publishing.
 Bar, C. V., Drobnig, U. and Alpa, G. (2004) The Interaction of
Contract Law And Tort And Property Law in Europe: A
Comparative Study. USA: sellier. european law publ.
 Blakeney, M. (2009) Intellectual Property Rights and Food
Security. USA: CABI.
 Cyber Law Currents (2010) [Online]. Available at
http://www.cyberlawcurrents.com/?p=921#comments [Accessed:
7 January, 2013].
 Hammond, R. J. (2003) Identity Theft: How to Protect Your Most
Valuable Asset. USA: Career Press.
 Salzedo, S., Brunner, P. and Ottley, M. (2005)Briefcase on
Contract Law. UK: Routledge.
10www.assignmenthelpexperts.com
 Get A++ Assignment help of business
subjects.
 100% original and authentic content
 15 years experience of writing
assignments
 info@assignmenthelpexperts.com
11www.assignmenthelpexperts.com

More Related Content

What's hot

Protecting Your Ip With Agreements
Protecting Your Ip With AgreementsProtecting Your Ip With Agreements
Protecting Your Ip With Agreements
Incuba8
 

What's hot (20)

Identity Live in Austin Keynote
Identity Live in Austin Keynote Identity Live in Austin Keynote
Identity Live in Austin Keynote
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
CyberCoverage basics
CyberCoverage basicsCyberCoverage basics
CyberCoverage basics
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 
20181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 36520181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 365
 
Securing Confidential Data CI Webinar Series January 2014
Securing Confidential Data CI Webinar Series January 2014Securing Confidential Data CI Webinar Series January 2014
Securing Confidential Data CI Webinar Series January 2014
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Emerging Issues Hit Home
Emerging Issues Hit HomeEmerging Issues Hit Home
Emerging Issues Hit Home
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Protecting Your Ip With Agreements
Protecting Your Ip With AgreementsProtecting Your Ip With Agreements
Protecting Your Ip With Agreements
 

Similar to IT Business Law Assignment Help

proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
welcometofacebook
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
karthik indrajit
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
Dan Michaluk
 

Similar to IT Business Law Assignment Help (20)

E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Newethics
NewethicsNewethics
Newethics
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Legal final
Legal finalLegal final
Legal final
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 

Recently uploaded

Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

IT Business Law Assignment Help

  • 3.  Protection of Inventions and Creations  Creation of Trade Marks  Similarity of Trademarks Issue  Sue for Trademark Infringement 3 www.assignmenthelpexperts.com
  • 4.  Protect the Use of Information Technology on Cyberspace  Use of electronic digital interchange (EDI)  Privacy Issue  Negative impact on Trading Relationship 4 www.assignmenthelpexperts.com
  • 5.  Regulation of rights and obligations in a contract  Need to fulfill all contract requisites  Communicating Consent Issue  Proper clarification of Contracts 5 www.assignmenthelpexperts.com
  • 6.  Intentionally harm to other  Leakage of information for personal benefits  Lose of brand reputation in market 6 www.assignmenthelpexperts.com
  • 7.  Overview:  Concerns related to safety and protection of collected personal information  Case of Life Lock company Vs FTC  Failure of Life Lock company on its services to provide data security 7 www.assignmenthelpexperts.com
  • 8.  What Happened:  Failure of Life Lock company on its services to provide data security  Leakage of information of FTC’s customers  Information hacked by unauthorized person due to inefficient software 8 www.assignmenthelpexperts.com
  • 9.  Outcomes:  Establishing effective data security measures  Compensate FTC for loss of information  Payment by Life Lock to each customer 9 www.assignmenthelpexperts.com
  • 10.  Andersen, B. (2006) Intellectual Property Rights: Innovation, Governance and the Institutional Environment. UK: Edward Elgar Publishing.  Bar, C. V., Drobnig, U. and Alpa, G. (2004) The Interaction of Contract Law And Tort And Property Law in Europe: A Comparative Study. USA: sellier. european law publ.  Blakeney, M. (2009) Intellectual Property Rights and Food Security. USA: CABI.  Cyber Law Currents (2010) [Online]. Available at http://www.cyberlawcurrents.com/?p=921#comments [Accessed: 7 January, 2013].  Hammond, R. J. (2003) Identity Theft: How to Protect Your Most Valuable Asset. USA: Career Press.  Salzedo, S., Brunner, P. and Ottley, M. (2005)Briefcase on Contract Law. UK: Routledge. 10www.assignmenthelpexperts.com
  • 11.  Get A++ Assignment help of business subjects.  100% original and authentic content  15 years experience of writing assignments  info@assignmenthelpexperts.com 11www.assignmenthelpexperts.com

Editor's Notes

  1. The intellectual property law can be defined as rights that are useful in protecting the inventions and creations of an individual, which cannot be used by others illegally to gain any benefits from investment of investor (Blakeney, 2009). IDSS has created a few trademarks to ensure and protect its self developed innovative technologies. In this case, there may be an issue related to similarity of trademarks with another one. If company owns a trademark that is confusingly similar with other trademark, the previous owner of trademark can send a threat letter and sue for trademark infringement (Andersen, 2006).
  2. Cyber law addresses different legal issues associated to use of communicative technology by including all perspectives of activities on the Internet, the websites and Cyberspace. In this case, all work is uploaded through electronic digital interchange (EDI). There may be issue related to privacy or security of documents that are uploaded through EDI. Any unauthorized person can access this information on internet and misuse it for personal benefits. The data can be copied, duplicated and misused by hackers or unauthorized person that can affect relations between trading partners (Hammond, 2003).
  3. Contract law is enforced to regulate the rights and obligations of the involved parties under any contract. When contract requisites are not fulfilled by any party, it is liable for this under this act or law. In this case, there may be communicating consent issue that can be raised by the customer after assigning the contact. A customer can claim about not reviewing all terms and conditions before clicking on icon because he can say that he had no time to review all conditions. Therefore, it needs to display clearly its contracts before offering its service (Salzedo, Brunner & Ottley, 2005).
  4. There may be another law i.e. Tort law that could be applied to this scenario. This law is applied in such conditions, where an individual tries illegally to cause other to undergo any harm or loss. In this situation, this law can be applied because company can leak the information to make benefit other competitor of client that can cause harm for the client. Through this, it can be possible that other company can lose its reputation in the market. In this concern, company will be able for any illegal activity under tort law (Bar, Drobnig & Alpa, 2004).
  5. A case can be considered that is related to data protection law. This law governs the safety of collected and stored personal information. In this case, the Life Lock Company advertises its service as identity theft protection to different global companies in the world. It also promises to offer its clients with early warning of fraud alerts. This company advertised on the web and collected different information related to the customers of the FTC. After no fulfillment of its promises regarding data security measures for FTC, it was enforced $12mm fine for failure to follow privacy policy by the Life Lock Company (Cyber Law Currents, 2010).
  6. The Life Lock Company failed to fulfill its promises to FTC because it could not provide security for collected personally identifiable information of more than one million customers. The FTC filed a case against the company that the service was not provided as per advertisement. Personal information of customers had been hacked by unauthorized persons on defendants’ corporate network. There was a problem in efficiency of data protection software of the company that created problems for the FTC. It failed the company to safeguard the information of FTC’s customers.
  7. In this case, Federal District Court enforced Life Lock to fulfill its promises by establishing effective data security process that could protect all information about consumers on internet in future. It was also charged monetary damages for infringement of this law. Along with this, company had to pay $12 million in fines to the FTC in order to compensate the harm of consumers’ information. In addition, each consumer was paid $10,000 by the COO and CEO of Life Lock. In last, it was also compulsory for the company to conduct an audit till coming 20 years (Cyber Law Currents, 2010).