The document discusses several legal issues related to e-commerce including jurisdiction, encryption, privacy, copyright, trademarks, and more. It provides definitions and examples for each topic. For jurisdiction, it summarizes the CompuServe vs. Patterson case where a software developer sued CompuServe for trademark infringement and the court found it did have jurisdiction. For copyright, it outlines the A&M Records vs. Napster case where Napster was found to have contributed to copyright infringement by allowing users to share music files. It also summarizes other cases related to linking/framing, libel, and trademarks. The document concludes with descriptions of encryption regulation and privacy rights issues.
The basis of business on the internet is your domain name. Buying, selling, defending, procuring and maximizing domain names is key aspect of any affiliate marketer.
Experience level: Intermediate
Target audience: Affiliates/Publishers
Niche/vertical: Domains
Gary Kibel, Partner, Davis & Gilbert LLP (Twitter @GaryKibel_law) (Moderator)
Sara Freixa, Brand Protection Manager, Americas, Melbourne IT DBS Inc
Peter Marinello, Director, Electronic Retailing Self-Regulation Program
This is a presentation that discusses how the take down provisions of the Digital Millennium Copyright Act (DMCA) have been expanded to not only cover copyrights but other forms of intellectual property, such as trademarks, rights of publicity, patents, etc. The presentation compares the different take down procedures used by major websites as well as provides sample take down forms and policies.
The basis of business on the internet is your domain name. Buying, selling, defending, procuring and maximizing domain names is key aspect of any affiliate marketer.
Experience level: Intermediate
Target audience: Affiliates/Publishers
Niche/vertical: Domains
Gary Kibel, Partner, Davis & Gilbert LLP (Twitter @GaryKibel_law) (Moderator)
Sara Freixa, Brand Protection Manager, Americas, Melbourne IT DBS Inc
Peter Marinello, Director, Electronic Retailing Self-Regulation Program
This is a presentation that discusses how the take down provisions of the Digital Millennium Copyright Act (DMCA) have been expanded to not only cover copyrights but other forms of intellectual property, such as trademarks, rights of publicity, patents, etc. The presentation compares the different take down procedures used by major websites as well as provides sample take down forms and policies.
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28erikpelton
"Trademark Strategies for 2012" Presentation to the American Bar Association's Cyberspace Institute in Austin Texas on January 28, 2011. The presentation explores recent changes to the practice of trademark law, and what the future might hold for trademark owners and attorneys who advise them.
ACI’s lauded Cyber & Data Risk Insurance conference is the highest-level event that provides maximum opportunities to learn from and network with underwriters, brokers, claims managers and industry leaders, and helps you keep pace with the ever-changing cyber insurance market. It’s also the only conference that brings you regulatory and enforcement priorities straight from the federal and state government themselves.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Learning ObjectivesAfter studying this chapter, you should be ab.docxsmile790243
Learning Objectives
After studying this chapter, you should be able to:
1. Describe the business tort of misappropriating a trade secret.
2. Describe how an invention can be patented under federal patent laws and the penalties for patent infringement.
3. List the items that can be copyrighted and describe the penalties of copyright infringement.
4. Define trademark and service mark and describe the penalties for trademark infringement.
5. Define cyber piracy and describe the penalties for engaging in cyber infringement of intellectual property rights.
Chapter Outline
1. Introduction to Intellectual Property and Cyber Piracy
2. Intellectual Property
3. Trade Secret
1. Ethics • Coca-Cola Employee Tries to Sell Trade Secrets to Pepsi-Cola
4. Patent
1. Case 7.1 • U.S. Supreme Court Case • Association for Molecular Pathology v. Myriad Genetics, Inc.
2. Contemporary Environment • Leahy-Smith America Invents Act (AIA)
5. Copyright
1. Critical Legal Thinking Case • BMG Music v. Gonzalez
2. Case 7.2 • U.S. Supreme Court Case • Kirtsaeng v. John Wiley & Sons, Inc.
3. Digital Law • Digital Millennium Copyright Act
6. Trademark
1. Case 7.3 • Intel Corporation v. Intelsys Software, LLC
2. Case 7.4 • V Secret Catalogue, Inc. and Victoria’s Secret Stores, Inc. v. Moseley
3. Global Law • International Protection of Intellectual Property
“The Congress shall have the power . . . to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.”
Article 1, Section 8, Clause 8 of the U.S. Constitution
Introduction to Intellectual Property and Cyber Piracy
The U.S. economy is based on the freedom of ownership of property. In addition to real estate and personal property, intellectual property rights have value to both businesses and individuals. This is particularly the case in the modern era of the Information Age, computers, and the Internet.
Federal law provides protections for intellectual property rights, such as patents, copyrights, and trademarks. Certain federal statutes provide for either civil damages or criminal penalties, or both, to be assessed against infringers of patents, copyrights, and trademarks. Trade secrets form the basis of many successful businesses, and they are protected from misappropriation. State law imposes civil damages and criminal penalties against persons who misappropriate trade secrets.
“And he that invents a machine augments the power of a man and the well-being of mankind.”
Henry Ward Beecher
Proverbs from Plymouth Pulpit—Business
This chapter discusses trade secrets, patents, copyrights, and trademarks and how to protect them from infringement, misappropriation, and cyber piracy.
Intellectual Property
Intellectual property is a term that describes property that is developed through an intellectual and creative process. Intellectual property falls into a category of property known as intangible rights, which are not tang ...
TechWeek Chicago 2012 was great success. Packed room with entrepreneurs eager to understand legal issues facing their business. If you were unable to attend, here is my portion of the presentation.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
This presentation was conducted for ODI Queensland by Baden Appleyard. It examines the law and licensing issues associated with open data, in particular from a Queensland perspective. It was presented on 21 October 2015. Links to further resources exist within the presentation.
Letter to Roger Seawright from M. Shanken CommunicationsRoger Seawright
M. Shanken Communications TradeMarked a Generic Descriptive term and used UDRP to back up their claim.
The problem with their claim is that you can not trademark a generic descriptive term. UDRP decisions weigh heavily towards the complainant. They do not have the ultimate authority over domains names. Its useless to even use them as an authority. District Court baby. A real judge in a real court of law.
3Kaur15 U.S.C.S. § 1125 ™False designations of ori.docxtamicawaysmith
3
Kaur
15 U.S.C.S. § 1125
™
False designations of origin, false descriptions, and dilution forbidden
Shagandeep Kaur
Business 154: Business Law
Gary Patterson
Research Project
December 10, 2014
Table of Contents
Title
Page number
I. Introduction
1
II. Legislation
1
III. Rationale
1
IV. Case Analysis
2
Case 1.
2
Case 2.
3
V. Conclusion
4
a. Social Impact
4
b. Personal Opinion
5
References
6
[Type text] [Type text] [Type text]
SK™
[Type text] [Type text] [Type text]
SK™
I. Introduction
The Lanham Act, also known as the trademark act, was enacted in 1946 with the purpose of being a federal trademark statue of law. This law originated so that various merchants are able to maintain their commerce through their reputation and brand without having other competitors take advantage of diluting the brand through similar names or trademarks that impersonate the original merchant. This act is filed under title 15, Commerce and Trade, because it pertains to merchants and their businesses. Chapter 22, Trademarks and general provisions, has this law as a subsection. This paper will be covering § 1125, which deals with false designations of origin, false descriptions, and dilution. The two cases that are covered will go into depth about how the courts interpret the law and whether or not it has a significant impact on commerce.
This topic is of interest to me because it takes many years for a business to build their reputation and brand-worth and another person may try to make money off of that brand even if they have no right to. This usually occurs with high end reputable brands, such as, Gucci, Chanel, Louis Vuitton, Coke, et cetera, when people make knock offs or duplicates of that brand and sell them as genuine. This ends up diluting the brand and is also considered false designation of origin since it’s not the real brand. It’s really tempting to purchase knockoffs of such luxury items but at the end of the day, the people selling those items are infringing on trademarks and can be held liable in court under this Chapter and subsection.
II. Legislation
This law comes under Title 15, Commerce and Trade, and under Chapter 22, Trademarks and general provisions, and under § 1125, false designations of origin, false descriptions, and dilution are forbidden.
15 USCS § 1125
(a) Civil action.
(1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which--
(A) Is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or
(B) I ...
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28erikpelton
"Trademark Strategies for 2012" Presentation to the American Bar Association's Cyberspace Institute in Austin Texas on January 28, 2011. The presentation explores recent changes to the practice of trademark law, and what the future might hold for trademark owners and attorneys who advise them.
ACI’s lauded Cyber & Data Risk Insurance conference is the highest-level event that provides maximum opportunities to learn from and network with underwriters, brokers, claims managers and industry leaders, and helps you keep pace with the ever-changing cyber insurance market. It’s also the only conference that brings you regulatory and enforcement priorities straight from the federal and state government themselves.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Learning ObjectivesAfter studying this chapter, you should be ab.docxsmile790243
Learning Objectives
After studying this chapter, you should be able to:
1. Describe the business tort of misappropriating a trade secret.
2. Describe how an invention can be patented under federal patent laws and the penalties for patent infringement.
3. List the items that can be copyrighted and describe the penalties of copyright infringement.
4. Define trademark and service mark and describe the penalties for trademark infringement.
5. Define cyber piracy and describe the penalties for engaging in cyber infringement of intellectual property rights.
Chapter Outline
1. Introduction to Intellectual Property and Cyber Piracy
2. Intellectual Property
3. Trade Secret
1. Ethics • Coca-Cola Employee Tries to Sell Trade Secrets to Pepsi-Cola
4. Patent
1. Case 7.1 • U.S. Supreme Court Case • Association for Molecular Pathology v. Myriad Genetics, Inc.
2. Contemporary Environment • Leahy-Smith America Invents Act (AIA)
5. Copyright
1. Critical Legal Thinking Case • BMG Music v. Gonzalez
2. Case 7.2 • U.S. Supreme Court Case • Kirtsaeng v. John Wiley & Sons, Inc.
3. Digital Law • Digital Millennium Copyright Act
6. Trademark
1. Case 7.3 • Intel Corporation v. Intelsys Software, LLC
2. Case 7.4 • V Secret Catalogue, Inc. and Victoria’s Secret Stores, Inc. v. Moseley
3. Global Law • International Protection of Intellectual Property
“The Congress shall have the power . . . to promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.”
Article 1, Section 8, Clause 8 of the U.S. Constitution
Introduction to Intellectual Property and Cyber Piracy
The U.S. economy is based on the freedom of ownership of property. In addition to real estate and personal property, intellectual property rights have value to both businesses and individuals. This is particularly the case in the modern era of the Information Age, computers, and the Internet.
Federal law provides protections for intellectual property rights, such as patents, copyrights, and trademarks. Certain federal statutes provide for either civil damages or criminal penalties, or both, to be assessed against infringers of patents, copyrights, and trademarks. Trade secrets form the basis of many successful businesses, and they are protected from misappropriation. State law imposes civil damages and criminal penalties against persons who misappropriate trade secrets.
“And he that invents a machine augments the power of a man and the well-being of mankind.”
Henry Ward Beecher
Proverbs from Plymouth Pulpit—Business
This chapter discusses trade secrets, patents, copyrights, and trademarks and how to protect them from infringement, misappropriation, and cyber piracy.
Intellectual Property
Intellectual property is a term that describes property that is developed through an intellectual and creative process. Intellectual property falls into a category of property known as intangible rights, which are not tang ...
TechWeek Chicago 2012 was great success. Packed room with entrepreneurs eager to understand legal issues facing their business. If you were unable to attend, here is my portion of the presentation.
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...Shawn Tuma
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss. This is a keynote speech delivered by Shawn Tuma to the Paralegal Division of the State Bar of Texas on June 17, 2016.
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
This presentation was conducted for ODI Queensland by Baden Appleyard. It examines the law and licensing issues associated with open data, in particular from a Queensland perspective. It was presented on 21 October 2015. Links to further resources exist within the presentation.
Letter to Roger Seawright from M. Shanken CommunicationsRoger Seawright
M. Shanken Communications TradeMarked a Generic Descriptive term and used UDRP to back up their claim.
The problem with their claim is that you can not trademark a generic descriptive term. UDRP decisions weigh heavily towards the complainant. They do not have the ultimate authority over domains names. Its useless to even use them as an authority. District Court baby. A real judge in a real court of law.
3Kaur15 U.S.C.S. § 1125 ™False designations of ori.docxtamicawaysmith
3
Kaur
15 U.S.C.S. § 1125
™
False designations of origin, false descriptions, and dilution forbidden
Shagandeep Kaur
Business 154: Business Law
Gary Patterson
Research Project
December 10, 2014
Table of Contents
Title
Page number
I. Introduction
1
II. Legislation
1
III. Rationale
1
IV. Case Analysis
2
Case 1.
2
Case 2.
3
V. Conclusion
4
a. Social Impact
4
b. Personal Opinion
5
References
6
[Type text] [Type text] [Type text]
SK™
[Type text] [Type text] [Type text]
SK™
I. Introduction
The Lanham Act, also known as the trademark act, was enacted in 1946 with the purpose of being a federal trademark statue of law. This law originated so that various merchants are able to maintain their commerce through their reputation and brand without having other competitors take advantage of diluting the brand through similar names or trademarks that impersonate the original merchant. This act is filed under title 15, Commerce and Trade, because it pertains to merchants and their businesses. Chapter 22, Trademarks and general provisions, has this law as a subsection. This paper will be covering § 1125, which deals with false designations of origin, false descriptions, and dilution. The two cases that are covered will go into depth about how the courts interpret the law and whether or not it has a significant impact on commerce.
This topic is of interest to me because it takes many years for a business to build their reputation and brand-worth and another person may try to make money off of that brand even if they have no right to. This usually occurs with high end reputable brands, such as, Gucci, Chanel, Louis Vuitton, Coke, et cetera, when people make knock offs or duplicates of that brand and sell them as genuine. This ends up diluting the brand and is also considered false designation of origin since it’s not the real brand. It’s really tempting to purchase knockoffs of such luxury items but at the end of the day, the people selling those items are infringing on trademarks and can be held liable in court under this Chapter and subsection.
II. Legislation
This law comes under Title 15, Commerce and Trade, and under Chapter 22, Trademarks and general provisions, and under § 1125, false designations of origin, false descriptions, and dilution are forbidden.
15 USCS § 1125
(a) Civil action.
(1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which--
(A) Is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or
(B) I ...
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
This comprehensive program covers essential aspects of performance marketing, growth strategies, and tactics, such as search engine optimization (SEO), pay-per-click (PPC) advertising, content marketing, social media marketing, and more
3. Jurisdiction
Issue: Which court has power to render a verdict?
In order for a verdict to be enforceable, the court
must have authority over the subject matter and the
person involved
Subject matter - the nature of the case
Personal involved needs to be either
physically present or the offense need to have
occurred within the boundaries of the court
Ragothaman, Davies, Dykstra 2000
4. Jurisdiction Case
CompuServe vs. Patterson
Patterson, software developer, and CompuServe
entered into an agreement where CompuServe
would distribute his shareware
Patterson brought suit against CompuServe for
trademark infringement
CompuServe sought no infringement in a Federal
District Court in Ohio
Satterlee Stephens Burke & Burke LLP, 1998
5. Jurisdiction Case
Court dismissed the case claiming the court
did not have jurisdiction over the case
The argument did not come from Patterson’s
agreement with CompuServe
Patterson did not have adequate contact with Ohio
• Court of Appeals for the 6th Circuit reversed
the courts decision to dismiss
Satterlee Stephens Burke & Burke LLP, 1998
6. Jurisdiction Case
Court of Appeals found that Ohio had
jurisdiction because:
Patterson agree to the contract terms with
CompuServe in Ohio
Patterson’s sharewares where put into Ohio’s
position
• http://www.ssbb.com/yesjuris.html
Satterlee Stephens Burke & Burke LLP, 1998
7. Linking, Framing, Metatags
Issue with Linking: A third party links to another site
creating a false impression in the mind of the viewer
that the two sites are related.
Safeguard against Linking: preemptive action
Issue with Framing: can cause audience confusion
Issues with Metatags: Arguments over a third party
using the trademark of another as a metatag
Violation: Unfair competition, copyright, and
trademark infringement
Ragothaman, Davies, Dykstra 2000
and Springer, Randel 2000
8. Linking, Framing, Metatags Case
Ticketmaster Corp. vs. Microsoft Corp.
Microsoft created a city guide web site for
Seattle
City guide web site used Ticketmaster’s
name and services without Ticketmaster’s
consent
“Cyberspace” 2002
9. Linking, Framing, Metatags Case
Ticketmaster claims damages to its name
and business opportunities
Court Ruled:
Microsoft had damaged Ticketmaster’s name and
web site
• http://www.jmls.edu/cyber/cases/ticket1.html
“Cyberspace” 2002
10. Copyright
Issue: The unauthorized reproduction or
posting of protected material through the
Internet
Material: Text, Pictures, or Sound
Ragothaman, Davies, Dykstra 2000
11. Copyright Case
A&M Records, Inc vs. Napster
Napster allowed Internet users to download,
duplicate, and distribute copyrighted music without
consent
A&M Records Complaint: Contributory & vicarious
copyright infringement and unfair competition
Court ruled in favor of A&M Records
http://www.gigalaw.com/library/am-napster-2000-08-11.html
Isenberg, Douglas M. 2000
12. Libel
Issue: By using the web to post false
information about a person that causes harm
to the person’s reputation
Cyber-smearing: Communication of false
information about a company that harms the
value of it
Safeguard against cyber-smearing:
implement corporate policies and damage
control procedures
Ragothaman, Davies, Dykstra 2000
13. Libel Case
Cubby Inc. vs. CompuServe
CompuServe entered into an agreement with
a third party to perform a special interest
forum, called “Rumorville” for CompuServe
Defamatory material regarding Cubby Inc.
was displayed by the third party and
CompuServe
Godwin, Mike 1993
14. Libel Case
Court did not find CompuServe liable
Issues:
1. First issue
Difference between the “publisher” and the
“bookstore owner”
“publisher” – third party
“bookstore owner” – CompuServe
First Amendment calls attention to the “publisher”
as being liable for defamation, but the “bookstore
owner” should not be held accountable
Godwin, Mike 1993
15. Libel Case
1. Second issue
CompuServe had an agreement with the third
party; therefore limiting its liability
• http://www.eff.org/Publications/Mike_Godwin/ne
Godwin, Mike 1993
16. Trademarks
There are 3 types of Trademark Legal Issues:
Trademark Infringement: the unauthorized use of a
trademark as a domain name
Trademark Dilution: when a third party harms the
reputation of a trademark
Trademark Dress Infringement: the illegal replication
of a certain look a company owns (via the look of a
product or website)
Springer, Randel 2000
17. Trademark Case
Saturn Corp. vs. Saturn Service Inc.
Saturn Service Inc. has no agreement with Saturn
Corp. to use its trademark for business opportunities
Saturn Corp. is suing Saturn Service Inc. for
“trademark infringement, dilution, false designation
of origin, false advertising, and cybersquatting”
Cypersquatting – refers to bad faith registration of
someone else’s trademark or trade name as a
domain name.
Finnegan, Henderson, Farabow, Garrett & Dunner 2001
18. Trademark Case
Court ruled Saturn Service Inc. was in violation of:
Trademark Infringement – allowing consumers to assume
the shop was associated with Saturn Corp.
Intent to confuse consumers by using the same script and
copying Saturn’s mark
Unauthorized use of the Saturn mark in the defendant’s
web site “saturnusedparts.com”
The defendant’s use of the name Saturn, diluted the value
of the business
• http://www.finnegan.com/summ/cases/Saturn.htm
Finnegan, Henderson, Farabow, Garrett & Dunner 2001
19. Encryption Regulation
Description of the issue: The encryption
regulation debate involves disputes between
the needs of business for integrity and privacy,
the First Amendment’s right to free speech, and
the need of law enforcement to track criminal
behavior, such as espionage, terrorism, money
laundering, and other crimes.
Ragothaman, Davies, Dykstra 2000
20. Encryption Regulation
How to Safeguard:
President Clinton issued Direction 63 calling for a
detailed plan to protect Americans against cyber
disruptions.
He stated “each sector must decide for itself what
practices, procedures, and standards are necessary
for it to protect its key systems”. The critical sectors
to which President Clinton referred were the
economy, national security, public health and safety.
Ragothaman, Davies, Dykstra 2000
21. Encryption Regulation
In the Law or in Business:
December 5th, 2001 - Secretary of Commerce
Donald Evans officially finalized the federal
government's approval of the Advanced Encryption
Standard (AES), a data encryption technique that
will be used to protect sensitive information and
which is widely expected to be adopted by the
private sector as well.
Olavsrud 2001
22. Privacy Rights
Description of the issue: Privacy Issues
relate to obtaining , using, and distributing
personal data such as names, addresses,
phone numbers, income, medical conditions,
and characteristics of race, sex, age, ethnicity
and political affiliation.
Ragothaman, Davies, Dykstra 2000
23. 10 RULES OF PRIVACY POLICY
1. Make sure you have an explicit and formal
company privacy policy in place, highlight it in all
customer interactions, and make it easy to
understand.
2. Don’t ask for more private information than you
need.
3. Make customers feel safe in their relationship with
your company, regardless of formal and often
contradictory – legal requirements.
4. Handle the security basics well: SET and SSL are
your best friends. They don’t guarantee privacy by
themselves, but they sure show that your firm is
responsible in its e-commerce.
24. 10 RULES OF PRIVACY POLICY
5. Associate your site with an organization, such as
TrustE, BBBOnLine (Better Business Bureau) or
CPA Web Trust, that certifies Web sites and the
business and audit processes behind them.
6. Let customers easily opt out of allowing you to
share information with other parties, but inform
them that they’ll probably lose convenience,
service, and personalization if they do so..
7. Don’t be tempted by easy technology tricks that
deceive your customers.
25. 10 RULES OF PRIVACY POLICY
8. Invite the person in you firm’s audit department
who handles financial control of online services out
to lunch. Most breaches of privacy happen far, far
away from your Web site. Access control audit
logs, and formal rules of information use are the
process essentials that support or undermine what
you build into Web site.
9. Don’t put all your faith in firewalls.
10.Look on the bright side. Privacy is generally
discussed in negative terms: Everyone’s for it, and
violating it is A Bad Thing. But in practice, it’s very
much a matter of common sense and ensuring
informed consent
Keen, Peter 2000
26. Privacy Rights
Two primary areas of concerns arise under the privacy concept.
1. Privacy of Internal Workplace data
2. Privacy of External Workplace data
Company to company or company to customer data – internal
memos and e-mail generated from the company’s computers are
owned by the company.
Employees also need to be aware that companies can monitor
employee use of e-mail and the Internet. (This includes personal
messages sent via e-mail)
Ragothaman, Davies, Dykstra 2000
27. Privacy Rights
In the Law or in Business:
e-Bay Takes Some Heat on Privacy Policy
Unfair or deceptive trade practices
Conflict of Terms
Changes to its privacy policy and user
agreement
Cox, Beth 2002
28. Domain Name Disputes
Description of the issue: Disputes arise
over ownership of domain names and
because of similarities between similar
domain names. This practice of adopting
similar or identical domain names is often
referred to as “cybersquatting”.
Ragothaman, Davies, Dykstra 2000
29. Domain Name Disputes
How to Safeguard:
Internet Corporation for Assigned Names and
Numbers (ICANN) new rules and procedures for
resolving domain names disputes provide for an
exclusionary process which allow an owner of a
domain name to exclude others from obtaining
registration of a domain name identical or
confusingly similar to theirs.
Ragothaman, Davies, Dykstra 2000
30. Domain Name Disputes
How to Safeguard:
A related domain name issue that e-
business must consider revolves around
ownership. Businesses need to carefully
review their contracts to be sure they, and
not the service providers or developer, own
their registered domain name.
Ragothaman, Davies, Dykstra 2000
31. Domain Name Disputes
In the Law or in Business:
New Jersey teenager sues Black Entertainment
Television over a URL
Rapcity.com
Alleged Trademark Violations: Teenager is seeking $10
million in damages
Big companies are challenging domain names that they
believe encroach on their trademarks. Federal spending
bill imposes up to $100,000 in penalties for
“cybersquatters”
Quittner 2000
32. Electronic Agreements
Description of the issue: Ensuring enforceability
of electronic agreements in the courts critical to
increasing their usefulness. A major issue with
electronic agreements is whether they meet writing
requirement of the Statue of Frauds. Most Statue of
Frauds issues have and will continue to involve the
acceptability of a digital signature as sufficient to
meet signature requirements.
Ragothaman, Davies, Dykstra 2000
33. Electronic Agreements
How to Safeguard:
Safeguards for ensuring enforceability of electronic
commercial agreements arising through the Internet include:
ensuring that all terms and conditions are stated in clear,
simple and straightforward language;
stating that the online display is the sole, exclusive and
final agreement;
establishment of a storage system for agreements;
offering the opportunity for telephone discussion and
clarification of terms;
inclusion of a statement that the person accepting the
contract has the authority to do so;
requiring a ‘signature’ either handwritten or facsimile,
where needed.
Ragothaman, Davies, Dykstra 2000
34. Electronic Agreements
In the Law or in Business:
Electronic Filing of Complex Legal Cases Mandated in D.C.
Beginning May 1st,2001 will no longer accept paper filings,
except for initial complaints, in its most complex and lengthy civil
cases.
D.C. Superior Court will become one of the first courts in the
Northeast to mandate electronic filing of documents.
Pilot Project with CourtLink Corporation - all parties in over 600
cases will be required to file electronically with the Superior
Court using the CourtLink eFile service.
Estock 2001
35. Digital Signature
Description of the issue: The major
problem associated with digital signatures
are whether the recipient has the specific
number code added by the computer and
whether the signatures meet the Statue of
Frauds requirement that contracts be
‘signed’ by the party to be charged.
Ragothaman, Davies, Dykstra 2000
36. Digital Signature
How to Safeguard:
The Uniform Commercial Code (UCC) does
not specifically recognize digital signatures,
but the UCC does define ‘signed’ as any
symbol executed or adopted by a third party
with the present intention to authenticate a
writing.
Ragothaman, Davies, Dykstra 2000
38. Digital Signature
In the Law or in Business:
President Bill Clinton signed the Electronic Signature
Act, E-Sign Law, which officially granting e-mail the
same status as paper in court.
The new law is part of Capitol Hill’s “eContract 2000,” a
program aimed at modernizing the nation’s laws to be in-step
with advancing technologies.
Mutual Fund Example
Financial Institutions, insurance companies,
brokerages, and utility companies will experience
dramatic cost-cutting reductions because of the E-
SIGN law.
Fusco 2000
39. Legal Issues Summary
While both business-to-business e-commerce and
business-to-consumer e-commerce are expanding
at a brisk pace, laws dealing with e-commerce are
lagging behind. We have provided an overview of
several legal issues that have emerged in the
arena of e-commerce.
40. References
• Cox, Beth (2002). “eBay Takes Some Heat on Privacy Policy,”
Internet News, February 2002.
• Estock, Debra A. (2001). “Electronic Filing of Complex Legal Cases
Mandated in D.C.,” Application Planet, May 1st, 2001.
• Finnegan, Henderson, Farabow, Garrett & Dunner, L.L.P (2001).
“Saturn Corp. v. Saturn Service, Inc.”
• Fusco, Patricia (2000). “President Gives Nod to Digital Signature,”
Internet World, June 30, 2000.
• Godwin, Mike (1993). “Internet Libel: Is the Provider Responsible,”
Internet World, Nov./Dec.
• Grotta, Sally (2000). “Cyber-Sign,” PC Magazine, May 2001.
• Keen, Peter (2000). “Designing Privacy for Your E-business,” PC
Magazine, June 6, 2000.
• Isenberg, Douglas M. (2000). “A&M Records, Inc. v. Napster, Inc.
U.S. District Court, Northern District of California." Legal
Information for Internet Professional, May 12, 2000.
41. References
• Olavsrud, Thor (2001). “Infrastructure News,” Internet News,
December 15, 2001.
• Quittner, Jeremy (2000). “The Lemonade Stand Circa 2000: A Boy,
a Site, a $10 Million Lawsuit,” Business Week Online.
• Ragotarnan, Srinivasan, Davies, Thomas, and Dykstra, DeVee
(2000). “Legal Aspects of Electronic Commerce and Their
Implications for the Accounting Profession,” Human System
Management.
• Springer, Randel (2000). “BusinessPowerLaw.com-Internet,”
Business and Law
• “Cyberspace Law,” John Marshall Law School, 2002
• “Cases Finding Jurisdiction on the Basis of Internet Contracts,”
Satterlee Stephens Burke & Burke LLP, 1998