SlideShare a Scribd company logo
1 of 18
PART II: Laws 6 – 10
Presented by Ryan K. Hew, Attorney at Law, LLLC
A Hawaii Limited Liability Law Company
Last updated: October 23, 2013
DISCLAIMER
The information provided in this
presentation is provided as non-specific
general legal information, and should
not be construed as legal advice for any
particular situation. The information
provided here should not be relied on
for any action or omission by the user.
 If you are in need of legal advice or
assistance please seek an attorney in
your relevant jurisdiction to help you
with your specific matter.

Purpose
This presentation is mainly to provide
information on laws that may be relevant
or applicable to a business that
conducts interactions online.
 Consider this only a starting point if you
are web retailer, a social media
marketer/consultant, and/or online
service provider.

Limitations on the Purpose
The presentation is only a survey, as
every business is unique, and there may
be further laws and/or regulations that
apply.
 This presentation makes no comment
about applicability to a law to your
specific situation.
 Consult an attorney or specialist for
implementation/compliance purposes.

Outline



1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Each law will be covered briefly on: (a) what is the law;
and (b) an example of its use/applies or steps to comply.
The Ten Laws:
Communications Decency Act (CDA)
Digital Millennium Copyright Act (DMCA)
Children’s Online Privacy Protection Act (COPPA)
Section 5 of the Federal Trade Commission Act
CAN-SPAM Act
Stored Communications Act (SCA)
Computer Fraud and Abuse Act (CFAA)
State Laws on Security Breach Notification
Uniform Electronic Transactions Act (UETA)
Electronic Signatures in Global and National Commerce
Act (E-Sign)
PART I COVERED
Communications Decency Act (CDA)
2. Digital Millennium Copyright Act
(DMCA)
3. Children’s Online Privacy Protection Act
(COPPA)
4. Section 5 of the Federal Trade
Commission Act
5. CAN-SPAM Act
1.
Stored Communications Act
(SCA)


18 U.S.C. §§ 2701-11 prevents the
government from gaining access to the
contents of electronic
communications, unless it obtains a
search warrant. The law is mainly
concerned with the right of service
providers to disclose these
communications under their control.
Stored Communications Act
(SCA)
Businesses should be concerned about the
SCA, as employers may be liable for
unauthorized access to their employees/
personal electronic accounts, including
email, social media, etc . . . via companyissued devices.
 Good tech and social media policies
generally protect employers, but overreach
by an employer should be a concerned
when it comes to personal accounts.

State Laws on Security Breach
Notification
Hawaii Revised Statute (HRS) § 487N-2
provides that a business that maintains
personal information must send a notice
when there has been a security breach
that may expose personal information to
unauthorized access to those affected.
 As of the date of this presentation, 45
other states have similar laws.

State Laws on Security Breach
Notification


The notice has to be clear and conspicuous
and describe the following:
1.
2.
3.

4.
5.



Incident in general terms;
Type of personal info subject to unauthorized
access;
General acts the business is taking to prevent
further unauthorized access;
A telephone number that people can call for info
and help;
Advice that the person should review/monitor
account statements and free credit reports.

The law also provides on how notice may be
sent to affected individuals.
Computer Fraud and Abuse Act
(CFAA)


18 U.S.C. § 1030 makes it a crime to do
specific instructions into another’s
computer – the general ypes of
intrusions that are illegal include:
 Intentional unauthorized access; defrauding;

causing damage to another computer;
trafficking in passwords; and extortion.
Computer Fraud and Abuse Act
(CFAA)
Businesses should be aware as the
CFAA can be used from just ordinary
snooping to cases of industrial and
commercial spying as it gives a private
cause of action for persons harmed by a
violation of the law.
 If the person suffers a loss of $5,000 or
certain types of harm are involved.

Uniform Electronic Transactions Act
(UETA)
UETA and E-Sign (the following side)
are a series of laws that are designed to
promote contracting via electronic
means.
 UETA is a state-enacted law.
 UETA can be found in the HRS at
Chapter 489E.

Electronic Signatures in Global and National
Commerce Act (E-Sign)

E-Sign is the federal law that is meant to
also facilitate contracting through
electronic methods.
 However, E-Sign appleis to transactions
in interstate commerce.
 Further, for consumer transactions to fall
udner E-Sign, there are extensive
consumer-consent procedures to follow.

Online Contracting


In the law, prior to UETA and E-Sign
agreements could only be contractually
binding through signature and if in
writing. BUT the internet has no
handwritten signatures and no physical
writings. Instead, UETA and E-Sign
allows “electronic records” as the
“writing” and an “electronic signature” to
satisfy the “signature” requirement.
Online Contracting
UETA and E-Sign do NOT automatically
make an electronic online document an
enforceable contract.
 All they do is remove the
unenforceability due to lack of
“signature” and “writing”.
 For terms and conditions to be binding
in a browsewrap agreement, a business
should consult with an expert.

Further Resources
My website: www.hawaiiesquire.com
contains further information on some of
the laws listed in this presentation.
 Draw the Law and Boilerplate Blurb
posts on my site cover Contract
concepts.
 Policies and Contracts Presentation:
http://slidesha.re/1ibgjjM

THE END
Mahalo for viewing my presentation.
If you have questions or comments please
email me at ryankhew@hawaiiesquire.com
Like this presentation? Connect with me:
Twitter: @Rkhewesq; Instagram: Rkhewesq
Facebook:
www.facebook.com/RyanKHewEsq
LinkedIn: www.linkedin.com/in/hawaiiesquire
My website & blog: www.hawaiiesquire.com

More Related Content

What's hot

E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and CommerceEndcode_org
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017Downey Law Group LLC
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
New Laws Impacting Judicial Proceedings and Consumers
New Laws Impacting Judicial Proceedings and ConsumersNew Laws Impacting Judicial Proceedings and Consumers
New Laws Impacting Judicial Proceedings and ConsumersKatieDavis103
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commercePrince Sharma
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internetguesta5c32a
 
electronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionelectronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionCaroline B Ncube
 
Countries that have made electronic signatures legal
Countries that have made electronic signatures legalCountries that have made electronic signatures legal
Countries that have made electronic signatures legalDaria Kizilova
 
False Personation aka Identity Theft
False Personation aka Identity TheftFalse Personation aka Identity Theft
False Personation aka Identity Theft- Mark - Fullbright
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)Shawn Tuma
 
E contracts busines law
E contracts busines lawE contracts busines law
E contracts busines lawBabasab Patil
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsCaroline B Ncube
 
Internet Law: An Expedition
Internet Law: An ExpeditionInternet Law: An Expedition
Internet Law: An ExpeditionShawn Tuma
 
Comparision FCBA and UKBA
Comparision FCBA and UKBAComparision FCBA and UKBA
Comparision FCBA and UKBAShehroz Adil
 
E contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaE contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaKajalRandhawa
 

What's hot (20)

E-contracting and Commerce
E-contracting and CommerceE-contracting and Commerce
E-contracting and Commerce
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
Ethics at Sunrise program - Missouri Bar CLE 5-2017
Ethics at Sunrise program - Missouri Bar CLE  5-2017Ethics at Sunrise program - Missouri Bar CLE  5-2017
Ethics at Sunrise program - Missouri Bar CLE 5-2017
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
New Laws Impacting Judicial Proceedings and Consumers
New Laws Impacting Judicial Proceedings and ConsumersNew Laws Impacting Judicial Proceedings and Consumers
New Laws Impacting Judicial Proceedings and Consumers
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Legal Matters in E-commerce
Legal Matters in E-commerceLegal Matters in E-commerce
Legal Matters in E-commerce
 
Protecting your business
Protecting your businessProtecting your business
Protecting your business
 
electronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introductionelectronic transactions law lecture series: lecture 1 introduction
electronic transactions law lecture series: lecture 1 introduction
 
Countries that have made electronic signatures legal
Countries that have made electronic signatures legalCountries that have made electronic signatures legal
Countries that have made electronic signatures legal
 
False Personation aka Identity Theft
False Personation aka Identity TheftFalse Personation aka Identity Theft
False Personation aka Identity Theft
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)
 
E contracts busines law
E contracts busines lawE contracts busines law
E contracts busines law
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Electronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contractsElectronic Transactions Law - Lecture 3: contracts
Electronic Transactions Law - Lecture 3: contracts
 
Internet Law: An Expedition
Internet Law: An ExpeditionInternet Law: An Expedition
Internet Law: An Expedition
 
Comparision FCBA and UKBA
Comparision FCBA and UKBAComparision FCBA and UKBA
Comparision FCBA and UKBA
 
E contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaE contracts and validity of e contracts in India
E contracts and validity of e contracts in India
 

Similar to Ten Laws Internet Businesses Should Consider Part II

Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Privacy, Policy, and Encryption
Privacy, Policy, and EncryptionPrivacy, Policy, and Encryption
Privacy, Policy, and Encryptionaccessnowinc
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryptionNeoCertified
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
 
What to expect from the New York Privacy Act
What to expect from the New York Privacy ActWhat to expect from the New York Privacy Act
What to expect from the New York Privacy ActVISTA InfoSec
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docx
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docxFCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docx
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docxmydrynan
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
Getting the Deal Through "e-Commerce 2014"
Getting the Deal Through "e-Commerce 2014"Getting the Deal Through "e-Commerce 2014"
Getting the Deal Through "e-Commerce 2014"Angela Vásquez Oliver
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationJason Hoeppner
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4danc752
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 

Similar to Ten Laws Internet Businesses Should Consider Part II (19)

Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Privacy, Policy, and Encryption
Privacy, Policy, and EncryptionPrivacy, Policy, and Encryption
Privacy, Policy, and Encryption
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
What to expect from the New York Privacy Act
What to expect from the New York Privacy ActWhat to expect from the New York Privacy Act
What to expect from the New York Privacy Act
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docx
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docxFCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docx
FCS 3450 HOMEWORK #41.Thomas Franklin arrived at the following t.docx
 
Legal Aspect
Legal AspectLegal Aspect
Legal Aspect
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
Internet
InternetInternet
Internet
 
Getting the Deal Through "e-Commerce 2014"
Getting the Deal Through "e-Commerce 2014"Getting the Deal Through "e-Commerce 2014"
Getting the Deal Through "e-Commerce 2014"
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 

Recently uploaded

Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 

Recently uploaded (20)

Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 

Ten Laws Internet Businesses Should Consider Part II

  • 1. PART II: Laws 6 – 10 Presented by Ryan K. Hew, Attorney at Law, LLLC A Hawaii Limited Liability Law Company Last updated: October 23, 2013
  • 2. DISCLAIMER The information provided in this presentation is provided as non-specific general legal information, and should not be construed as legal advice for any particular situation. The information provided here should not be relied on for any action or omission by the user.  If you are in need of legal advice or assistance please seek an attorney in your relevant jurisdiction to help you with your specific matter. 
  • 3. Purpose This presentation is mainly to provide information on laws that may be relevant or applicable to a business that conducts interactions online.  Consider this only a starting point if you are web retailer, a social media marketer/consultant, and/or online service provider. 
  • 4. Limitations on the Purpose The presentation is only a survey, as every business is unique, and there may be further laws and/or regulations that apply.  This presentation makes no comment about applicability to a law to your specific situation.  Consult an attorney or specialist for implementation/compliance purposes. 
  • 5. Outline   1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Each law will be covered briefly on: (a) what is the law; and (b) an example of its use/applies or steps to comply. The Ten Laws: Communications Decency Act (CDA) Digital Millennium Copyright Act (DMCA) Children’s Online Privacy Protection Act (COPPA) Section 5 of the Federal Trade Commission Act CAN-SPAM Act Stored Communications Act (SCA) Computer Fraud and Abuse Act (CFAA) State Laws on Security Breach Notification Uniform Electronic Transactions Act (UETA) Electronic Signatures in Global and National Commerce Act (E-Sign)
  • 6. PART I COVERED Communications Decency Act (CDA) 2. Digital Millennium Copyright Act (DMCA) 3. Children’s Online Privacy Protection Act (COPPA) 4. Section 5 of the Federal Trade Commission Act 5. CAN-SPAM Act 1.
  • 7. Stored Communications Act (SCA)  18 U.S.C. §§ 2701-11 prevents the government from gaining access to the contents of electronic communications, unless it obtains a search warrant. The law is mainly concerned with the right of service providers to disclose these communications under their control.
  • 8. Stored Communications Act (SCA) Businesses should be concerned about the SCA, as employers may be liable for unauthorized access to their employees/ personal electronic accounts, including email, social media, etc . . . via companyissued devices.  Good tech and social media policies generally protect employers, but overreach by an employer should be a concerned when it comes to personal accounts. 
  • 9. State Laws on Security Breach Notification Hawaii Revised Statute (HRS) § 487N-2 provides that a business that maintains personal information must send a notice when there has been a security breach that may expose personal information to unauthorized access to those affected.  As of the date of this presentation, 45 other states have similar laws. 
  • 10. State Laws on Security Breach Notification  The notice has to be clear and conspicuous and describe the following: 1. 2. 3. 4. 5.  Incident in general terms; Type of personal info subject to unauthorized access; General acts the business is taking to prevent further unauthorized access; A telephone number that people can call for info and help; Advice that the person should review/monitor account statements and free credit reports. The law also provides on how notice may be sent to affected individuals.
  • 11. Computer Fraud and Abuse Act (CFAA)  18 U.S.C. § 1030 makes it a crime to do specific instructions into another’s computer – the general ypes of intrusions that are illegal include:  Intentional unauthorized access; defrauding; causing damage to another computer; trafficking in passwords; and extortion.
  • 12. Computer Fraud and Abuse Act (CFAA) Businesses should be aware as the CFAA can be used from just ordinary snooping to cases of industrial and commercial spying as it gives a private cause of action for persons harmed by a violation of the law.  If the person suffers a loss of $5,000 or certain types of harm are involved. 
  • 13. Uniform Electronic Transactions Act (UETA) UETA and E-Sign (the following side) are a series of laws that are designed to promote contracting via electronic means.  UETA is a state-enacted law.  UETA can be found in the HRS at Chapter 489E. 
  • 14. Electronic Signatures in Global and National Commerce Act (E-Sign) E-Sign is the federal law that is meant to also facilitate contracting through electronic methods.  However, E-Sign appleis to transactions in interstate commerce.  Further, for consumer transactions to fall udner E-Sign, there are extensive consumer-consent procedures to follow. 
  • 15. Online Contracting  In the law, prior to UETA and E-Sign agreements could only be contractually binding through signature and if in writing. BUT the internet has no handwritten signatures and no physical writings. Instead, UETA and E-Sign allows “electronic records” as the “writing” and an “electronic signature” to satisfy the “signature” requirement.
  • 16. Online Contracting UETA and E-Sign do NOT automatically make an electronic online document an enforceable contract.  All they do is remove the unenforceability due to lack of “signature” and “writing”.  For terms and conditions to be binding in a browsewrap agreement, a business should consult with an expert. 
  • 17. Further Resources My website: www.hawaiiesquire.com contains further information on some of the laws listed in this presentation.  Draw the Law and Boilerplate Blurb posts on my site cover Contract concepts.  Policies and Contracts Presentation: http://slidesha.re/1ibgjjM 
  • 18. THE END Mahalo for viewing my presentation. If you have questions or comments please email me at ryankhew@hawaiiesquire.com Like this presentation? Connect with me: Twitter: @Rkhewesq; Instagram: Rkhewesq Facebook: www.facebook.com/RyanKHewEsq LinkedIn: www.linkedin.com/in/hawaiiesquire My website & blog: www.hawaiiesquire.com