the presentation is about the e commerce its trade and its copy rights. Moreover it also includes the issues concern in e commerce. it has also include the privacy and data protection information.
E commerce law, copy rights of e commerce law, trade mark of e -commerce, privacy and data protection
1.
2.
3. With government agencies.
Section 8 of the Act provides a transaction will not be
invalid because it took place electronically and that
certain requirements imposed by common wealth law.
The sections that follow cover the requirements to:
Give information in writing (Sec 9)
Provide a signature (Sec 10)
Produce a document ( Sec 11)
Record Information (Sec 12 (1))
Retain a Document (Sec 12(2))
4. DIFFERENCE BETWEEN ELECTRONIC AND DIGITAL
SIGNATURE.
A digital signature is a subset of the electronic signature. It
will be attached to data such as a computer file, a webpage
or an email. It permits the authentication of the data .
SPECIFIC CONTRACT ISSUES IN THE ONLINE
ENVIRONMENT.
E-COMMERCE AND AGENCY
CONSUMER PROTECTION
Guidance on the following matters.
5. Fair business and Practices.
Accessibility.
Disability access.
Advertising and Marketing.
Engaging with Minors.
Providing Information.
Privacy.
Payment.
Concluding the Contract.
Security and authentication.
Complaint Handling.
Dispute Resolution.
6. There are some specific issues that arise regarding
copyright material in the electronic environment . If
material appears on a website whether it is print, a
musical work, a photograph or a film clip, it is processed
by copyright law.
There may be infringement of copyright if:
A website is copied or hypertext links to other sites
are created.
Material is scanned from a website and posted to
another site.
Songs that are copyright are downloaded and stored
on a particular site.
7. It is possible to register a website or domain name as a
trade mark, The name then receives the protection
afforded by the Trade Marks (1995).
CYBER STUFFING
Cyber stuffing is the practice of embedding meta tags in
the website. Meta tags are tags in HTML coded placed
around specific information, which can be picked up by
search engines to provide keyword information about
the contents of a website and rank the site in order of
relevance. A website stuffed with meta tags will have a
high relevance to most search queries.
8. The privacy act 1988 provides privacy protection for the
private sector. Privacy is relevant to the electronic
environment . The Provisions of this legislation apply
equally to website operators that fall with in the
definition of an organization under the legislation. If an
organization collects personal information online it must
sure it compiles with the privacy legislation.
ELECTRONIC BANKING
1. Electronic funds transfer system (EFTS)
2. Automatic teller machine transfers.
3. Direct credit and direct debit transfer.
9. 1. Paper Free Banking.
2. Point of sale Transfers.
3. Smarts cards
4. Transfer initiated by Telephone.
ECOMMERCE AND CRIME.
With the advent of digital technology computer crime
has emerged. Narrowly defined this term would be
confirmed to crimes where the computer has been the
perpetrator. Computer crime is much broader than this it
includes crimes where computers are:
10. Are the object of crime.
Are the instrument used to carry out the crime.
Provide the environment required for the commission of
the crime.
Provide a symbol of a system or set of circumstances
that facilities perpetration of the crime.