Outline 11.1 Introduction 11.2 Legal Issues: Privacy on the Internet 11.2.1 Right to Privacy 11.2.2 Internet and the Right to Privacy 11.2.3 Network Advertising Initiative 11.2.4 Employer and Employee 11.2.5 Protecting Yourself as a User 11.2.6 Protecting Your Business: Privacy Issues 11.3 Legal Issues: Other Areas of Concern 11.3.1 Defamation 11.3.2 Sexually Explicit Speech 11.3.3 Children and the Internet 11.3.4 Alternative Methods of Regulation 11.3.5 Intellectual Property: Copyrights and Patents 11.3.6 Trademark and Domain Name Registration
11.4 11.5
11.1 Introduction
Real space
Our physical environment consisting of temporal and geographic boundaries
Cyberspace
The realm of digital transmission not limited by geography
Translation
Interpreting the Constitution to protect the greater good
NAI currently represents 90 percent of Web advertisers Determines the proper protocols for managing a Web users personal information on the Internet Prohibits the collection of consumer data from medical and financial sites Allows the combination of Web-collected data and personal information
2001 Prentice Hall, Inc. All rights reserved.
Digital redlining
Skewing of an individuals knowledge of available products by basing the advertisements the user sees on past behavior
Company time and company equipment vs. the rights of employees Determining factors
Reasonable expectation of privacy Legitimate business interests
Public policy
Reprimanding an employee called for jury duty Denial of employment as a result of previous convictions
TRUSTe
11.3.1 Defamation
Defamation
The act of injuring anothers reputation, honor or good name through false written or oral communication
Libel
Defamatory statements written or spoken in a context in which they have longevity and pervasiveness that exceed slander
11.3.1 Defamation
Slander
Spoken defamation
Proving defamation
The statement must have been published, spoken or broadcast There must be identification of the individual(s) through name or reasonable association The statement must be defamatory There must be fault There must be evidence of injury
11.3.1 Defamation
Good Samaritan provision, Section 230 of the Telecommunications Act
Protects ISPs from defamation lawsuits when the ISPs attempt to control potentially damaging postings Obscene, lewd, lascivious, filthy, excessively violent, harassing or otherwise objectionable"
11.3.1 Cubby vs. Compuserve and Stratton Oakmont vs. Prodigy Feature
Cubby vs. Compuserve
Anonymous individual used a news service hosted by Compuserve to post an allegedly defamatory statement
Chilling effect
Limiting speech to avoid a lawsuit
Net Nanny home page. (Courtesy of Net Nanny Software International, Inc.)
2001 Prentice Hall, Inc. All rights reserved.
Napster
Operates as a centralized service Offers software that allows users to download MP3 files from the hard drives of other members
Gnutella
Operates as a decentralized service Individuals with Gnutella software installed on their computers operate as both a client and a server
2001 Prentice Hall, Inc. All rights reserved.
LaMachhia did not profit from the copyright violations LaMacchia was not convicted for his actions
Cybersquatter
Buys an assortment of domain names that are obvious representations of a brick-and-mortar company
E-
Cost is primarily incurred by the receiver and the ISP Organizations distributing spam
Maintain anonymity and receivers cannot request to be taken off the organizations mailing list Present themselves as a legitimate company and damage the legitimate companys reputation
Shill bidding
Sellers bid for their own items to increase the bid price
2001 Prentice Hall, Inc. All rights reserved.
Click-through agreement
A pop-up screen to which users must agree before they can continue
Depending on their presentation, these types of agreements can be considered valid by the U. S. courts
2001 Prentice Hall, Inc. All rights reserved.
11.4 Cybercrime
Auctions, chat rooms and bulletin boards are among the most popular forums for illegal activities Viruses, which often lead to denial of service or a loss of stored information, are among the most common cybercrimes Stock scams
Crimes in which individuals purchase stocks, then present false claims about the value of that stock in chat rooms or on bulletin boards to sell them back at a higher price
11.4 Cybercrime
11.4 Cybercrime
Taxation methods
If both a vendor and a consumer are located in the same state sales tax is applied If the vendor and the consumer are not located in the same state, then the sale is subject to a use tax If the vendor has a physical presence, or nexus, then it is required to collect the tax; otherwise the vendor must assess the tax and pay it directly to the state