Вы находитесь на странице: 1из 44

Chapter 10

Public Policy: From Legal Issues to Policy

www.prestonians.webnode.com

Legal and Ethical Issues


Privacy Intellectual Property
Difficult to protect since it is easy and inexpensive to copy and disseminate digitized information

Free Speech
Internet provides the largest opportunity for free speech; but, some postings are offensive to people

Taxation
Illegal to impose new sales taxes on Internet business at the present time (U.S. and some other countries)
www.prestonians.webnode.com 2

Legal and Ethical Issues (cont.)


Computer crimes
Usually refers to computer fraud and computer abuse

Consumer Protection
Many legal issues are related to electronic trade

Other legal issues


Validity of contracts, legality of public key encryption infrastructures, jurisdiction over trades, encryption policies
www.prestonians.webnode.com 3

Ethical Issues
What is considered to be right and wrong? What is unethical is not necessarily illegal. Whether these actions are considered unethical depends on the organization, country, and the specific circumstances surrounding the scenarios.

www.prestonians.webnode.com

Ethical Issues (cont.)


Code of Ethics
A collection of principles intended as a guide for its members Many companies and professional organizations develop their own codes of ethics A guide for members of a company or an association
www.prestonians.webnode.com 5

A Framework for Ethical Issues


Privacyregarding information about individuals
Collection Storage Dissemination

Property
Ownership and value of information and intellectual property
www.prestonians.webnode.com 6

A Framework for Ethical Issues (cont.)


Accuracy of:
Authenticity Fidelity Information collected and processed

Accessibility
Right to access information Payment of fees for the access

www.prestonians.webnode.com

Protecting Privacy
Privacy
The right to be left alone and the right to be free of unreasonable personal intrusions

Information Privacy
The claim of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others

www.prestonians.webnode.com

Protecting Privacy (cont.)


Two basic rules
The right of privacy is not absolute. Privacy must be balanced against the needs of society The public's right to know is superior to the individuals right of privacy

www.prestonians.webnode.com

How is Private Information Collected?


Reading your newsgroups postings
Finding you in the Internet Directory

Making your browser record information about you Recording what your browsers say about you Reading your e-mail
www.prestonians.webnode.com 10

Protecting Your Privacy


Think before you give out personal information on a site Track the use of your name and information Keep your newsgroups posts out of archives Use the Anonymizer when browsing Live without cookies

Use anonymous remailers Use encryption Reroute your mail away from your office Ask your ISP or employer about a privacy policy

www.prestonians.webnode.com

11

Legislation
The Consumer Internet Privacy Act The Federal Internet Privacy Protection Act The Communications Privacy and Consumer Empowerment Act The Data Privacy Act

www.prestonians.webnode.com

12

Personal Information in Databases


Databases of:
Banks and financial institutions Cable TV Telephones Employers Schools Insurance companies Online vendors
www.prestonians.webnode.com 13

Personal Information in Databases (cont.)


Concerns Data collection Data accuracy Data confidentiality

www.prestonians.webnode.com

14

Protecting Intellectual Property


Copyright
A statutory grant that provides the creators of intellectual property with ownership of it for 28 years

Trade Secret
Intellectual work such as a business plan, which is a company secret and is not based on public information

Patent
A document that grants the holder exclusive rights on an invention for 17 years (U.S.)
www.prestonians.webnode.com 15

Copyrights
Protects original expression of ideas
Literary works Musical works Dramatic works Artistic works Sound recordings, films, broadcasts, cable programs Published editions of literary and musical works
www.prestonians.webnode.com

16

Copyright Protection Techniques


Digital watermarks
Embedding of invisible marks Can be represented by bits in digital content Hidden in the source data, becoming inseparable from such data

www.prestonians.webnode.com

17

International Aspects of Intellectual Property


The World Intellectual Property Organization
More than 60 member countries come up with an international treaty Part of the agreement is called the database treaty Its aim is to protect the investment of firms that collect and arrange information

www.prestonians.webnode.com

18

Patents
Patenta document that grants the holder
Satisfy following legal criteria
Noveldoes not already exist as part of the public domain Involves sufficiently inventive step Capable of individual application (be put to practical use)
exclusive rights on an invention for 17 years

www.prestonians.webnode.com

19

Trademarks
Trademarksgraphical sign used by businesses to identify their goods and services Gives exclusive rights to:
Use trademark on goods and services registered to that sign Take legal action to prevent anyone from using trademark without consent

www.prestonians.webnode.com

20

Domain Names
Domain name refers to the upper category of Internet address (URL) Three controversies
Whether top-level domain names (similar to com, org and gov) should be added The use of trademark names by companies for domain names that belong to other companies If companies in different countries have the same name, who can use it as the domain name?
www.prestonians.webnode.com 21

Defining Freedom of Speech


The Bill of Rights First Amendment to the Constitution of the U.S. of America reads:
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

www.prestonians.webnode.com

22

The Debate About Free Speech on the Internet


Free speech debate
Most citizens are implacably opposed to censorship in any form except censorship of whatever they personally happen to find offensive. The debate: what restrictions, if any, should there be on Internet content, and how should it be monitored?

www.prestonians.webnode.com

23

The Debate About Free Speech on the Internet (cont.)


What are the boundaries, and how should they be enforced?
Governments protective of their role in society Parents concerned about exposing their children to inappropriate Web pages and chat rooms Federal agencies attempting to deal with illegal actions Citizen action groups desiring to protect every ounce of their freedom to speak Individuals concerned about their right to information on the Internet Organizations seeking to empower the citizens of the earth
www.prestonians.webnode.com 24

Protecting Children
3 approaches (regarding the protection of
children from inappropriate material on the Internet) No information should be held back and parents should be responsible for monitoring their own children The government is the only one who can truly protect children from this material To hold the Internet providers responsible for all the material and information they provide, or enable access to it
www.prestonians.webnode.com 25

Protecting Children (cont.)

Parents governing their own children Government protecting the children Responsibility of the Internet providers Forcing Internet providers to be accountable, or enable access to information

www.prestonians.webnode.com

26

Legal Perspectives in the USA

Child Online Protection Act Internet Tax Freedom Act Family Friendly Internet Access Act Internet Protection Act Internet School Filtering Act

www.prestonians.webnode.com

27

Controlling Spamming
What is spamming, why is it bad?
Spamming
The practice of indiscriminate distribution of messages (for example junk mail) without permission of the receiver and without consideration for the messages appropriateness

Spam comprised 30% of all mail sent on America Online (in the past, now less than 10%) Slows the internet in general Shuts ISPs down completely

www.prestonians.webnode.com

28

Controlling Spamming (cont.)


Legislation, Legal
The The The The Electronic Mailbox Protection Act Unsolicited Commercial Electronic Mail Act Netizens Protection Act Telephone Consumer Protection Act

www.prestonians.webnode.com

29

Controlling Spamming (cont.)


How to cut spamming
Tell users not to validate their addresses by answering spam requests for replies if they want to be taken off mailing lists Disable the relay feature on SMTP (mail) servers so mail cannot be bounced off the server Delete spam and forget it its a fact of life and not worth wasting time over Use software packages, e.g. getlost.com and junkbusters.com
www.prestonians.webnode.com 30

Other Legal Issues


What are the rules of electronic contracting, and whose jurisdiction prevails when buyers, brokers, and sellers are in different states and/or countries? How can gambling be controlled on the Internet? Gambling is legal in Nevada and other states. How can the winners tax be collected? By whom? When are electronic documents admissible evidence in the courts of law? What do you do if they are not?
www.prestonians.webnode.com 31

Other Legal Issues (cont.)


Time and place can carry different dates for the buyers and sellers when they are across the ocean. Which time should be considered? Is a digital signature legal? The use of multiple networks and trading partners makes the documentation of responsibility difficult. How is such a problem overcome?

www.prestonians.webnode.com

32

Electronic Contracts
Uniform Electronic Transactions Act Uniform Commercial Code (UCC) Shrink-wrap agreements (or box-top licenses)
The user is bound to the license by opening the package

www.prestonians.webnode.com

33

Computer Crimes
Computer crimes refers to computer fraud and/or computer abuse Computer fraud committed by:
Alteration of input Alteration of computer data Alteration/misuse of programs Destruction/suppression/misappropriation of output
www.prestonians.webnode.com 34

Computer Crimes (cont.)


Computer abuse committed by:
Misuse of company computer service/resources by performing unauthorized private work or playing games by employees Compromise of system integrity by:
Altering company data Introducing viruses Hacking into the system
www.prestonians.webnode.com

35

Computer Crimes (cont.)


Characteristics of computer crime
Chronic underreporting of abuse Security not introduced until abuse has occurred Organizational size unrelated to severity of punishment Abuses by high-level employees less likely to be prosecuted Programmers most difficult to identify Publicity discourages abuse Security efforts reduce abuse
www.prestonians.webnode.com 36

Computer Crimes (cont.)


Effective measures in deterring computer crime
Make computer security visible Define and communicate companys policy regularly Make staff aware of penalties Report cases to police Publicize successful prosecution Deploy security technologies extensively
www.prestonians.webnode.com 37

Fraud on the Internet


Internet Stocks Fraud
SEC brought charges against 44 companies and individuals who illegally promoted stocks on computer bulletin boards, online newsletters and investment Web sites

Other Financial Fraud


Selling bogus investments, phantom business opportunities, and other fraud schemes

www.prestonians.webnode.com

38

Fraud on the Internet (cont.)


Other Fraud in EC
Customers may: Receive poor quality products and services Not get products in time Be asked to pay for things they assume will be paid for by sellers

www.prestonians.webnode.com

39

Authentication
If authentication online can be verified
Students will be able to take exams online from home Fraud of recipients of government entitlements and other payments will be reduced to a bare minimum Buyers will be assured who the sellers are and sellers will know who the buyers are with a very high degree of confidence
www.prestonians.webnode.com 40

Biometric Controls
Matching against a template:
Photo of face Fingerprints Hand geometry Blood vessel pattern in the retina of a persons eye Voice Signature Keystroke dynamics Iris
www.prestonians.webnode.com 41

What Can Vendors Do?


Use intelligent software that signals questionable customers Develop a list of warning signals for possibly fraudulent transactions Ask customers to have shipping address added to their bank account if different from billing address
www.prestonians.webnode.com 42

Managerial Issues
Multinational corporations face different cultures in the different countries in which they are doing business Issues of privacy, ethics, and so on may seem to be tangential to running a business, but ignoring them may hinder the operation of many organizations

www.prestonians.webnode.com

43

Managerial Issues (cont.)


The impact of EC and the Internet can be so strong that the entire manner in which companies do business will be changed, with significant impacts on:
Procedures People Organizational structure Management Business processes
www.prestonians.webnode.com 44

Вам также может понравиться