Академический Документы
Профессиональный Документы
Культура Документы
Ethical, Legal,
and Social
Responsibilities in
E-Commerce
Chapter 1
Ethical, Legal, and Social
Responsibilities in E-Commerce
Section
1-1
Section
1-2
Section
1-3
Internet Security
Section 6-1
Why Its Important
cyberlaw
copyright
Section 6-1
Section 1-1
Key Terms
trademark
patent
Cyberlaw
Section 6-1
cyberlaw an evolving
legal framework that
governs Internet
activities; covers topics
ranging from copyright
infringement to e-mail
privacy, identity theft,
and interstate
e-commerce
Cyberlaw
copyright a form of
protection provided by
U.S. law that grants
exclusive rights for the
original works of an
author
Cyberlaw
Section 6-1
Cyberlaw
Section 6-1
Cyberlaw
Section 6-1
10
Cyberlaw
11
Cyberlaw
Section 6-1
12
Cyberlaw
Section 6-1
13
Ethical Considerations on
the Internet
Section 6-1
14
Ethical Considerations on
the Internet
15
Section 1-1
Review
1.
2.
3.
4.
Section 6-1
16
Section 1-2
Why Its Important
Section 6-2
17
Section 1-2
Key Terms
privacy policy
Electronic Communications
Privacy Act of 2000
spam
Section 6-2
18
Online Privacy
19
Online Privacy
Section 6-2
20
Privacy Policy
Section 6-2
privacy policy a
written, legally binding
statement informing
users about how their
personal information will
be managed and
maintained
21
Privacy Policy
Section 6-2
22
Privacy Policy
Section 6-2
23
Privacy Policy
Section 6-2
Electronic
Communications
Privacy Act of 2000
legislation that allows
companies to monitor an
employees e-mail if either
the sender or the recipient
has given consent or the
organization can
demonstrate a reason why
the company and/or its
employees could be
harmed by the electronic
communication
24
Privacy Policy
Section 6-2
25
Privacy Policy
Section 6-2
26
Privacy Policy
spam unsolicited
junk e-mail sent by
companies to potential
customers
27
Privacy Policy
Section 6-2
28
Section 1-2
Review
1.
2.
3.
4.
Section 6-2
29
Section 1-3
Why Its Important
Section 6-3
30
hacker
cybersquatter
firewall
Internet filter
Section 6-3
Section 1-3
Key Terms
encryption
virus
worms
logic bomb
31
Digital Protection
Section 6-3
32
Security of Data
Section 6-3
33
Security of Data
Section 6-3
34
Security of Data
Another problem
e-businesses face is
cybersquatters.
Section 6-3
cybersquatter person
who registers domain
names of well-known
companies or individuals
with the sole purpose of
selling the names back to
the rightful owners to
make a profit
35
Security of Data
Section 6-3
36
Security of Data
Section 6-3
firewall a combination
of hardware and software
used to block potential
hackers from gaining
access to a computer
system
37
Security of Data
Section 6-3
38
Security of Data
Section 6-3
encryption the
scrambling of data from
plain text into code once
it is sent from a computer
39
Security of Data
How to Know If a Connection Is Encrypted
The http portion of the Web
page address will read
https. The s indicates that
the page is secure.
A small gold padlock will
appear in the bottom-righthand corner of your browser
window.
Section 6-3
40
Security of Data
Section 6-3
41
Security of Data
Antivirus software is
designed to monitor and
eliminate viruses.
Section 6-3
42
Security of Data
Section 6-3
43
Security of Data
Section 6-3
logic bomb
programming code
added to a software
program that lies
dormant until a
predetermined period of
time passes or an event
occurs, triggering the
typically malicious code
into action; also called
slag code
44
Section 1-3
Review
Section 6-3
45
End of
1
Ethical, Legal,
and Social
Responsibilities in
E-Commerce