Public Policy: From Legal Issues To Privacy: © Prentice Hall, 2000
Public Policy: From Legal Issues To Privacy: © Prentice Hall, 2000
Public Policy:
From Legal Issues to Privacy
Learning Objectives
List and describe the major legal issues related
to electronic commerce
Understand the difficulties of protecting privacy
and describe the measures taken by companies
and individuals to protect it
Describe the intellectual property issues in EC
and the measures provided for its protection
Free Speech
Internet provides the largest opportunity for free speech
Taxation
Illegal to impose new sales taxes on Internet business
at the present time
Consumer Protection
Many legal issues are related to electronic trade
Prentice Hall, 2000
Ethical Issues
What is considered to be right and wrong?
What is unethical is not necessarily illegal.
Whether these actions are considered
unethical depends on the organization,
country, and the specific circumstances
surrounding the scenarios.
Prentice Hall, 2000
Property
Collection, storage,
and dissemination of
information about
individuals
Accuracy
Ownership and
value of information
and intellectual
property
Accessibility
Authenticity,
fidelity, and
accuracy of
information
collected and
processed
Right to access
information and
payment of fees to
access it
Protecting Privacy
Privacy
The right to be left alone and the right to
be free of unreasonable personal
intrusions
Information Privacy
The claim of individuals, groups, or
institutions to determine for themselves
when, and to what extent, information
about them is communicated to others
Prentice Hall, 2000
10
Web-Site Self-Registration
Registration Questionnaires
type in private information in order to
receive a password to participate in a
lottery, to receive information, or to play
a game
11
12
Cookies
Piece of information that allows a Web
site to record ones comings and goings
Web sites can remember information about
users and respond to their preferences on a
particular site, process is transparent to users
Web sites can maintain information on a
particular user across HTTP connections
13
Cook (cont.)
Cookies
Solutions to cookies
users can delete cookie files stored in their computer
use of anti-cookie software (e.g. Cookie Cutter and Anonymous
Cookie)
Prentice Hall, 2000
14
Privacy Protection
5 basic principles
Notice/Awareness Customers must be given notice and be
able to make informed decisions.
15
16
Legislation
The Consumer Internet Privacy Act
The Federal Internet Privacy Protection
Act
The Communications Privacy and
Consumer Empowerment Act
The Data Privacy Act
17
18
Data Confidentiality
Computer security procedures
should be implemented to provide
reasonable assurance against
unauthorized disclosure of data.
Third parties should not be
given access to data without the
individuals knowledge or
permission, except as required by
law.
Disclosures of data, other than
the most routine, should be noted
and maintained for as long as the
data are maintained.
Data should not be disclosed
for reasons incompatible with the
business objective for which they
are collected.
19
Trade Secret
Intellectual work such as a business plan, which
is a company secret and is not based on public
information
Patent
A document that grants the holder exclusive
rights on an invention for 17 years
Prentice Hall, 2000
20
21
Legal Perspectives
Electronic Theft (NET) Act
imposed criminal liability for individuals who reproduce
or distribute copies of copyrighted works even if no
commercial advantage or financial gain exists
22
23
24
Domain Names
Two controversies
Whether top-level domain names
(similar to com, org and gov) should be
added
The use of trademark names by
companies for domain names that
belong to other companies
Prentice Hall, 2000
25
26
27
28
29
Indecency
any comment, request, suggestion, proposal, image, or
other communication that, in context, depicts or describes,
in terms patently offensive as measured by contemporary
community standards, sexual or excretory activities or
organs
30
Protecting Children
3 approaches (regarding the protection of children
from inappropriate material on the Internet)
No information should be held back and parents
should be responsible for monitoring their own
children
The government is the only one who can truly
protect children from this material
To hold the Internet providers responsible for all
the material and information they provide
31
32
33
Controlling Spamming
What is spamming, why is it bad?
Spamming
the practice of indiscriminate distribution of messages (for
example junk mail) without permission of the receiver and
without consideration for the messages appropriateness
34
35
36
Taxation Policies
The Taxation Exemption Debate
Internet Tax Freedom Act (8 Oct,98)
promotes electronic commerce through tax incentives by
barring any new state or local sales taxes on Internet
transactions during the next three years
Electronic commerce industries
Non-electronic commerce industries
Applying existing law to new
The Internet businesses must pay its fair
mediums of exchange is far more
share of the bill for the nations social
difficult than ever imagined. The
and physical infrastructure. They feel
global nature of business today
that the Internet industries are not pulling
suggests that cyberspace be
their own weight. These companies are
considered a distinct tax zone unto
screaming that the same situation exists
itself with unique rules and
in the mail order business and that there
considerations befitting the stature
are sufficient parallels to warrant similar
of the environment.
legal considerations.
Prentice Hall, 2000
37
38
38
Encryption Policy
The 128-BIT Encryption Debate
Export 128-bit encryption is 3.09X10 to the 26th
power times more difficult to decipher than the
preceding legally exportable technology.
Secure e-commerce
For the past 20 years
there was a limitation
on exported encryption
devices of 56 bit codes
39
Business View
EFF (Electronic Frontier Foundation) believes that
software, networked communications and cryptography
industries are suffering
Prentice Hall, 2000
40
Electronic Contracts
Uniform Electronic Transactions Act
Provides the means to effectuate transactions
accomplished through an electronic medium
42
Click-wrap contracts
The software vendor offers to sell or license the use of the
software according to the terms accompanying the software
The buyer agrees to be bound by the terms based on
certain conduct
Prentice Hall, 2000
43
Other Fraud in EC
Customers may
receive poor quality products and services
not get products in time
be asked to pay for things they assume will be paid for by sellers
Prentice Hall, 2000
44
45
Buyer Protection
Tips for safe electronic shopping
Look for reliable brand names at sites.
Search any unfamiliar site for address and
phone and fax number. Call up and quiz a person
about the sellers.
Check the seller with the local Chamber of
Commerce, Better Business Bureau, or TRUSTe
as described later.
Investigate how secure the sellers site is and
how well it is organized.
Prentice Hall, 2000
46
Buyer Protection
Examine the money-back guarantees,
warranties, and service agreements.
Compare prices to those in regular stores; toolow prices may be too good to be true.
Ask friends what they know. Find testimonials
and endorsements.
Find out what you can do in case of a dispute.
Consult the National Fraud Information Center.
Check www.consumerworld.org
Do not forget the you have shoppers rights.
Prentice Hall, 2000
47
48
Authentication
If authentication can be solved ..
students will be able to take exams online
fraud of recipients of government entitlements and
other payments will be reduced to a bare minimum
buyers will be assured who the sellers are and
sellers will know who the buyers are with a very high
degree of confidence
arrangements will be made so that only authorized
people in companies can place purchasing orders
interviews for employment, possible marriage, and
other matching applications will be accurate
trust in your partners and in EC in general will
increase significantly
Prentice Hall, 2000
49
Biometrics Controls
Photo of face
Fingerprints
Hand geometry
Blood vessel pattern in the retina of a
persons eye
Voice
Signature
Keystroke dynamics
Prentice Hall, 2000
50
Seller Protection
Sellers must be protected against:
Use of their names by others
Use of their unique words and phrases, names, and
slogans and their web addresses
Dealing with customers that deny that they placed
an order
Several other potential legal issues are related to
sellers protection
Customers downloading copyrighted software
and/or knowledge and selling it to others
Not being properly paid for products and services
provided
Prentice Hall, 2000
51
Managerial Issues
Multinational corporations face different cultures in the
different countries in which they are doing business
Issues of privacy, ethics, and so on may seem to be
tangential to running a business, but ignoring them
may hinder the operation of many organizations
The impact of electronic commerce and the Internet
can be so strong that the entire manner in which
companies do business will be changed, with
significant impacts on procedures, people,
organizational structure, management, and business
processes
Prentice Hall, 2000
52