MGMT Chapter 9

Ace your homework & exams now with Quizwiz!

Internet Law

Deals with unsolicited email, domain names, and cybersquatting

Administrative Agency Investigation

Federal regulators use social media posts in their investigations into illegal activities

Spam

Spam is considered "junk email" that virtually floods mailboxes with ads, etc. Serious problem now; spam accounts are now 75% of all emails

The Eletronic Communications Privacy Act

(ECPA) prohibits any intentional interception of any wire, oral, or electronic communication. It also prohibits the intentional disclosure of the intercepted information

Structure of Domain Names

- Top-Level Domain (TLD) > The right side of the period which identifies what entity operates the website (com, edu, gov) - Second-Level Domain (SLD) > The part of the name of the left side of the period > Similar names often result in dispute among firms. > Furthermore, those with similar names have attempted to profit from their competitors goodwill

Frequent Changes in Domain Name Ownership Facilitate Cybersquatting

All domain name registrars are supposed to relay information about their transactions to ICANN - but that doesn't happen. The speed at which domain names change creates difficulty tracking mass automated registration, hence an environment where cybersquatting can flourish

Internet Companies' Privacy Policies

Due to consumer complaints, the Federal Trade Commission (FTC) forced many companies to enter a consent decree that allows the FTC broad power to review their privacy and data practices

Meta Tags

Words inserted into a Web site's key-words field to increase the site's appearance in search engine results.

Typosquatting

a problem that occurs when someone purposely register misspelled variations of well-known domain names This adds costs for businesses since they have to register not only their domain name but also, different variations. Sometimes typosquatting can fall out of ACPA's reach since the misspelling could be to significant that it's hard to mistake that name with the original trademark

Stored Communications Act (SCA)

prohibits intentional and unauthorized access to stored electronic communications and sets forth criminal and civil sanctions for violators It also prohibits ISPs and Communication services from sharing private convos to certain entities/individuals

Protection of Social Media Passwords

states have enacted legislation to protect individuals from having to disclose passwords

Domain Names

unique names which identify Internet sites and businesses

File-Sharing Technology (Methods)

-peer-to-peer (P2P) networking which is when individuals access files stored on another computer through a distributed network -cloud computing delivers a single application through a browser to multiple users

Applicability and Sanctions of ACPA

> ACPA applies to all domain name registrations of trademarks. Successful plaintiffs can collect actual damages and injunctions > Roadblocks include difficulty finding the true owner of websites bc of privacy services (plaintiff to avoid this must ask for a subpoena) > Facilitating Dispute Resolutions, ICANN offers the UDRP and URS. UDRP is the most common dispute resolution method.

Identifying the author of online defamation

A major barrier to online defamation cases is the anonymity of the Internet. ISPs can only disclose personal information about its customers when ordered to do so by a court. So people who file cases must get court's approval to send a order to ISPs to disclose the person responsible

DMCA limits liability for internet service providers

Basically ISPs are not liable for copyright infringement by its customers unless they know about it and do nothing about it

Data Collection and Cookies

Cookies - are invisible files that computers create to track a user's web browsing activities.

Copyrights in Digital Information

Copyright law is the most important form of intellectual property protection on the internet - most material on the internet is copyrighted, that's why Criminal penalties occurs when you share unauthorized copies of something for financial gain and now, even when you exchange unauthorized copies without realizing a profit

Online Defamation

Cyber Torts arise from online conduct. Most prevalent is online defamation which involves wrongfully hurting a person's rep by communicating false statements about that person to others

Anticybersquatting Legislation

Due to so much litigation occurring due to cybersquatting, The Anticybersquatting Consumer Protection Act (ACPA) was established. Which deemed cybersquatting illegal when both are true: 1. The domain name is identical of confusingly similar to the trademark of another 2. The one registering, trafficking in, or using the domain name has a "bad faith intent" to profit from that trademark

Employers' Social Media Policies

Employees can be disciplined or fired for using social media in a way that violates their employer's stated policies. Courts and Administrative agencies usually uphold an employers' right to terminate based on any violation

Exclusion for Employers

Employers are excluded from ECPA's coverage by two ways. 1. Any device they provide to their employees can be monitored (everything but personal devices) 2. An employer can also avoid liability under the act if the employees consent to having their electronic communications monitored

The Federal CAN-SPAM ACT

Enacted in 2003, the Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) targeted "commercial electronic mail messages" What it did, was that it allowed sending unsolicited commercial email, but prohibits certain spam activities like: 1. The use of a false return 2. The use of false misleading or deceptive information 3. Dictionary attacks; This is when you send messages to randomly generated emails and using specialized software to harvest emails.

The U.S. Safe Web Act

Foreign spam increased due to the FTC lacking authority to investigate foreign spamming Under The U.S. Safe Web Act, this allows the FTC to cooperate and share info with foreign agencies to investigate and prosecute those involved with spamming, spyware, and internet frauds, etc. This act also provides safe harbor for Internet Service Providers (ISPs) - which lifts+ liability for supplying FTC with information about unfair or deceptive conduct in foreign jurisdictions

reasonable expectation of privacy online

It is not reasonable to expect privacy in statements made on twitter or photos posted on social media

Criminal Investigations using social media

Law Enforcement use social media to detect and prosecute ppl - people who commit a crime bragging about it online - or even some police departments go undercover onto social media sites

Exceptions for DMCA

Libraries, scientists, universities, etc. basically the law doesn't apply to educational and non commercial purposes

Digital Millennium Copyright Act (DMCA)

Makes it illegal to circumvent (by passes) technology-based protections of copyrighted materials

Liability of Internet Service Providers

Newspapers, magazines, and radio and television stations can be subject to liability for defamatory content that they publish or broadcast, even though the content was prepared or created by others. General rule for ISPs tho: Under CDA they are not liable for defam statements coming from a third party

Company-Wide Social Media Networks

Often referred to as an "intranet," these are online places for employees to discuss company services and products.

Legal issues regarding Social Media

SM: Provides a mean by which people can create and exchange ideas and comments via the internet Their impact in litigation processes are during the discovery phase when social media posts are searched to either provide information/prove liability or reduce damages awards.

Their impact on settlement agreements

Social media posts can also invalidate settlement agreements bc posting about an agreement under a confidentiality clause means u breached the clause = no awards given to u

Distribution System

The Internet Corporation for Assigned Names and Numbers (ICANN) oversees the distribution of domain names and operates an online arbitration system. What they do is sell generic top level domain names (gTLDs) which can take any form name like .bmw, etc. from the established (.com/.edu/.gov) ones.

Cybersquatting

The act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner. Which is what gTLDs addressed since it was a problem

State Regulation of Spam

Thirty-seven states have legislation requiring an "opt out" of further e-mail ads Example: an unsolicited email must include a toll-free number or return email address for the receiver to ask the sender to stop forwarding

Trademark Dilution in the Online World

Trademark dilution occurs when a trademark is used—without authorization—in a way that diminishes the distinctive quality of the mark Different from infringement which requires that that the people get confused by the connection of the unauthorized trademark and the original (the products don't need to be similar)


Related study sets

Chapter 6-Stage Models of health

View Set

Operations Management - Chapter 4

View Set

Chapter 37: Nursing Care of the Child With an Infectious or Communicable Disorder

View Set

CH. 56 MANAGEMENT OF PATIENTS WITH DERMATOLOGIC DISORDERS PREP

View Set

Facebook Blueprint Certification Exam: 100-101 Digital Marketing Associate

View Set