电子商务:管理视角chap10.ppt_第1页
电子商务:管理视角chap10.ppt_第2页
电子商务:管理视角chap10.ppt_第3页
电子商务:管理视角chap10.ppt_第4页
电子商务:管理视角chap10.ppt_第5页
已阅读5页,还剩47页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1,Chapter 10 Public Policy: From Legal Issues to Privacy,2,Learning Objectives,List and describe the major legal issues related to electronic commerce Understand the difficulties of protecting privacy and describe the measures taken by companies and individuals to protect it Describe the intellectual property issues in EC and the measures provided for its protection Describe some of the ethical issues in EC and the measures taken by organizations to improve ethics,3,Learning Objectives (cont.),Understand the conflict between Internet indecency and free speech, and the attempts to resolve the conflict Describe the issues involved in imposing sales tax on the Internet Discuss the controls over exporting encryption software and the issues of government policies Differentiate between contracts online and offline Describe the measures available to protect buyers and sellers on the Internet,4,Legal and Ethical Issues: an Overview,Privacy Intellectual Property Difficult to protect since it is easy and inexpensive to copy and disseminate digitized information Free Speech Internet provides the largest opportunity for free speech Taxation Illegal to impose new sales taxes on Internet business at the present time Consumer Protection Many legal issues are related to electronic trade,5,Ethical Issues,What is considered to be right and wrong? What is unethical is not necessarily illegal. Whether these actions are considered unethical depends on the organization, country, and the specific circumstances surrounding the scenarios.,6,Ethical Issues (cont.),Code of Ethics Many companies and professional organizations develop their own codes of ethics A collection of principles intended as a guide for its members A guide for members of a company or an association,7,Privacy Collection, storage, and dissemination of information about individuals,Accuracy Authenticity, fidelity, and accuracy of information collected and processed,Property Ownership and value of information and intellectual property,Accessibility Right to access information and payment of fees to access it,Organize IT Ethical Issues into a Framework,8,Protecting Privacy,Privacy The right to be left alone and the right to be free of unreasonable personal intrusions Information Privacy The “claim of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others”,9,Protecting Privacy (cont.),Two rules The right of privacy is not absolute. Privacy must be balanced against the needs of society. The publics right to know is superior to the individuals right of privacy.,10,How is Private Information Collected?,Reading your newsgroups postings Finding you in the Internet Directory Making your browser record information about you Recording what your browsers say about you Reading your e-mail,11,Web-Site Self-Registration,Registration Questionnaires type in private information in order to receive a password to participate in a lottery, to receive information, or to play a game Uses of the Private Information collected for planning the business may be sold to a third party used in an inappropriate manner,12,40% of all users have falsified information when registering online 66% of all U.S. and European respondents dont register as they dont know how the information is going to be used 63% dont feel that registration is worthwhile considering the content of the sites 58% dont trust the sites collecting this information from them,From the Eighth User Survey by GVU (1988),13,Cookies,Piece of information that allows a Web site to record ones comings and goings Web sites can remember information about users and respond to their preferences on a particular site, process is transparent to users Web sites can maintain information on a particular user across HTTP connections,14,Reasons for using cookies to personalize information to improve online sales/services to simplify tracking of popular links or demographics to keep sites fresh and relevant to the users interests to enable subscribers to log in without having to enter a password every visit to keep track of a customers search preferences personal profiles created are more accurate than self-registration Solutions to cookies users can delete cookie files stored in their computer use of anti-cookie software (e.g. Cookie Cutter and Anonymous Cookie),Cook,Cookies (cont.),15,Privacy Protection 5 basic principles Notice/Awareness Customers must be given notice and be able to make informed decisions. Choice/Consent Customers must be made aware of their options as to how their personal information may be used. Consent may be granted through opt-Out clauses requiring steps. Access/Participation Consumers must be able to access their personal information and challenge the validity of the data. Integrity/security Consumers must be assured that the data is secure and accurate. Enforcement/Redress There must always exist a method of enforcement and remedy. The alternatives are government intervention, legislation for private remedies, or self-regulation.,16,Protecting Your Privacy Think before you give out personal information on a site Track the use of your name and information Keep your newsgroups posts out of archives Use the Anonymizer when browsing Live without cookies Use anonymous remailers Use encryption Reroute your mail away form your office Ask your ISP or employer about a privacy policy,17,Legislation The Consumer Internet Privacy Act The Federal Internet Privacy Protection Act The Communications Privacy and Consumer Empowerment Act The Data Privacy Act,18,Personal Information in Databases Databases of banks and financial institutions; cable TV; telephone ; employers; schools; insurance companies; and online vendors Concerns Under what circumstances will personal data be released? Do you know where the records are? How are the data used?,Electronic Surveillance - Monitoring Computer Users,Tens of millions of computer users are monitored, many without their knowledge Employees have very limited protection against employers surveillance,19,Privacy Policy Basics,Data Collection,Data Accuracy,Data Confidentiality,Data should be collected on individuals only to accomplish a legitimate business objective. Data should be adequate, relevant, and not excessive in relation to the business objective. Individuals must give their consent before data pertaining to them can be gathered.,Sensitive data gathered on individuals should be verified before it is entered into the database. Data should be accurate and, where and when necessary, kept current. The file should be made available so the individual can ensure that the data are correct. If there is disagreement about the accuracy of the data, the individuals version should be noted and included with any disclosure of the file.,Computer security procedures should be implemented to provide reasonable assurance against unauthorized disclosure of data. Third parties should not be given access to data without the individuals knowledge or permission, except as required by law. Disclosures of data, other than the most routine, should be noted and maintained for as long as the data are maintained. Data should not be disclosed for reasons incompatible with the business objective for which they are collected.,20,Protecting Intellectual Property,Copyright A statutory grant that provides the creators of intellectual property with ownership of it for 28 years Trade Secret Intellectual work such as a business plan, which is a company secret and is not based on public information Patent A document that grants the holder exclusive rights on an invention for 17 years,21,Copyright Protection Techniques Digital watermarks embedding of invisible marks can be represented by bits in digital content hidden in the source data, becoming inseparable from such data,22,Legal Perspectives Electronic Theft (NET) Act imposed criminal liability for individuals who reproduce or distribute copies of copyrighted works even if no commercial advantage or financial gain exists Digital Copyright Clarification and Technology Education Act limits the scope of digital copyright infringement by allowing distance learning exemptions Online Copyright Liability Limitation Act seeks to protect Internet access providers from liability for direct and vicarious liability under specific circumstances where they have no control or knowledge of infringement,23,Legal Perspectives (cont.),Digital Millennium Copyright Act reasserts copyright in cyberspace makes illegal most attempts to defeat anti-copying technology requires the National Telecommunications and Information Administration to review the effect the bill would have on the free flow of information and makes recommendations for any changes two years after it is signed into law lets companies and common citizens circumvent anti-copying technology when necessary to make software or hardware compatible with other products, to conduct encryption research or to keep personal information from being spread via Internet “cookies” or other copy-protection tools forbids excessive copying of databases, even when those databases contain information already in the public domain,24,International Aspects of Intellectual Property,The World Intellectual Property Organization more than 60 member countries to come up with an international treaty part of the agreement is called the database treaty its aim is to protect the investment of firms that collect and arrange information,25,Domain Names,Two controversies Whether top-level domain names (similar to com, org and gov) should be added The use of trademark names by companies for domain names that belong to other companies,26,Domain Names (cont.),Network Solutions Inc. Contracted by the government to assign domain addresses,Trade Name Disputes Companies are using trade names of other companies as their domain address to help attract traffic to their Web site,Increase Top Level Names Idea is that an adult only top-level name will be created to prevent pornographic material getting into the hands of children,27,Defining Freedom of Speech,The Bill of Rights First Amendment to the Constitution of the U.S. of America reads “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.”,28,The united nations Universal Declaration of Human Rights in 1948 addresses the right of freedom of expression “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers.”,Defining Freedom of Speech (cont.),29,The Debate about Free Speech on the Internet,Free speech debate “Most citizens are implacably opposed to censorship in any form except censorship of whatever they personally happen to find offensive.” What the boundaries are, and how they should be enforced,Governments protective of their role in society, parents concerned about exposing their children to inappropriate Web pages and chat rooms, and federal agencies attempting to deal with illegal actions,Citizen action groups desiring to protect every ounce of their freedom to speak, individuals concerned about their right to information on the Internet, and organizations seeking to empower the citizens of the earth,30,The Debate about Free Speech on the Internet (cont.),Provisions in law for 2 cases that limit free speech obscene material compelling government interest “Indecency” “any comment, request, suggestion, proposal, image, or other communication that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs”,31,Protecting Children,3 approaches (regarding the protection of children from inappropriate material on the Internet) No information should be held back and parents should be responsible for monitoring their own children The government is the only one who can truly protect children from this material To hold the Internet providers responsible for all the material and information they provide,32,Protecting Children (cont.),Parents Governing Their Own Children Government Protecting the Children Responsibility for the Internet Providers Forcing Internet Providers to be Accountable,33,Legal Perspectives in the USA,Child Online Protection Act Internet Tax Freedom Act Family Friendly Internet Access Act Internet Protection Act Internet School Filtering Act,34,Controlling Spamming,What is spamming, why is it bad?,Spamming “the practice of indiscriminate distribution of messages (for example junk mail) without permission of the receiver and without consideration for the messages appropriateness”,Spammings negative impacts Spam comprised 30% of all mail sent on America Online slowing the Internet in general shutting ISPs down completely now less than 10%,35,Legislation, Legal The Electronic Mailbox Protection Act The Unsolicited Commercial Electronic Mail Act The Netizens Protection Act The Telephone Consumer Protection Act,Controlling Spamming (cont.),36,Controlling Spamming (cont.),How to cut spamming Tell users not to validate their addresses by answering spam requests for replies if they want to be taken off mailing lists Disable the relay feature on SMTP (mail) servers so mail cannot be bounced off the server Delete spam and forget it its a fact of life and not worth wasting time over Use software packages, e.g. and ,37,Taxation Policies,The Taxation Exemption Debate Internet Tax Freedom Act (8 Oct,98) promotes electronic commerce through tax incentives by barring any new state or local sales taxes on Internet transactions during the next three years,38,Taxation Policies (cont.),Proposed Taxation Solutions in the USA,The Internal Revenue Service might “come to the rescue” with a single and simplified national sales tax.,38,39,Encryption Policy,The 128-BIT Encryption Debate Export 128-bit encryption is 3.09X10 to the 26th power times more difficult to decipher than the preceding legally exportable technology.,For the past 20 years there was a limitation on exported encryption devices of 56 bit codes,Recent legislation allows 128 bit in specific circumstances thus paving the way for the Compaq permit,Secure e-commerce,Governments legal requirements,40,Encryption Policy (cont.),Data Encryption Standard (DES) A published federal encryption standard created to protect unclassified computer data and communications Law Enforcements Plea Cryptographers would follow an audit trail to ensure that keys havent been released improperly, however, law enforcement does not trust that process First Amendment Right Technology can encrypt so thoroughly, that every computer on earth, working in tandem, would take trillions of years to decode the encryption Business View EFF (Electronic Frontier Foundation) believes that software, networked communications and cryptography industries are suffering,41,Other Legal Issues,What are the rules of electronic contracting, and whose jurisdiction prevails when buyers, brokers, and sellers are in different states and/or countries? How can gambling be controlled on the Internet? Gambling is legal in Nevada and other states. How can the winners tax be collected? When are electronic documents admissible evidence in the courts of law? What do you do if they are not? Time and place can carry different dates for the buyers and sellers when they are across the ocean. Is a digital signature legal? The use of multiple networks and trading partners makes the documentation of responsibility difficult. How is such a problem overcome?,42,Electronic Contracts,Uniform Electronic Transactions Act Provides the means to effectuate transactions accomplished through an electronic medium Uniform Commercial Code (UCC) Provides a government code that supports existing and future electronic technologies in the exchange of goods or of services related to exchange of goods,43,Electronic Contracts (cont.),Shrink-wrap agreements (or box top licenses) The user is bound to the license by opening the package This has been a point of contention for some time The court felt that more information would provide more benefit to the consumer given the limited space available on the exterior of the package Click-wrap contracts The software vendor offers to sell or license the use of the software according to the terms accompanying the software The buyer agrees to be bound by the terms based on certain conduct,44,Fraud on the Internet,Internet Stocks Fraud SEC brought charges against 44 companies and individuals who illegally promoted stocks on computer bulletin boards, online newsletters and investment Web sites Other Financial Fraud Selling bogus investments, phantom business opportunities, and other fraud schemes Other Fraud in EC Customers may receive poor quality products and services not get products in time be asked to pay for things they assume will be paid for by sellers,45,Federal Trade Commission (FTC) Consumer Alerts,Business opportunities Bulk mail solicitors Investment opportunities Work-at-home schemes Health and diet schemes Effortless income Guaranteed loans or credit, on easy terms,Free goods Chain letters Cable descrambler kits Credit repair Vacation prize promotions,The “Dirty Dozen”,46,Buyer Protection,Tips for safe electronic shopping Look for reliable brand names at sites. Search any unfamiliar site for address and phone and fax number. Call up and quiz a person about the sellers. Check the seller with the local Chamber of Commerce, Better Business Bureau, or TRUSTe as described later. Investigate how secure the sellers site is and

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论