Top Banner
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1
22

Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Dec 25, 2015

Download

Documents

Letitia Smith
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

1

Lecture 5ref: Chapter 16

Regulatory, Ethical, and Compliance Issues in EC

PREPARED BY L. Nouf Almujally

Page 2: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

Learning Objectives 1. Understand the foundations for legal and

ethical issues in EC.2. Describe civil, intellectual property, and

common law.3. Understand legal and ethical challenges and

how to contain them.4. Describe the needs and methods to protect

sellers.5. Describe EC-related societal issues. 6. Describe Green EC and IT.

16-2

Page 3: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

16.1 The Complexity of Legal and Regulatory Issues

intellectual propertyCreations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce

Why are laws subject to interpretationMost laws and regulations are broadly written and, therefore, only provide outlines to guide public policy.

16-3

Page 4: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

intellectual property lawArea of the law that includes patent*1 law, copyright law, trademark law, trade secret law, and other branches of the law such as licensing and unfair competition

_________________________________1* االختراع براءة

16-4

16.2 Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Page 5: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

copyrightAn exclusive right of the author or creator of a book, movie, musical composition, or other artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use infringement

Use of the work without permission or contracting for payment of a royalty

16-5

16.2 Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Page 6: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

digital rights management (DRM)An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage fair use

The legal use of copyrighted material for noncommercial purposes without paying royalties or getting permission

16-6

16.2 Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Page 7: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

patentA document that grants the holder exclusive rights to an invention for a fixed number of years

trademarkA symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use

16-7

16.2 Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Page 8: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

COMMON LAW IN E-COMMERCE• common law (case law)

Law created by judges in court decisions

FAN AND HATE SITESIndependent websites that express strong opinions about their like or dislike of products, services and individuals.– cyberbashing

Domain name that criticizes an organization or person

16-8

16.2 Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Page 9: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

9

Page 10: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

16.3 Ethical Challenges and Guidelines

ethicsThe branch of philosophy that deals with what is considered to be right and wrong

privacyThe right to be left alone and free of unreasonable personal intrusions

business ethicsA form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment

16-10

Page 11: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

EC ETHICAL ISSUES• Non–Work-Related Use of the Internet

Most employee use e-mail and surf on the web for non-work-related purpose

• Codes of EthicsA practical and necessary approach to limiting non-work-related Internet surfing is an Internet acceptable use policy (AUP) to which all employees must conform.

16-11

16.3 Ethical Challenges and Guidelines

Page 12: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

16.4 Privacy Rights, Protection, and Free Speech

PRIVACY RIGHTS AND PROTECTION• opt-out

Business practice that gives consumers the opportunity to refuse sharing information about themselves

• opt-inAgreement that requires computer users to take specific steps to allow the collection of personal information

16-12

Page 13: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

HOW INFORMATION ABOUT INDIVIDUALS IS COLLECTED

1. Web Site RegistrationBy filling registration forms ( name, telephone#, email, …etc.)2. Cookies3. spyware

All unwanted software programs designed to steal proprietary information, or that target data stores containing confidential information

16-13

16.4 Privacy Rights, Protection, and Free Speech

Page 14: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

4. Site transaction logsThe usage patterns of how people surfing the internet5. EC ordering systems and shopping cartsLet people know what you ordered, when, from whom, and how much you paid6. Search enginesCollect information about your search, chatting and blogging

7. Behavioral targetingUses tools for collaborative filtering and analysis of user data

8. Payment information and e-wallets

16-14

16.4 Privacy Rights, Protection, and Free Speech

Page 15: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

PRIVACY PROTECTION BY INFORMATION TECHNOLOGIES• Encryption: software for encrypting emails, and other

documents.• Spam blocking: built into browsers and email; blocking pop-up

and unwanted mails• Spyware blocking: detect and remove spyware and adware• Cookie managers: prevent the computer from accepting cookies

PRIVACY ISSUES IN WEB 2.0 TOOLS AND SOCIAL NETWORKS• Presence, Location, and Privacy

16-15

16.4 Privacy Rights, Protection, and Free Speech

Page 16: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

16.5 Consumer and Seller Protection from Online Fraud

CONSUMER (BUYER) PROTECTION Representative Tips and Sources for Your Protection

• User should make sure that they enter the real Web site of well-known company by going directly to the site rather than through a link.

• Examine the money-back guarantees, warranties, and service agreements before making a purchase

• Compare prices online with those in regular stores• Ask friends what they know

16-16

Page 17: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

16.5 Consumer and Seller Protection from Online Fraud

Third-Party Assurance ServicesSeveral public organizations and private companies attempt to protect consumers.Ex. Better Business Bureau (BBB)

Computer Fraud and Abuse Act (CFAA)Major computer crime law to protect government computers and other Internet-connected computers

16-17

Page 18: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

SELLER PROTECTIONWhat Can Sellers Do?Sellers should follow best practices including:1. verifying credit card information2. watching for warning signals3. ensuring delivery to approved addresses.

16-18

16.5 Consumer and Seller Protection from Online Fraud

Page 19: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

• PROTECTING BUYERS AND SELLERS: ELECTRONIC AND DIGITAL SIGNATURES

o electronic signatureA generic, technology-neutral term that refers to the various methods by which one can “sign” an electronic recordtypes: the image of a signature , PIN number, Code, Digital signature, fingerprint

16-19

16.5 Consumer and Seller Protection from Online Fraud

Page 20: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

o Authentication and Biometric Controls- Authentication is the process through which you can confirm with whom you are communicating.

- Biometric controls provide access procedures that match every valid user with a unique user identifier (UID). They also provide an authentication method that verifies that users requesting access to the computer system are really who they claim to be.

16-20

16.5 Consumer and Seller Protection from Online Fraud

Page 21: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

How EC can improve education.EC technologies can give access to information that was difficult or expensive to access in the past.

How EC can improve Public safety and security.EC technologies can allow for better monitoring of individuals and property.Ex. E-922, e-procurement, e-government

How EC can improve health services.EC technologies allow for the better filing and cross-referencing of records.Ex. Delivery of health care from distance

16-21

16.6 Societal Issues and Green EC

Page 22: Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Copyright © 2010 Pearson Education, Inc.

22