Business Law Ch.42

Card Set Information

Business Law Ch.42
2011-05-04 22:27:01
Business Law

Chapter 42 Business Law
Show Answers:

  1. Cookies :
    a small file that includes an indentification number and may also include personal datata such as your address, phone, credit card numbers, and searches you have made or advertisement you have clicked on.
  2. What are these cookies used for ?
    • Some are disigned to follow a user fron site to site along entire internet trail.
    • Can be used to authenicate who you are, storing such info such as address, name and credit card number
  3. (PII) Personally identifiable information
    Data that identifies a user of a website such as name and address.
  4. Self Regulation of online privacy-
    Congress and FTC favored self regulation

    Congress enacted internet privacy legislation but the next year a new FTC chair revoked that recommendation

    privacy protection on the internet is now an uncertain, peicemeal affair.
  5. Government Regulation of Online Privacy

    First amendment ?
    Protects Free Speech and this includes postings onblogs etc. long as not defamtory but usually that is considered opinion
  6. Government Regulation of Online Privacy

    Fourth Amendment
    prohibits unreasonable searches and seizures by the government ...... governement must obtain a warrent from a court before conducting a search
  7. United States of America v. Angevine
    Professor was downloading porn on University computer and it was seized by the government with out a warrent directed towards him but a warrent to the university was convicted but claimed it was unreasonable... Professor lost case .... could not have and objectively resonable expectation of privacy
  8. The FTC ?
    Prohibits unfair and deceptive acts or practices ..... do not require online to have online privacy policies but if they do have one they must follow it
  9. Electronic Communications Privacy Act of 1986 ?
    federal statue that prohibits unautorized interceptioon or disclosure of wire and electronic communications or unauthorized access to stored communcations
  10. What is under the ECPA ?
    • 1. Any intended recipent of an electronic communcation has the right to disclose it
    • 2. Internet service providerd (ISPS) are genrally prohibited from disclosing electronic messages to any other than the addressee
    • 3. Employer has the right to moniter workers electronic communcations if 1). the employee concents 2). montiring is the ordinary course of business
    • 3). the employer provides the computer system in the case of email

    4.The access electronic comm. that have been stored for 180 days or less the governemnt must obtain a search warrent over 180 days govenment need searchw arrent subpoena or court order.
  11. One Lesson from the ECPA ?
    email is not private and it is dangerous
  12. Childrens Online Provacy Protection Act of 1998 ?
    prohibits internet operators from collecting information from children under 13 without the parental permission. it also requires sites to disclose how they will use any information they acquire.
  13. Gramm Leach Bliley Privacy Act of 1999 ?
    requires banks and other financial institutions to disclose to comsumer any non public information they wish to reveal to third parties

    also prohibits prexting, a process by which so called information brokers use deception to find out provite financial info.
  14. State Regulation
    many states have passed their own regulations like cali online provacy act of 2003, requires any website that collects PII from cali residents to post a privacy policy and abide by terms
  15. The European Directive
    estsblished strict provacy rules for the collection of personal data
  16. To be in comliance according to the EU- the european union companies must ......
    • 1. tell comsumers how it intends to use info
    • 2. provide comsumers a opportunity to opt out
    • 3. Provide adequate security for the data
    • 4. provide customers with reasonable access to their data
    • 5. establish a procedure for resolving disputes with customers
  17. Spyware
    a computer program that slips onto your computer with your premission thorough emails and downloads and software installations
  18. Spam

    The Controlling the Assault of NON Solicited Porno and Marketing Act ?

    Emails covered by CAN- Spam
    Regulate spam

    Provide an opt out sys that permits the recipient to unsibscribe

    clearly indicate that the email is an ad

    provide a valid physical return address

    clearly indicate the nature of porno messages
  19. Communications Decency act of 1996?
    Web host are not liable for information that is provided by someone else. only contect providers are liable.
  20. Crime on the Internet

    Hacking ?
    • Gaining unaithorized access to a computer system
    • Is is a crime under the CFAA
  21. the CFAA prohibits ?????
    • computer espinoage
    • theft of financial info
    • theft from a computer
    • computer trepass
    • computer fraud
    • interntional reckless, and negligent damage to a computer
    • trafficking in computer passwords
    • computer extortion
  22. Crime on the Internet

    Fraud ?
    the deception of another person for the purpose of obtaining money or property
  23. Crime on the Internet

    the seller either bids on his own goods or agrees to cross bid with a group of other sellers.
  24. Identity Theft ?

    Identity Deterrence act of 1998
    prohibits the use of false indentification to commit fraud or other crime and it also permits the victim to seek restituation in court
  25. Phishing
    a fraudster sends an email directing the recipent to enter personal info on a webiste that is an illegal imitation of a legitimate site.