Post on 08-Feb-2017
Public Policy: Legal Issues to Privacy
Chapter #10
Group Members
Muneeb AhmedShahwaiz AhmedNouman khanAbdul Hadi
Privacy
An ecommerce privacy policy is your everyday practice of collecting, managing, and using data from site visitors. What you do — not what you say — is most important.
Reality of Privacy Within 1 minute, I can find out your address, your
marriage status, SSN, gender, driver’s license, record of prior convictions.
In 5 minutes, I can check any prior divorces, employment records, lawsuits, and personal photos.
In half an hour, I’ll know your race, sexual orientation, political preference. I’ll know the books you read, things you like, and the friends you have.
All that without leaving my desk.
Copyright
It is a right which Grants protection to the unique expression of Ideas.
Literary Films Dramatic
Musical Sound RecordingArtistic
What is covered by copyright?
What is not covered by copyright?
Ideas
Facts
Recipes
Works lacking originality (e.g. The phone book) Names, titles or short phrases
Cookies
Piece of information that allows a Web site to record one’s comings and goingsWeb sites can ‘remember’ information
about users and respond to their preferences on a particular site, process is transparent to users
Web sites can maintain information on a particular user across HTTP connections
Shahwaiz Ahmed.
Intellectual property rights
Intellectual Property is a property that arises from the human intellect. It is a product of human creation.
Intellectual Property are of two distinct forms:* Literary & Artistic Works* Industrial Property
Literary & Artistic Work
They are books, paintings, musical compositions, plays, movies, radio/tv programs, performances, & other artistic works.
How are they Protected?
* Protected by “COPYRIGHT”
Industrial Property
Industrial Property describes physical matter that is the product of an idea or concept for commercial purposes.
How are they Protected?
* By Logo* By Trademarks* By Industrial Designs
Validity of contracts
Most contracts only need to contain two elements to be legally valid:
All parties must be in agreement (after an offer has been made by one party and accepted by the other).
Something of value must be exchanged -- such as cash, services, or goods (or a promise to exchange such an item) -- for something else of value.
Nouman khan
.
Unethical distribution of software
Software piracy is morally bad when someone reproduces a copy of the software and sells it for profit
Produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it to others
Taxation
Companies that do business on the Web are subject to the same taxes as any other company. Federal, state, and local taxing authorities are trying to figure out how to impose taxes on Internet sales.Those taxes may include:
Income TaxesSales TaxesProperty TaxesCustoms Duties
Free speech
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers.
Trademarks
Trademark: A symbol, logo, word, sound, color, design,
or other device that is used to identify a business or a product in commerce.
Different Symbols are :
™ Intent to use application filed for productSM Intent to use application filed for services® Registered trademark
Trademarks
Name
Logotype
Symbol
Slogan
Shape
Color
Abdul Hadi
.
Buyer Protection Tips for safe electronic shopping
Look for reliable brand names at sites.
Investigate how secure the seller’s site is and how well it is organized.
Cont…Examine the money-back guarantees, warranties, and
service agreements.
Compare prices to those in regular stores; too-low prices may be too good to be true.
Find out what you can do in case of a dispute.
Consult the National Fraud Information Center.
Do not forget the you have shopper’s rights.
Seller Protection
Protection against consumers who refuse to pay or pay with bad checks and buyers’ claims that the merchandise did not arrive
Need protection against the use of their name.
Customers who download copyrighted software and/or knowledge and sell it to others
CONCLUSION
Create yourself, rather than using other’s creations
Do not use competitor’s mark in such way that it harms competitor in unfair way
No comparisons that are likely to cause confusion
CONCLUSION
Technological advancement made the job of the CREATOR easy………it also made the job of the COPY-ER easy.
Any Questions…..