LA FINAL chp 6 internet law, copyrights in digi info, social media Flashcards
number of laws specifically address issues that arise only on the internet, three issues are
unsolicited e-mail, domain names, and cybersquatting
bulk, unsolicited junk email
spam
in attempt to combat spam, 36 states have enacted laws that
prohibit or regulate its use
legislation applies to any “commercial electronic mail messages” that are sent to promote a commercial product or service
the assault of non-solicited pornography and marketing act (CAN-SPAM) act
this act allows the Federal trade commission to cooperate and share info with foreign agencies in investigating and prosecuting those involved in spamming, spyware, and various internet frauds and deceptions
U.S Safe Web Act
organizations that provide access to the internet
internet service providers (ISPs)
The safe web act provides a safe harbor for internet service providers. which gives
ISPs immunity from liability for supplying info to the FTC concerning possible unfair or deceptive conduct in foreign jurisdictions
part of an internet address, such as cengage.com
domain name
part of the name to the right of the period like .com or .edu
top-level domain
part of the name to the left of period like cengage.com
second-level domain
the market value of a good reputation of any company, partnership, or other business entity
goodwill
the internet corporation for assigned names and numbers is a non profit corporation that looks after giving out
website names and runs a way to solve problems online
occurs when a person registers a domain name that is the same as or confusingly similar to the trademark of another and then offers to sell the domain name back to the trademark owner
cybersquatting
congress enacted the anticybersquatting consumer protection act,
which amended the lanham act- the federal law protecting trademarks
The anticybersquatting consumer protection act makes cybersquatting illegal when both are true:
- the name is identical of confusingly similar to the trademark of another
- the one registering, trafficking in, or using the domain name has a “bad faith intent: to profit from that trademark
registering a name that is a mispelling of a popular brand, such as googl.com
typosquatting
cybersquatting is costly for businesses, which must attempt to register all variations of a name to
protect their domain rights from would-be cybersquatters and typosquatters
to faciliate resolution, ICANN now offers the
uniforma rapid suspension
this system allows trademark holders with clear-cut infringement claims to obtain rapid relief
uniform rapid suspension (URS)
key words that are inserted into the HTML code to tell the internet browsers specific info about a web page
meta tags
meta tags increase the likelihood that a site will be included in search engine results
even though the site may have nothing to do with the key words
unlike trademark infringement, a claim of dilution does not require proof that consumers are likely to be
confused by a connection between the unauthorized use and the mark
a licensor might grant a license allowing its trademark to be used as
part of a domain name
when you download an application on your phone, tablet or other mobile device you are typically entering into a
license agreement
licensing agreements frequently include restrictions that prohibit licensees from
sharing the file and using it to create software applications
copyright is the most important form of intellectual property because
much of the material on the internet is copyrighted, and in order to transfer the material online it must be “copied”
gave significant protection to owners of copyrights in digital information
digital millennium copyright act
the digital millennium copyright act provides for exceptions to fit the needs of
libraries, scientists, universitites, and others
under digital millennium copyright act, ISPs is not liable for
copyright infringement by its customers unless the ISP is aware of the subscribers violation
the best-known compression and decompression system is
MP3`
the sharing of resources like files, hard rives, and processing among multiple computers
peer-to-peer networking
a network used by persons located in different places to share computer files
distributed network
individuals on the same network can access files stored on
another PCs through a distributed network
a subscription-based or pay-per use service that extends a computer’s software or storage capabilities
cloud computing
file-sharing also creates problems for the motion picture industry which
loses significant amounts of revenue annually as a result of pirated DVDs
provide a means by which people can create, share and exchange ideas and comments via the internet
social media
the growth of social networking sites has created a number of legal and ethical issues for businesses for example
a firms rights in valuable intellectual property may be infringed if users post trademarked images or copyrighted materials on these sites without permission
In legal cases, social media posts are often used to find out information that could harm someone’s case… this might show
what someone was thinking or knew at a certain time.
courts and administrative agencies usually uphold an employers right to terminate a person based on
their violation of a social media policy
The Electronic Communications Privacy Act (ECPA) changed the law about
wiretapping to include electronic messages.
the ecpa prohibits any intentional interception of
wire, oral, or electronic communication
the ECPA. permits employers to monitor employees electronic communications
made in the ordinary course of business
the stored communications act prohibits intentional and unauthorized access to
stored electronic communications and sets forth criminal and civil sanctions for violators
an important advantage to using an internal system for employee communications is that the company can better protect its
trade secrets
internal social media systems also offer benefits including
real-time information about important issues, like production glitches
another benefit of intranets is significant reduction in use of