Business Law Ch.9 Internet Law, Social Media, and Privacy

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Spam

Unsolicited "junk" e-mails with ads, solicitations, and other messages

2
New cards

State Regulation of Spam

Thirty-seven states have legislation requiring an "opt out" of further e-mail ads.

3
New cards

The Federal CAN-SPAM Act

Permits the sending of unsolicited commercial e-mail, but prohibits certain types of spamming activities

4
New cards

U.S. Safe Web Act

Allows FTC to share information with foreign agencies that investigate and prosecute cyber crimes. It also provides ISPs with immunity from liability for supplying information to FTC.

5
New cards

Domain Names

An Internet address, consisting of:
A "top level domain" to the right of the "dot" (.com, .org, .edu) and
A "second level domain" to the left of the "dot" chosen by entity creating the domain name, e.g., www.cengage.com.

6
New cards

Distribution System

-The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit corporation that oversees the distribution of domain names and operates an online arbitration system.
-Overhauled its system to attempt to stop cybersquatting.

7
New cards

Cybersquatting

The act of registering someone else's name or trademark as a domain name and then offering to sell the registered domain name to that person.

8
New cards

Anti-Cybersquatting Consumer Protection Act (ACPA)

-makes it illegal for a person to "register, traffic in, or use" a domain name if
-the name is identical or confusingly similar to another's trademark, and
-the person registering, trafficking in, or using the domain name does so with the bad faith intent to profit from its similarity to the other's trademark.
-However, frequent changes in domain name ownership facilitates cybersquatting due to the speed at which these changes occur and the difficulty in tracking mass automated registrations.

9
New cards

Typosquatting

-The registration of a name that is a misspelling of a popular brand (such as googl.com).
-Such pages usually have a lot of hits (unique visitors) which generates increased profits for advertisers.

10
New cards

Applicability and Sanctions of ACPA

-The ACPA applies to all domain name registrations of trademarks.
-Successful plaintiffs can collect actual damages and profits, or statutory damages.

11
New cards

Meta Tags

-Key words that give Internet browsers specific information about a Web page and increase the likelihood that a site will be included in search research.
--See Case In Point 9.5: Toyota Motor Sales, U.S.A., Inc. v. Tabari (2011).

12
New cards

Trademark Dilution in the Online World

-Trademark dilution occurs when a trademark is used—without authorization—in a way that diminishes the distinctive quality of the mark.
-Does not require proof consumers would be confused.
--CASE 9.1 Hasbro, Inc. v. Internet Entertainment Group, Ltd. (1996).

13
New cards

Copyright law

is a very important form of intellectual property protection on the Internet because:
-Much of the material on the Internet is copyrighted.
-In order to transfer that material online, it must be "copied."
-Infringement may occur when content is copied or downloaded to a computer.

14
New cards

Digital Millennium Copyright Act

-Provides civil and criminal penalties to circumvent encryption software (like DVD).
-Limits ISP liability for subscriber acts.
-Allows for "fair use" exceptions for libraries, universities, and others.

15
New cards

File-Sharing Technology

-Methods of file-sharing include peer-to-peer (P2P) networking and the use of distributed networks.
-Cloud computing delivers a single application through a browser to multiple users.

16
New cards

Sharing Stored Music and Movies

-When file-sharing is used to download others' stored music or movie files, artists and their labels lose substantial royalties and revenues.
--CASE 9.2 Maverick Recording Co. v. Harper (2010).

17
New cards

Pirated Movies and Television

The motion picture and television industries lose significant revenue annually due to piracy (illegal copying).

18
New cards

Social media

media provides a means to create, share, and exchange ideas and comments via the Internet

19
New cards

Legal Issues

The emergence of social media sites has created a number of legal and ethical issues for businesses.

20
New cards

Impact on Litigation

Social media posts are routinely included in discovery in litigation since they can provide damaging information about a person's intent or what she or he knew at a particular time.

21
New cards

Impact on Settlement Agreements

Social media posts have been used to invalidate settlement agreements that contain confidentiality clauses

22
New cards

Criminal Investigations

Social media is used to detect and prosecute criminals because a surprising number of them boast about their illegal activities on social media.

23
New cards

Administrative Agency Investigations

-Federal regulators use social media posts in their investigations into illegal activities.
--See Case in Point 9.14 In re O'Brien (2013).

24
New cards

Employers' Social Media Policies

Employees can be disciplined or fired for using social media in a way that violates their employer's stated policies

25
New cards

Electronic Communications Privacy Act

Amended federal wiretapping law to cover electronic forms of communication

26
New cards

Exclusions

Communications that an employer authorizes in the "ordinary course" of its business.

27
New cards

Stored Communications Act (SCA)

-Prohibits intentional and unauthorized access to stored electronic communications.
-Also prevents "providers" of communication services from divulging private communications to certain entities and individuals.

28
New cards

Protection of Social Media Passwords

-Some employers and schools will get social media passwords from applicants to see if their accounts include controversial postings.
-By 2017, about half of U.S. states had enacted legislation to protect individuals from having to disclose their social media passwords.

29
New cards

Company-Wide Social Media Networks

-Often referred to as an "intranet," these are online places for employees to discuss company services and products.
-Intranets allow companies to better protect their trade secrets.

30
New cards

Cyber Torts

Online defamation is one of the most prevalent cyber torts.

31
New cards

Identifying the Author of Online Defamation

-A major barrier to online defamation cases is the anonymity of the Internet.
-ISPs can only disclose personal information about its customers when ordered to do so by a court

32
New cards

Liability of ISPs

The Communications Decency Act provides broad protection for ISPs.

33
New cards

General Rule

ISPs are not liable for publishing defamatory statements that come from a third party.

34
New cards

Exceptions

-Some courts have started establishing limits to this immunity.
--See Case in Point 9.19 Fair Housing Council of San Fernando Valley v. Roommate.com (2012).

35
New cards

Other Actions Involving Online Posts

-E-mails, tweets, posts, and other online communications can be the basis for almost any type of tort.
-Suits relating to online conduct may also involve allegations of wrongful interference or infliction of emotional distress.

36
New cards

Privacy

-The right to privacy is guaranteed by the Bill of Rights and some state constitutions.
-Major social media and Internet sites have been accused of violating users' privacy rights.
-People expect privacy when they enter personal financial information online.
-People also expect that online companies will follow their own privacy policies.

37
New cards

reasonable expectation of privacy

But to prevail in an invasion of privacy lawsuit, the plaintiff must have had it

38
New cards

Data Collection and Cookies

Retailers collect detailed information about consumers' behavior and preferences via cookies in order to personalize online services.

39
New cards

Internet Companies' Privacy Policies

-Due to consumer complaints, the Federal Trade Commission (FTC) forced many companies to enter a consent decree that allows the FTC broad power to review their privacy and data practices.
-Companies that violate the terms of the decree can be sued by the FTC.