2001 prentice hall, inc. all rights reserved. wk11- legal and ethical issues; internet taxation...

44
2001 Prentice Hall, Inc. All rights reserved. WK11- Legal and Ethical Issues; Internet Taxation Outline 11.1 Introduction 11.2 Legal Issues: Privacy on the Internet 11.2.1 Right to Privacy 11.2.2 Internet and the Right to Privacy 11.2.3 Network Advertising Initiative 11.2.4 Employer and Employee 11.2.5 Protecting Yourself as a User 11.2.6 Protecting Your Business: Privacy Issues 11.3 Legal Issues: Other Areas of Concern 11.3.1 Defamation 11.3.2 Sexually Explicit Speech 11.3.3 Children and the Internet 11.3.4 Alternative Methods of Regulation 11.3.5 Intellectual Property: Copyrights and Patents 11.3.6 Trademark and Domain Name Registration

Upload: norman-fowler

Post on 17-Dec-2015

220 views

Category:

Documents


1 download

TRANSCRIPT

2001 Prentice Hall, Inc. All rights reserved.

WK11- Legal and Ethical Issues; Internet Taxation

Outline11.1 Introduction11.2 Legal Issues: Privacy on the Internet

11.2.1 Right to Privacy11.2.2 Internet and the Right to Privacy11.2.3 Network Advertising Initiative11.2.4 Employer and Employee11.2.5 Protecting Yourself as a User11.2.6 Protecting Your Business: Privacy Issues

11.3 Legal Issues: Other Areas of Concern11.3.1 Defamation11.3.2 Sexually Explicit Speech11.3.3 Children and the Internet11.3.4 Alternative Methods of Regulation11.3.5 Intellectual Property: Copyrights and Patents11.3.6 Trademark and Domain Name Registration

2001 Prentice Hall, Inc. All rights reserved.

Chapter 11, Legal and Ethical Issues; Internet Taxation

Outline 11.3.7 Unsolicited Commercial E-mail (Spam)

11.3.8 Online Auctions11.3.9 Online Contracts11.3.10 Online User Agreements

11.4 Cybercrime11.5 Internet Taxation

2001 Prentice Hall, Inc. All rights reserved.

11.1 Introduction

• Real space– Our physical environment consisting of temporal and

geographic boundaries

• Cyberspace– The realm of digital transmission not limited by geography

2001 Prentice Hall, Inc. All rights reserved.

11.2 Legal Issues: Privacy on the Internet

• Difficulty of applying traditional law to the Internet

• Technology and the issue of privacy

2001 Prentice Hall, Inc. All rights reserved.

11.2.1 Right to Privacy

• Implicit in the First, Fourth, Ninth and Fourteenth Amendments

• Olmstead vs. United States– Telecommunication of alcohol sales during Prohibition era

– New application of the Fourth Amendment

• Translation– Interpreting the Constitution to protect the greater good

2001 Prentice Hall, Inc. All rights reserved.

11.2.2 Internet and the Right to Privacy

• Self-regulated medium– The Internet industry governs itself

• Many Internet companies collect users’ personal information– Privacy advocates argue that these efforts violate

individuals’ privacy rights

– Online marketers and advertisers suggest that online companies can better serve their users by recording the likes and dislikes of online consumers

• Financial Services Modernization Act of 1999 – Establishes a set of regulations concerning the management

of consumer information

2001 Prentice Hall, Inc. All rights reserved.

11.2.3 Network Advertising Initiative

• Network Advertising Initiative (NAI) – Approved by the FTC in July 1999 to support self regulation

• NAI currently represents 90 percent of Web advertisers

• Determines the proper protocols for managing a Web user’s personal information on the Internet

• Prohibits the collection of consumer data from medical and financial sites

• Allows the combination of Web-collected data and personal information

2001 Prentice Hall, Inc. All rights reserved.

11.2.3 DoubleClick: Marketing with Personal Information

Feature• Regulation of the Internet could limit a company’s

efforts to buy and sell advertising• DoubleClick

– Advertising network of over 1,500 sites and 11,000 clients

• Abacus Direct Corp– Names, addresses, telephone numbers, age, gender, income

levels and a history of purchases at retail, catalog and online stores

• Digital redlining– Skewing of an individual’s knowledge of available products

by basing the advertisements the user sees on past behavior

2001 Prentice Hall, Inc. All rights reserved.

11.2.4 Employer and Employee

• Keystroke cop– Registers each keystroke before it appears on the screen

• Company time and company equipment vs. the rights of employees

• Determining factors– Reasonable expectation of privacy

– Legitimate business interests

• Reasons for surveillance– Slower transmission times

– Harassment suits

– Low productivity

2001 Prentice Hall, Inc. All rights reserved.

11.2.4 Employer and Employee

• Notice of Electronic Monitoring Act– Proposed in 2000

– Would require employers to notify employees of telephone, e-mail and Internet surveillance

– Annual updates or when policy changes are made

– The frequency of surveillance, the type of information collected and the method of collection would also be disclosed

2001 Prentice Hall, Inc. All rights reserved.

11.2.4 Michael A. Smyth vs. The Pillsbury Company Feature

• Dismissed as regional operations manager• Questionable material in e-mail• Pennsylvania law

– “An employer may discharge an employee with or without cause, at pleasure, unless restrained by some contract"

• Public policy– Reprimanding an employee called for jury duty

– Denial of employment as a result of previous convictions

• Verdict awarded to Pillsbury– No reasonable expectation of privacy

– Legitimate business interests

2001 Prentice Hall, Inc. All rights reserved.

11.2.5 Protecting Yourself as a User

• Anonimity and pseudonimity– PrivacyX.com

• Platform for Privacy Preferences Project (P3P)– Browser complies in accordance with users’ privacy

preferences by allowing them to interact in specific ways

• Privacy services and software– Junkbusters.com– PrivacyChoices.org– Center for Democracy and Technology

– Electronic Frontier Foundation

– Electronic Privacy Information Center

– PrivacyRights. org

2001 Prentice Hall, Inc. All rights reserved.

11.2.6 Protecting Your Business: Privacy Issues

• Privacy policy– The stated policy regarding the collection and use of

visitor’s personal information

• Privacy policy services and software– PrivacyBot.com– TRUSTe

2001 Prentice Hall, Inc. All rights reserved.

11.2.6 Protecting Your Business: Privacy Issues

• Core Fair Information Practices – Consumers should be made aware that personal information

will be collected

– The consumer should have a say in how this information will be used

– The consumer should have the ability to check the information collected to ensure that it is complete and accurate

– The information collected should be secured– The Web site should be responsible for seeing that these

practices are followed

2001 Prentice Hall, Inc. All rights reserved.

11.2.6 Protecting Your Business: Privacy Issues

PrivacyBot.com. (Courtesy of Invisible Hand Software, LLC.)

2001 Prentice Hall, Inc. All rights reserved.

11.3 Legal Issues: Other Areas of Concern

• Defamation• Sexually explicit speech• Copyright and patents• Trademarks• Unsolicited e-mail• First Amendment

– "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble and to petition the Government for a redress of grievances"

2001 Prentice Hall, Inc. All rights reserved.

11.3.1 Defamation

• Defamation– The act of injuring another’s reputation, honor or good name

through false written or oral communication

• Libel – Defamatory statements written or spoken in a context in

which they have longevity and pervasiveness that exceed slander

2001 Prentice Hall, Inc. All rights reserved.

11.3.1 Defamation

• Slander– Spoken defamation

• Proving defamation– The statement must have been published, spoken or

broadcast

– There must be identification of the individual(s) through name or reasonable association

– The statement must be defamatory

– There must be fault

– There must be evidence of injury

2001 Prentice Hall, Inc. All rights reserved.

11.3.1 Defamation

• Good Samaritan provision, Section 230 of the Telecommunications Act– Protects ISPs from defamation lawsuits when the ISPs’

attempt to control potentially damaging postings

– “Obscene, lewd, lascivious, filthy, excessively violent, harassing or otherwise objectionable"

2001 Prentice Hall, Inc. All rights reserved.

11.3.1 Cubby vs. Compuserve and Stratton Oakmont vs. Prodigy

Feature• Cubby vs. Compuserve

– Anonymous individual used a news service hosted by Compuserve to post an allegedly defamatory statement

• Distributor vs. publisher– A distributor cannot be held liable for a defamatory

statement unless the distributor has knowledge of the content

– Compuserve was a distributor of content

• Stratton Oakmont vs. Prodigy– Claimed responsibility to remove potentially defamatory or

otherwise questionable material

– Prodigy served as a publisher of the content

2001 Prentice Hall, Inc. All rights reserved.

11.3.2 Sexually Explicit Speech

• Miller vs. California (1973)– The Miller Test identifies the criteria used to distinguish

between obscenity and pornography

– Must appeal to the prurient interest, according to contemporary community standards

– When taken as a whole, lacks serious literary, artistic, political or scientific value

• Challenge of community standards in cyberspace

2001 Prentice Hall, Inc. All rights reserved.

11.3.2 United States vs. Thomas Feature

• Thomas– Internet business owner in California, owner of

pornographic Web site from which merchandise could be ordered

– Accessible by password

– Acceptable by California community standards

– Sold pornographic material to Tennessee resident (opposing community standards)

• Thomas found guilty• Non-content related means

– Effort to control the audience rather than controlling the material

2001 Prentice Hall, Inc. All rights reserved.

11.3.3 Children and the Internet

• Accessibility of information• Decency Act of 1996 (CDA) and Children’s

Online Protection Act of 1998 (COPA) – Designed to restrict pornography on the Internet, particularly

in the interest of children– Overbroad– “Patently offensive,” “indecent” and “harmful to minors”

• Chilling effect– Limiting speech to avoid a lawsuit

• Children’s Online Privacy Protection Act of 2000 (COPPA)– Prohibits Web sites from collecting personal information

from children under the age of 13

2001 Prentice Hall, Inc. All rights reserved.

11.3.4 Alternatives Methods of Regulation

• Blocking and filtering– Allows users to select what kinds of information can and

cannot be received through their browsers

• Blocking and filtering software and services– Surfwatch.com– Cybersitter.com– NetNanny.com

• Infringement of First Amendment rights• Parent’s counsel

– CyberAngels.com– GetNetWise.com– Parentsoup.com

2001 Prentice Hall, Inc. All rights reserved.

11.3.4 Alternatives Methods of Regulation

Net Nanny home page. (Courtesy of Net Nanny SoftwareInternational, Inc.)

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 Intellectual Property: Patents and Copyright

• Copyright– The protection given to the author of an original piece,

including “literary, dramatic, musical, artistic and certain other intellectual works”

– Whether the work has been published or not

– Protects only the expression or form of an idea and not the idea itself

– Provides incentive to the creators of original material

– Guaranteed for the life of the author plus seventy years

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 Intellectual Property: Patents and Copyrights

• Digital Millennium Copyright Act of 1998 (DMCA) – Represents the rights of creative bodies to protect their work

as well as the rights of educators and resource providers to receive access to this work

– Makes it illegal to delete or otherwise alter the identifying information of the copyright owner

– Prevents the circumvention of protection mechanisms and/or the sale of such circumvention mechanisms

– Protects the fair use of copyrighted material

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 Intellectual Property: Patents and Copyright

• Fair use– The use of a copyrighted work for education, research,

criticism

– The purpose of the copyrighted work is examined

– The nature of the copyrighted work is taken into account

– The amount of the material that has been reproduced is reviewed

– The effect is taken into consideration

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 Intellectual Property: Patents and Copyright

• Patent– Grants the creator sole rights to the use of a new discovery

– Protection for 20 years

• Opposing the length of a patent– Does not foster the creation of new material

• Includes “methods of doing business” since 1998– Idea must be new and not obvious to a skilled person

• Amazon’s 1-Click patent– September, 1999

– Huge advantage over competitors, as 65% of shopping carts are abandoned before purchase is complete

– Barnesandnoble.com Express Lane violated patent

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 File Sharing and the Copyright Debate Feature

• Present significant challenges to the traditional treatment of copyright protection

• MP3– A compression method used to substantially reduce the size

of audio files, with no significant reduction in sound quality

• Napster– Operates as a centralized service– Offers software that allows users to download MP3 files

from the hard drives of other members

• Gnutella– Operates as a decentralized service– Individuals with Gnutella software installed on their

computers operate as both a client and a server

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 File Sharing and the Copyright Debate Feature

• Legal issues– Freedom of exchange (enabled by technological

advancements) vs. copyright infringement

– Ability to voice one’s opinion and circumvent efforts of censorship

– If copyrighted works are distributed over the system, creators will have less incentive to continue generating original works

• Sony Betamax (1984) – Courts awarded the victory to Sony, suggesting that the

Betamax provided other uses (recording for personal viewing) that justified its existence

2001 Prentice Hall, Inc. All rights reserved.

11.3.5 United States vs. Lamacchia Feature

• Changed the face of copyright protection (1994)• Posting of copyrighted material• Not guilty under the Copyright Act of 1976

– The violation must have been conducted "willfully and for purposes of commercial advantage or private financial gain”

• LaMachhia did not profit from the copyright violations

• LaMacchia was not convicted for his actions

2001 Prentice Hall, Inc. All rights reserved.

11.3.6 Trademark and Domain Name Registration

• Parasite– Selects a domain name based on common typos made when

entering a popular domain name

• Cybersquatter– Buys an assortment of domain names that are obvious

representations of a brick-and-mortar company

2001 Prentice Hall, Inc. All rights reserved.

11.3.6 Trademark and Domain Name Registration

• Anticybersquatting Consumer Protection Act of 1999 (ACPA) – Protects traditional trademarking in cyberspace

– Protects trademarks belonging to a person or entity other than the person or entity registering or using the domain name

– Persons registering domain names are protected from prosecution if they have a legitimate claim to the domain name

– Domain names cannot be registered with the intention of resale to the rightful trademark owner

2001 Prentice Hall, Inc. All rights reserved.

11.3.7 Unsolicited Commercial E-mail (Spam)

• Cost is primarily incurred by the receiver and the ISP

• Organizations distributing spam– Maintain anonymity and receivers cannot request to be taken

off the organization’s mailing list

– Present themselves as a legitimate company and damage the legitimate company’s reputation

• Unsolicited Electronic Mail Act – Mandates that the nature of the e-mail be made clear

– Would require online marketers to know the policy of every ISP they encounter on the Web

2001 Prentice Hall, Inc. All rights reserved.

11.3.8 Online Auctions

• Question of government regulation• International regulation of auctions• Copyright infringement and auction aggregation

services• The Collections of Information Antipiracy Act

(CIAA) – Makes it easier to prosecute any group which takes listings

from one organization and, in doing so, harms the original business

• Shill bidding– Sellers bid for their own items to increase the bid price

2001 Prentice Hall, Inc. All rights reserved.

11.3.9 Online Contracts

• Electronic Signatures in Global and National Commerce Act of 2000 (E-Sign Bill)– Designed to promote online commerce by legitimizing

online contractual agreements

– Digital agreements will receive the same level of validity as hard-copy counterparts

– Allows cooperating parties to establish their own contracts

2001 Prentice Hall, Inc. All rights reserved.

11.3.10 User Agreements

• Requires users to agree to certain terms regarding the service or product provided by the site before entering

• Shrink-wrap agreement – An agreement printed on the outside of the package holding

the product that becomes binding when the consumer opens the package

• Click-through agreement– A pop-up screen to which users must agree before they can

continue

• Depending on their presentation, these types of agreements can be considered valid by the U. S. courts

2001 Prentice Hall, Inc. All rights reserved.

11.4 Cybercrime

• Auctions, chat rooms and bulletin boards are among the most popular forums for illegal activities

• Viruses, which often lead to denial of service or a loss of stored information, are among the most common cybercrimes

• Stock scams– Crimes in which individuals purchase stocks, then present

false claims about the value of that stock in chat rooms or on bulletin boards to sell them back at a higher price

• Web page hijacking– Web page is used as a gateway (the intermediary between

one site and another) to another site

2001 Prentice Hall, Inc. All rights reserved.

11.4 Cybercrime

FTC “dummy” site for NordiCaLite. (Courtesy of FederalTrade Commission.)

2001 Prentice Hall, Inc. All rights reserved.

11.4 Cybercrime

FTC warning page. (Courtesy of Federal Trade Commission.)

2001 Prentice Hall, Inc. All rights reserved.

11.5 Internet Taxation

• The opposing arguments– Permanent ban on Internet taxation

– Fair taxation of Internet sales

• Taxation methods– If both a vendor and a consumer are located in the same state

sales tax is applied

– If the vendor and the consumer are not located in the same state, then the sale is subject to a use tax

– If the vendor has a physical presence, or nexus, then it is required to collect the tax; otherwise the vendor must assess the tax and pay it directly to the state

2001 Prentice Hall, Inc. All rights reserved.

11.5 Internet Taxation

• Problems with Internet taxation– The definition of physical presence (location of the ISP, the

location of the server or the location of the home page)

– States vary according to what transactions are subject to taxation

– Sales tax revenues are the largest single source of a state’s revenue and are used to fund government-subsidized programs, including the fire department, the police and the public education systems

– State and local governments further argue that removing taxation methods from their jurisdiction infringes upon state sovereignty, an element of the checks-and-balances system maintained by the United States Constitution

2001 Prentice Hall, Inc. All rights reserved.

11.5 Internet Taxation

• Problems with Internet taxation– To meet the taxation requirements of all parties in online

transactions, e-businesses would be required to know and understand all these methods

• Internet Tax Commission– Reviewed the issue of Internet taxation

– Revision of state and local taxes to make taxing a feasible process for Internet businesses

– Establish clearer definitions on the meaning of “physical presence”

– Define universal taxation exemptions