EMARKETING6 E CHAPTER 5 Ethical and Legal Issues

  • Slides: 28
Download presentation
E-MARKETING/6 E CHAPTER 5 Ethical and Legal Issues

E-MARKETING/6 E CHAPTER 5 Ethical and Legal Issues

CHAPTER 5 OBJECTIVES 5 -2 After reading Chapter 5, you will be able to:

CHAPTER 5 OBJECTIVES 5 -2 After reading Chapter 5, you will be able to: Compare and contrast ethics and law. Discuss the implications of ethical codes and self-regulation. Identify some of the main privacy concerns within traditional and digital contexts. Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet. Highlight key ethical and legal concerns related to online expression. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

SOFTWARE INFRINGEMENT 5 -3 Compare and contrast ethics and law. Copyright violation occurs when

SOFTWARE INFRINGEMENT 5 -3 Compare and contrast ethics and law. Copyright violation occurs when people download copyrighted software without a license, loan software to others for which they have no licenses, or install software on more computers than allowed. Counterfeiting occurs when illegally copied software is duplicated and distributed on a large scale. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -4 SOFTWARE INFRINGEMENT, CONT. Microsoft uses the following remedies: Proposes intellectual property legislation.

5 -4 SOFTWARE INFRINGEMENT, CONT. Microsoft uses the following remedies: Proposes intellectual property legislation. Files civil lawsuits. Creates noninfringement technologies such as digital rights management (DRM) security programs embedded in software CDs. Microsoft believes that education is the best weapon against piracy. Do you agree? © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

ETHICS AND LEGAL ISSUES 5 -5 Ethics is a general endeavor that takes into

ETHICS AND LEGAL ISSUES 5 -5 Ethics is a general endeavor that takes into account the concerns and values of a society as a whole. Laws are normally created for broader purposes, with the goal of addressing national or sometimes international populations. Although there is a relationship between ethics and legality, they are separate entities that should be treated as such. Ethics and law are integrally related. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -6 ETHICS AND LEGAL ISSUES, CONT. American Marketing Association (AMA) Codes of ethics

5 -6 ETHICS AND LEGAL ISSUES, CONT. American Marketing Association (AMA) Codes of ethics states a commitment to: Honesty Integrity Fairness Modern technology presents challenges to marketing ethics. Critical issues include: Ownership of intellectual property The role of privacy in a virtual world Freedom of expression Use of data and its collection Status of children and digital networks © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

THE PROBLEM OF SELF-REGULATION 5 -7 Discuss the implications of ethical codes and selfregulation

THE PROBLEM OF SELF-REGULATION 5 -7 Discuss the implications of ethical codes and selfregulation Recent U. S. administrations have left the development of the Internet to the free operation of the market. Supporters of self-regulation stress the private sector’s ability to identify and resolve problems. Critics argue that incentives for self-regulation are insufficient and true prevention will not be achieved. Recent policy-making activities indicate that governments are asserting themselves in areas such as fraud prevention and children’s privacy. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

PRIVACY 5 -8 Identify some of the main privacy concerns within traditional and digital

PRIVACY 5 -8 Identify some of the main privacy concerns within traditional and digital contexts. The concept of privacy encompasses both ethical and legal aspects. There is constant debate regarding privacy and it has proved to be an elusive concept, both ethically and legally. Within society, privacy interests compete with concerns for safety, economics, and even the social and psychological need for association with others. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -9 PRIVACY WITHIN DIGITAL CONTEXTS Conflicts about how data should be collected and

5 -9 PRIVACY WITHIN DIGITAL CONTEXTS Conflicts about how data should be collected and used have developed. AMA Code of Ethics for marketing on the Internet: “information collected from customers should be confidential and used only for expressed purposes. ” Online advertising firms such as Double. Click have traditionally recorded users’ clickstreams to form user profiles for marketing purposes. Controversy arose in 2000 when Double. Click acquired consumer names, addresses, and buying histories and planned to combine the offline data with clickstream data. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -10 PRIVACY WITHIN DIGITAL CONTEXTS ONLINE DATA COLLECTION Data are obtained through the

5 -10 PRIVACY WITHIN DIGITAL CONTEXTS ONLINE DATA COLLECTION Data are obtained through the use of digital cookies, packets of data created and stored on the user’s hard drive in response to instructions received from a web page. Cookies serve many purposes: Create shopping baskets to hold purchases Recall stored sales information Collect user data Cookies allow marketers to pinpoint an individual’s online behavior. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -11 PRIVACY WITHIN DIGITAL CONTEXTS PRIVACY DEBATES AND POLICY Access to personal data

5 -11 PRIVACY WITHIN DIGITAL CONTEXTS PRIVACY DEBATES AND POLICY Access to personal data is another important online privacy issue. Cutting-edge applications also raise additional issues. Hostile applets Intelligent agents While federals laws relating to Internet privacy remain in debate, many offenses can be addressed by conventional statutes: Fair Credit Reporting Act Electronic Communication Privacy Act © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

PRIVACY WITHIN DIGITAL CONTEXTS OTHER PRIVACY ISSUES 5 -12 Opt-in Policies that allow consumers

PRIVACY WITHIN DIGITAL CONTEXTS OTHER PRIVACY ISSUES 5 -12 Opt-in Policies that allow consumers to control data Data collection can only take place if there is an affirmative decision to participate Opt-out Presumes data collection will take place Allows users to withdraw consent by sending an email to those requesting the data The Children’s Online Privacy Protection Act (COPPA) established policies for ethical collection of information from children 12 or under. Privacy within electronic mail remains an unsettled aspect of online interaction. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

INTERNATIONAL PRIVACY ISSUES 5 -13 The European Union (EU) and the U. S. reached

INTERNATIONAL PRIVACY ISSUES 5 -13 The European Union (EU) and the U. S. reached agreement in 2000 to protect EU citizen data. The Federal Trade Commission (FTC) has identified the following norms for the ethical use of consumer information: Notice – before data is collected Consent – choose to participate Access – access data and correct if necessary Security – policies to ensure the integrity of data Enforcement – effective means to hold data collectors to their policies © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

DIGITAL PROPERTY 5 -14 Explain some of the important patent, copyright, trademark, and data

DIGITAL PROPERTY 5 -14 Explain some of the important patent, copyright, trademark, and data ownership issues related to the Internet. The law protects intangible or intellectual property through 3 basic mechanisms: Patent law is centered on inventions. Copyright addresses issues of expression. Trademark is concerned with words or images used in the market. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

PATENTS 5 -15 “The registered protection of innovations and the ability to reproduce or

PATENTS 5 -15 “The registered protection of innovations and the ability to reproduce or manufacture an inventor’s product”. Applying patent law to computing is an uncertain but developing field. Patents prevent competitors from doing the same thing a different way. Patent protection has been claimed for reverse online auctions and secure credit card processing. The U. S. Patent Office has decided to increase the rigor of reviewing applications for software -related protection. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

COPYRIGHT 5 -16 Copyright is “a protection of the right to publish or duplicate

COPYRIGHT 5 -16 Copyright is “a protection of the right to publish or duplicate the expressions of ideas”. Copyright is the primary means of protecting most expression on the Internet. Doctrine of Fair Use Ability to copy protected material for education and news reporting. Doctrine of First Sale Limit the ability of copyright holder to obtain profit after the initial time at which the material is sold. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

COPYRIGHT, CONT. 5 -17 The No Electronic Theft (NET) Act was signed into law

COPYRIGHT, CONT. 5 -17 The No Electronic Theft (NET) Act was signed into law in 1997. Provide copyright protection for computer content and imposes permissions for violation. The 1998 Digital Millennium Copyright Act (DMCA) contains several provisions. Protects ISPs from acts of user infringement. Criminalizes the circumvention of software protections. Complies with international standards for copyrighted material. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

TRADEMARKS 5 -18 Trademark law concerns the “ownership of intellectual property that identifies goods

TRADEMARKS 5 -18 Trademark law concerns the “ownership of intellectual property that identifies goods or services”. Trademarks may be registered with the government. Trademark law as been applied to the Internet naming system of domain names. Similarities in names may result in trademark infringement claims. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

TRADEMARKS CONT. 5 -19 A trademark violation, Cybersquatting, involves the registration of domains that

TRADEMARKS CONT. 5 -19 A trademark violation, Cybersquatting, involves the registration of domains that resemble or duplicate existing ones. Metatags – HTML tags that describe a website’s contents Provide a valuable means of attracting users to a site Allow search engines to identify sites Keywords Used within search engines Variations may drive consumers to unlicensed dealers © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

LICENSES 5 -20 Licenses are an increasingly popular method of intellectual property protection. Licenses

LICENSES 5 -20 Licenses are an increasingly popular method of intellectual property protection. Licenses are “contractual agreements made between consumers and software vendors”. Licenses allow the buyer to use the product but restrict duplication or distribution. Licenses may be two basic types: Shrinkwrap or break-the-seal licenses Clickwrap licenses where the user is required to click to accept the terms Legal trend favors enforcement of software licenses. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

TRADE SECRETS 5 -21 The Economic Espionage Act of 1996 makes it a criminal

TRADE SECRETS 5 -21 The Economic Espionage Act of 1996 makes it a criminal offense to reveal trade secrets such as commercial, scientific and technical endeavors Trade secrets may include: Formulas, Market data, Algorithms, Programs, Codes, and Models

DATA OWNERSHIP 5 -22 Legal and ethical debates about data access and ownership questions

DATA OWNERSHIP 5 -22 Legal and ethical debates about data access and ownership questions abound. Online technologies such as click data and spidering raise concerns about data ownership. A movement is growing to protect data related to facts, namely specially compiled databases or sui generis data. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

DATA OWNERSHIP, CONT. 5 -23 Click data provides data access from: Site owners Marketing

DATA OWNERSHIP, CONT. 5 -23 Click data provides data access from: Site owners Marketing professionals Advertisers Consumers Spidering Using robots to enter targeted website Obtains data for the use of its owner © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -24 Highlight key ethical and legal concerns related to online expression ONLINE EXPRESSION

5 -24 Highlight key ethical and legal concerns related to online expression ONLINE EXPRESSION Internet technology has resulted in what many consider inappropriate or untargeted types of consumer contact. Spam is the mass distribution of unsolicited electronic mail. The AMA Code of Ethics addresses the spam issue The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages The argument remains between opt-in and opt-out approaches to unsolicited email © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -25 ONLINE EXPRESSION, CONT. CAN-SPAM Act of 2003 created a comprehensive, national framework

5 -25 ONLINE EXPRESSION, CONT. CAN-SPAM Act of 2003 created a comprehensive, national framework for email marketing. Expression directed to children remains a highly visible issue within online law and ethics. The boundaries of expression will continue to be challenged by the Internet. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

EMERGING ISSUES 5 -26 The Internet Corporation for Assigned Names and Numbers (ICANN) was

EMERGING ISSUES 5 -26 The Internet Corporation for Assigned Names and Numbers (ICANN) was formed in 1998 to resolve conflicts related to domain naming. A private, non-profit regulatory body Responsible for the administration of the Internet name and address system Criticisms Operating under secrecy Failing to represent the broad range of online users Jurisdiction is the ability of a court or other authority to gain control over a party. Traditionally based on physical presence. Agreements may provide for international resolution and enforcement. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

EMERGING ISSUES, CONT. 5 -27 Fraud is the use of deception and false claims

EMERGING ISSUES, CONT. 5 -27 Fraud is the use of deception and false claims to obtain profit. The Internet provides opportunities for novel deceptions. The average person is not in a position to understand how information is displayed, transferred, or stored Spoofing is the use of e-mail or websites to impersonate individuals or corporations. The FTC, FBI, and state agencies have increased their efforts to track and prosecute fraudulent conduct. © 2012 PEARSON EDUCATION, INC. PUBLISHING AS PRENTICE HALL

5 -28 All rights reserved. No part of this publication may be reproduced, stored

5 -28 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall