SlideShare uma empresa Scribd logo
1 de 15
Copyright © 2017 Cengage Learning. All Rights Reserved.
BUSINESS LAW TODAY
INTERNET LAW
Roger LeRoy Miller
Copyright © 2017 Cengage Learning. All Rights Reserved.
Copyright © 2017 Cengage Learning. All Rights Reserved.
Internet Law,
Social Media, and Privacy
Outline
• 7-1 Internet Law
• 7-2 Copyrights in Digital Information
• 7-3 Social Media
• 7-4 Online Defamation
• 7-5 Privacy
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives (slide 1 of 2)
1. What is cybersquatting, and when is
it illegal?
2. What steps have been taken to
protect intellectual property rights in
the digital age?
3. When does the law protect a person’s
electronic communications from
being intercepted or accessed?
Copyright © 2017 Cengage Learning. All Rights Reserved.
Learning Objectives (slide 2 of 2)
4. What law governs whether Internet
service providers are liable for online
defamatory statements made by
users?
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-1c Cybersquatting (slide 1 of 2)
– Case Example 7.2 WIPO Case No.
D2012-0951
– Anticybersquatting Legislation
1. The domain name is identical or confusingly
similar to the trademark of another.
2. The one registering, trafficking in, or using the
domain name has a “bad faith intent” to profit
from that trademark.
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-1c Cybersquatting (slide 1 of 2)
– Cybersquatting and the Domain Name
Distribution System
• Case Example 7.3 OnNet USA, Inc. v. Play9D.com
(2013)
– Typosquatting
– Applicability and Sanctions of the ACPA
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-1d Meta Tags
– Key words that give Internet browsers
specific information about a Web page.
– Using another’s trademark in a meta tag
without the owner’s permission normally
constitutes trademark infringement.
– Case Example 7.5 Toyota Motor Sales,
U.S.A., Inc. v. Tabari (2010)
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-1e Trademark Dilution in the
Online World
– Trademark dilution occurs when a
trademark is used, without authorization,
in a way that diminishes the distinctive
quality of the mark.
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-2 Copyrights in Digital
Information
 7-2a Copyright Infringement
• Case Example 7.6 Bridgeport Music, Inc. v.
Dimension Films (2005)
 7-2b MP3 and File-Sharing
Technology
– Methods of File-Sharing
– Sharing Stored Music Files
• Case Example 7.8 A&M Records, Inc. v. Napster,
Inc. (2001); Metro-Goldwyn-Mayer Studios, Inc. v
Grokster, Ltd. (2005)
• Case Example 7.9 Maverick Recording Co. v.
Copyright © 2017 Cengage Learning. All Rights Reserved.
Landmark in the Law
 The Digital Millennium Copyright Act
 Without the DMCA copyright owners
would have a more difficult time
obtaining legal redress against those
who decrypt or copy copyrighted
materials.
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-3a Uses in the Legal Process
– Administrative Agencies
• Federal regulators also use social media posts in
their investigations into illegal activities.
• Case Example 7.16 In re O’Brien (2013)
– Employers’ Social Media Policies
• Case Example 7.17 Rodriquez v. Wal-Mart Stores,
Inc. (2013)
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-3b The Electronic
Communications Privacy Act
– Prohibits the intentional interception of any
wire, oral, or electronic communication.
– It also prohibits the intentional disclosure or
use of the information obtained by the
interception.
– Exclusions
– Stored Communications
• Case Example 7.18 Pietrylo v. Hillstone
Restaurant Group (2009)
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-4 Online Defamation
 7-4a Identifying the Author of Online
Defamation
– An initial issue raised by online defamation is
simply discovering who is committing it.
– An Internet service provider can disclose
personal information about its customers
only when ordered to do so by a court.
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-4b Liability of Internet Service
Providers
– Should ISPs be regarded as publishers and
therefore be held liable for defamatory
messages that are posted by their users in
online forums or other arenas?
– General Rule
– Exceptions
• Case Example 7.20 Fair Housing Council of San
Fernando Valley v. Roommate.com, LLC. (2012)
Copyright © 2017 Cengage Learning. All Rights Reserved.
7-5 Privacy
 The right to privacy is guaranteed by
the Bill of Rights and some state
constitutions.
 7-5a Reasonable Expectation of
Privacy
 7-5b Data Collection and Cookies
 7-5c Internet Companies’ Privacy
Policies
 7-5d Protecting Consumer Privacy

Mais conteúdo relacionado

Mais procurados

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright ProtectionGrittyCC
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of thingsAkib B. Momin
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Zero Price Ruleについての分析
Zero Price Ruleについての分析Zero Price Ruleについての分析
Zero Price Ruleについての分析Toshiya Jitsuzumi
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet GovernanceDiploFoundation
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 

Mais procurados (10)

Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Zero Price Ruleについての分析
Zero Price Ruleについての分析Zero Price Ruleについての分析
Zero Price Ruleについての分析
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Short Introduction to Internet Governance
Short Introduction to Internet GovernanceShort Introduction to Internet Governance
Short Introduction to Internet Governance
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 

Destaque

Violeta tamurana
Violeta tamuranaVioleta tamurana
Violeta tamuranaiconcepcion
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731jeffreylancaster
 
NEW PRODUCT LAUNCH "IDEAL LINK"
NEW PRODUCT LAUNCH "IDEAL LINK"NEW PRODUCT LAUNCH "IDEAL LINK"
NEW PRODUCT LAUNCH "IDEAL LINK"PASHA MASROOR
 
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523jeffreylancaster
 
Vasquez cristiana visual_resumestoryboard2.pptx
Vasquez cristiana visual_resumestoryboard2.pptxVasquez cristiana visual_resumestoryboard2.pptx
Vasquez cristiana visual_resumestoryboard2.pptxCristianav
 
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)Elsevier/Maryland Publishing Connect - 14_0331 (pdf)
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)jeffreylancaster
 
טיפול בעזרת כלבים כבא
טיפול בעזרת כלבים כבאטיפול בעזרת כלבים כבא
טיפול בעזרת כלבים כבאDaniel Pavis
 
Paralegal Power Break: Biting Off More Than You Can Chew
Paralegal Power Break:  Biting Off More Than You Can ChewParalegal Power Break:  Biting Off More Than You Can Chew
Paralegal Power Break: Biting Off More Than You Can ChewParalegal Rainmakers
 
Igcs教育雲端教學服務平台介紹與展示 final v4_for public
Igcs教育雲端教學服務平台介紹與展示 final v4_for publicIgcs教育雲端教學服務平台介紹與展示 final v4_for public
Igcs教育雲端教學服務平台介紹與展示 final v4_for publicKuan-Ting Chen
 
SAA- Preguntas examen II-2016
SAA- Preguntas examen II-2016SAA- Preguntas examen II-2016
SAA- Preguntas examen II-2016SALONVIRTUAL
 
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813jeffreylancaster
 
9조 910 사례발표 그린그라피티
9조 910 사례발표 그린그라피티9조 910 사례발표 그린그라피티
9조 910 사례발표 그린그라피티성도 김
 
Primary schoolpdhpe
Primary schoolpdhpePrimary schoolpdhpe
Primary schoolpdhpealiciab91
 
Analytic FrameworkからClinical Questionへ20151104 1
Analytic FrameworkからClinical Questionへ20151104 1Analytic FrameworkからClinical Questionへ20151104 1
Analytic FrameworkからClinical Questionへ20151104 1Hidemichi Yuasa
 

Destaque (20)

Violeta tamurana
Violeta tamuranaVioleta tamurana
Violeta tamurana
 
The First 10 Steps to Extreme Self Care
The First 10 Steps to Extreme Self CareThe First 10 Steps to Extreme Self Care
The First 10 Steps to Extreme Self Care
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
 
NEW PRODUCT LAUNCH "IDEAL LINK"
NEW PRODUCT LAUNCH "IDEAL LINK"NEW PRODUCT LAUNCH "IDEAL LINK"
NEW PRODUCT LAUNCH "IDEAL LINK"
 
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523
Emerging Technologies: Outlooks, Problems, and Challenges - NYSTL - 13_0523
 
Vasquez cristiana visual_resumestoryboard2.pptx
Vasquez cristiana visual_resumestoryboard2.pptxVasquez cristiana visual_resumestoryboard2.pptx
Vasquez cristiana visual_resumestoryboard2.pptx
 
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)Elsevier/Maryland Publishing Connect - 14_0331 (pdf)
Elsevier/Maryland Publishing Connect - 14_0331 (pdf)
 
טיפול בעזרת כלבים כבא
טיפול בעזרת כלבים כבאטיפול בעזרת כלבים כבא
טיפול בעזרת כלבים כבא
 
Paralegal Power Break: Biting Off More Than You Can Chew
Paralegal Power Break:  Biting Off More Than You Can ChewParalegal Power Break:  Biting Off More Than You Can Chew
Paralegal Power Break: Biting Off More Than You Can Chew
 
Igcs教育雲端教學服務平台介紹與展示 final v4_for public
Igcs教育雲端教學服務平台介紹與展示 final v4_for publicIgcs教育雲端教學服務平台介紹與展示 final v4_for public
Igcs教育雲端教學服務平台介紹與展示 final v4_for public
 
SAA- Preguntas examen II-2016
SAA- Preguntas examen II-2016SAA- Preguntas examen II-2016
SAA- Preguntas examen II-2016
 
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813
ACS National Meeting - Libraries as Hubs for Emerging Technologies - 14_0813
 
Ca pulmón
Ca pulmónCa pulmón
Ca pulmón
 
9조 910 사례발표 그린그라피티
9조 910 사례발표 그린그라피티9조 910 사례발표 그린그라피티
9조 910 사례발표 그린그라피티
 
Primary schoolpdhpe
Primary schoolpdhpePrimary schoolpdhpe
Primary schoolpdhpe
 
TED presentation
TED presentationTED presentation
TED presentation
 
Analytic FrameworkからClinical Questionへ20151104 1
Analytic FrameworkからClinical Questionへ20151104 1Analytic FrameworkからClinical Questionへ20151104 1
Analytic FrameworkからClinical Questionへ20151104 1
 
Westlaw Research Strategies
Westlaw Research StrategiesWestlaw Research Strategies
Westlaw Research Strategies
 
3 ways to use
3 ways to use3 ways to use
3 ways to use
 
Pags06 09
Pags06 09Pags06 09
Pags06 09
 

Semelhante a Paralegal Power Break: Internet Law

Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinNapier University
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Thingsmabualsh
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...Chris Marsden
 
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)Joseph Onele
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptxMhndHTaani
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
Copyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital ProjectsCopyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital ProjectsRachael Samberg
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Graham Smith
 

Semelhante a Paralegal Power Break: Internet Law (20)

Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017Graham Smith - Internet and eCommerce Law Review 2017
Graham Smith - Internet and eCommerce Law Review 2017
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Data Privacy of the Internet of Things
Data Privacy of the Internet of ThingsData Privacy of the Internet of Things
Data Privacy of the Internet of Things
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)
Domain names and cybersquatting as deadly threats to trade marks in nigeria (2)
 
Small Cell Forum: Security Briefing
Small Cell Forum: Security BriefingSmall Cell Forum: Security Briefing
Small Cell Forum: Security Briefing
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
it act
it actit act
it act
 
Copyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital ProjectsCopyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital Projects
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?
 

Mais de Paralegal Rainmakers

Paralegal Power Break: Internet Marketing for Paralegals
Paralegal Power Break: Internet Marketing for ParalegalsParalegal Power Break: Internet Marketing for Paralegals
Paralegal Power Break: Internet Marketing for ParalegalsParalegal Rainmakers
 
Paralegal Power Break: Time is Money, Use it Wisely
Paralegal Power Break: Time is Money, Use it WiselyParalegal Power Break: Time is Money, Use it Wisely
Paralegal Power Break: Time is Money, Use it WiselyParalegal Rainmakers
 
How to Become a Triple Threat Paralegal
How to Become a Triple Threat ParalegalHow to Become a Triple Threat Paralegal
How to Become a Triple Threat ParalegalParalegal Rainmakers
 
Paralegal Power Break: The law of criminal procedure
Paralegal Power Break:  The law of criminal procedureParalegal Power Break:  The law of criminal procedure
Paralegal Power Break: The law of criminal procedureParalegal Rainmakers
 
Paralegal Power Break: Legal Ethics
Paralegal Power Break: Legal EthicsParalegal Power Break: Legal Ethics
Paralegal Power Break: Legal EthicsParalegal Rainmakers
 
Paralegal Power Break: Sources of Law (Cases)
Paralegal Power Break: Sources of Law (Cases)Paralegal Power Break: Sources of Law (Cases)
Paralegal Power Break: Sources of Law (Cases)Paralegal Rainmakers
 
Paralegal Power Break: Client Interview Techniques
Paralegal Power Break:  Client Interview TechniquesParalegal Power Break:  Client Interview Techniques
Paralegal Power Break: Client Interview TechniquesParalegal Rainmakers
 
2 9-17 estate administration court & participants
2 9-17 estate administration court & participants2 9-17 estate administration court & participants
2 9-17 estate administration court & participantsParalegal Rainmakers
 
Paralegal Power Break: The Law of Succession
Paralegal Power Break: The Law of SuccessionParalegal Power Break: The Law of Succession
Paralegal Power Break: The Law of SuccessionParalegal Rainmakers
 
Paralegal Power Break: The Estate Plan & Wills
Paralegal Power Break:  The Estate Plan & WillsParalegal Power Break:  The Estate Plan & Wills
Paralegal Power Break: The Estate Plan & WillsParalegal Rainmakers
 
Paralegal Power Break: International Sports Law Issues
Paralegal Power Break: International Sports Law IssuesParalegal Power Break: International Sports Law Issues
Paralegal Power Break: International Sports Law IssuesParalegal Rainmakers
 
Paralegal Power Break: eDiscovery 101
Paralegal Power Break: eDiscovery 101Paralegal Power Break: eDiscovery 101
Paralegal Power Break: eDiscovery 101Paralegal Rainmakers
 
Paralegal Power Break: Save Time & Earn More
Paralegal Power Break: Save Time & Earn MoreParalegal Power Break: Save Time & Earn More
Paralegal Power Break: Save Time & Earn MoreParalegal Rainmakers
 
Improve Your Paralegal Skills On-line
Improve Your Paralegal Skills On-lineImprove Your Paralegal Skills On-line
Improve Your Paralegal Skills On-lineParalegal Rainmakers
 
Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers
 
Legal Research: Honing in on the Right Information
Legal Research:  Honing in on the Right Information Legal Research:  Honing in on the Right Information
Legal Research: Honing in on the Right Information Paralegal Rainmakers
 

Mais de Paralegal Rainmakers (20)

Paralegal Power Break: Internet Marketing for Paralegals
Paralegal Power Break: Internet Marketing for ParalegalsParalegal Power Break: Internet Marketing for Paralegals
Paralegal Power Break: Internet Marketing for Paralegals
 
Paralegal Power Break: Time is Money, Use it Wisely
Paralegal Power Break: Time is Money, Use it WiselyParalegal Power Break: Time is Money, Use it Wisely
Paralegal Power Break: Time is Money, Use it Wisely
 
Paralegal Connection Plan
Paralegal Connection PlanParalegal Connection Plan
Paralegal Connection Plan
 
How to Become a Triple Threat Paralegal
How to Become a Triple Threat ParalegalHow to Become a Triple Threat Paralegal
How to Become a Triple Threat Paralegal
 
Paralegal Power Break: The law of criminal procedure
Paralegal Power Break:  The law of criminal procedureParalegal Power Break:  The law of criminal procedure
Paralegal Power Break: The law of criminal procedure
 
Paralegal Power Break: Legal Ethics
Paralegal Power Break: Legal EthicsParalegal Power Break: Legal Ethics
Paralegal Power Break: Legal Ethics
 
Paralegal Power Break: Sources of Law (Cases)
Paralegal Power Break: Sources of Law (Cases)Paralegal Power Break: Sources of Law (Cases)
Paralegal Power Break: Sources of Law (Cases)
 
Paralegal Power Break: Client Interview Techniques
Paralegal Power Break:  Client Interview TechniquesParalegal Power Break:  Client Interview Techniques
Paralegal Power Break: Client Interview Techniques
 
2 9-17 estate administration court & participants
2 9-17 estate administration court & participants2 9-17 estate administration court & participants
2 9-17 estate administration court & participants
 
Paralegal Power Break: The Law of Succession
Paralegal Power Break: The Law of SuccessionParalegal Power Break: The Law of Succession
Paralegal Power Break: The Law of Succession
 
Paralegal Power Break: The Estate Plan & Wills
Paralegal Power Break:  The Estate Plan & WillsParalegal Power Break:  The Estate Plan & Wills
Paralegal Power Break: The Estate Plan & Wills
 
Paralegal Power Break: International Sports Law Issues
Paralegal Power Break: International Sports Law IssuesParalegal Power Break: International Sports Law Issues
Paralegal Power Break: International Sports Law Issues
 
Paralegal Power Break: eDiscovery 101
Paralegal Power Break: eDiscovery 101Paralegal Power Break: eDiscovery 101
Paralegal Power Break: eDiscovery 101
 
Paralegal Power Break: Save Time & Earn More
Paralegal Power Break: Save Time & Earn MoreParalegal Power Break: Save Time & Earn More
Paralegal Power Break: Save Time & Earn More
 
E discovery Process Improvement
E discovery Process ImprovementE discovery Process Improvement
E discovery Process Improvement
 
Improve Your Paralegal Skills On-line
Improve Your Paralegal Skills On-lineImprove Your Paralegal Skills On-line
Improve Your Paralegal Skills On-line
 
Paralegal Mastery
Paralegal MasteryParalegal Mastery
Paralegal Mastery
 
Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1Paralegal Rainmakers Digest Volume 4 Issue 1
Paralegal Rainmakers Digest Volume 4 Issue 1
 
Legal Research: Honing in on the Right Information
Legal Research:  Honing in on the Right Information Legal Research:  Honing in on the Right Information
Legal Research: Honing in on the Right Information
 
Career Success Principles
Career Success PrinciplesCareer Success Principles
Career Success Principles
 

Último

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Paralegal Power Break: Internet Law

  • 1. Copyright © 2017 Cengage Learning. All Rights Reserved. BUSINESS LAW TODAY INTERNET LAW Roger LeRoy Miller Copyright © 2017 Cengage Learning. All Rights Reserved.
  • 2. Copyright © 2017 Cengage Learning. All Rights Reserved. Internet Law, Social Media, and Privacy Outline • 7-1 Internet Law • 7-2 Copyrights in Digital Information • 7-3 Social Media • 7-4 Online Defamation • 7-5 Privacy
  • 3. Copyright © 2017 Cengage Learning. All Rights Reserved. Learning Objectives (slide 1 of 2) 1. What is cybersquatting, and when is it illegal? 2. What steps have been taken to protect intellectual property rights in the digital age? 3. When does the law protect a person’s electronic communications from being intercepted or accessed?
  • 4. Copyright © 2017 Cengage Learning. All Rights Reserved. Learning Objectives (slide 2 of 2) 4. What law governs whether Internet service providers are liable for online defamatory statements made by users?
  • 5. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-1c Cybersquatting (slide 1 of 2) – Case Example 7.2 WIPO Case No. D2012-0951 – Anticybersquatting Legislation 1. The domain name is identical or confusingly similar to the trademark of another. 2. The one registering, trafficking in, or using the domain name has a “bad faith intent” to profit from that trademark.
  • 6. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-1c Cybersquatting (slide 1 of 2) – Cybersquatting and the Domain Name Distribution System • Case Example 7.3 OnNet USA, Inc. v. Play9D.com (2013) – Typosquatting – Applicability and Sanctions of the ACPA
  • 7. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-1d Meta Tags – Key words that give Internet browsers specific information about a Web page. – Using another’s trademark in a meta tag without the owner’s permission normally constitutes trademark infringement. – Case Example 7.5 Toyota Motor Sales, U.S.A., Inc. v. Tabari (2010)
  • 8. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-1e Trademark Dilution in the Online World – Trademark dilution occurs when a trademark is used, without authorization, in a way that diminishes the distinctive quality of the mark.
  • 9. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-2 Copyrights in Digital Information  7-2a Copyright Infringement • Case Example 7.6 Bridgeport Music, Inc. v. Dimension Films (2005)  7-2b MP3 and File-Sharing Technology – Methods of File-Sharing – Sharing Stored Music Files • Case Example 7.8 A&M Records, Inc. v. Napster, Inc. (2001); Metro-Goldwyn-Mayer Studios, Inc. v Grokster, Ltd. (2005) • Case Example 7.9 Maverick Recording Co. v.
  • 10. Copyright © 2017 Cengage Learning. All Rights Reserved. Landmark in the Law  The Digital Millennium Copyright Act  Without the DMCA copyright owners would have a more difficult time obtaining legal redress against those who decrypt or copy copyrighted materials.
  • 11. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-3a Uses in the Legal Process – Administrative Agencies • Federal regulators also use social media posts in their investigations into illegal activities. • Case Example 7.16 In re O’Brien (2013) – Employers’ Social Media Policies • Case Example 7.17 Rodriquez v. Wal-Mart Stores, Inc. (2013)
  • 12. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-3b The Electronic Communications Privacy Act – Prohibits the intentional interception of any wire, oral, or electronic communication. – It also prohibits the intentional disclosure or use of the information obtained by the interception. – Exclusions – Stored Communications • Case Example 7.18 Pietrylo v. Hillstone Restaurant Group (2009)
  • 13. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-4 Online Defamation  7-4a Identifying the Author of Online Defamation – An initial issue raised by online defamation is simply discovering who is committing it. – An Internet service provider can disclose personal information about its customers only when ordered to do so by a court.
  • 14. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-4b Liability of Internet Service Providers – Should ISPs be regarded as publishers and therefore be held liable for defamatory messages that are posted by their users in online forums or other arenas? – General Rule – Exceptions • Case Example 7.20 Fair Housing Council of San Fernando Valley v. Roommate.com, LLC. (2012)
  • 15. Copyright © 2017 Cengage Learning. All Rights Reserved. 7-5 Privacy  The right to privacy is guaranteed by the Bill of Rights and some state constitutions.  7-5a Reasonable Expectation of Privacy  7-5b Data Collection and Cookies  7-5c Internet Companies’ Privacy Policies  7-5d Protecting Consumer Privacy