IT Law

Privacy: protection of your informationPii personally identifiable information, used with security laws to identify a single personWithin ftc guidelines if it is pii you have to opt in, they can't collect pii info unless you let them. If you're logged into yahoo pii can track where you're searching, if not logged in not pii

What is privacy? What is PII? How does PII impact your privacy rights online?

Need Most difficult to utilize: access/participation - you have the right to go through and fix information collected about you if it is wrong but there is so much it is hard to do

What is the FTC's Fair Information Practice Principles? What is the purpose for these principles? From a user's standpoint, which of the principles is the most difficult to utilize?

Protects works:Copying apples computer software for macs and used and sold it elsewhere its copyright law protectsIf you just use algorithms it is protected by patent law

What does copyright law protect? Describe an IT-related example where copyright law is violated.

Protects anything used to identity a productCyber-squatting, cyber-piracy,Name, color scheme, name

What does trademark law protect? Describe an IT-related example where trademark law is violated.

moral right

The claim to privacy rests on the _______ ________ of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state

individuals have a moral right to

Be able to control the use of whatever information is collected about them Know when info is being collected about themHave personal info due process where the process of collecting, sharing, and disseminating personal info is fair and transparent to everyoneHave their personal info stored in a secure manner

notice/awareness

sits must disclose their information practices before collecting data

choice/consent

opt-in for PII, opt-out for non-PII

access/participation

Should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process

security

Reasonable steps to assure that consumer information is accurate and secure

enforcement

there must be a mechanism to enforce FIP principles in place

stricter rules

there are ______ _______ for collecting info about sensitive financial or medical info, sexual behavior or sexual orientation, and social security numbers

stronger

In Europe, privacy protection is much ___________ than it is in the US.

US

In the ___, private organizations and businesses are permitted to use PII gathered in commercial transactions for other business purposes without the prior consent of the consumer (Secondary use)

self-regulation

In the US, privacy laws are enforced primarily through ____________ and suing in court to recover damages - this is expensive and rarely done.

European

_________ countries do not allow business firms to use PII without the prior consent of consumers.

data protection agencies

European countries enforce their privacy laws by creating....

being committed

Law enforcement authorities have long claimed the right under numerous statutes to monitor any form of electronic communication pursuant to a court order and judicial review and based on the reasonable belief that a crime is ________ ___________.

data collection

Several congressional privacy initiatives are currently under consideration regarding unique information gathering scenarios such as _____ ____________ by drones and personal geo-location data.

copyright, patent, trademark

Three main types of intellectual property protection

copy right law protects

original forms of expression such as writings, art, drawing, photographs, music, motion pictures, performances, and computer programs from being copied by others for a period of time.

Copyright protection is for a period of

95 years for corporate owned works, and life plus 70 years for works created by individuals

Federal Copyright Act of 1790

intent behind copyright laws has been to encourage creativity and authorship by ensuring that people receive financial and other benefits from their work

Fair use doctrine

permits teachers, writers, and others to use copyrighted materials without permission under certain circumstances:

Digital Millennium Copyright Act (DMCA) of 1998

the first major effort to adjust the copyright laws to the internet age

DMCA includes sections that:

Make it illegal to circumvent technological measure to protect worksLimits liability of ISPs and search engines for copyright infringement if they comply with safe harborsRequires ISPS to "take down" sites they host if they are infringing on copyrightsPermits users to make a copy of software for maintenance or repair ocf the computerAllows libraries to make digital copies of works for internal useExtends musical copyrights to include "webcasting

patent

grants the owner a 20-year exclusive monopoly on the ideas behind an invention

new and useful

Whoever invents or discovers any ______ _ ________l process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent thereof,, subject to the conditions and requirements of this title

trademark

any word, name, symbol, or device, or any combo thereof... used in commerce... to identify and distinguish... goods... from those manufactured or sold by others and to indicate the source of the goods

internet trademark examples

Cybersquatting Cyberpiracy Metatagging and keywording Linking and framing