Emptech

Cards (29)

  • Internet law
    The set of legal principles applied in using the Internet and other computer-related actions and interactions of people
  • Ways to regulate the Internet
    • Laws
    • Architecture
    • Norms
    • Market Regulation
  • Laws
    • Most common way of regulating the cyber world. Different countries implement and include laws and policies to prevent problems, issues, and crime on the Internet.
  • Architecture
    • Deals with the information transmission on the internet. It is responsible for limiting or allowing access to data or network. The architecture can regulate the cyber world through the use of firewalls, encryption of data, and other filtering software to avoid misuse and other illegal activities.
  • Norms
    • Are all about the standard behavior of people when interacting online. To avoid problems, it is better to practice proper netiquette (internet etiquette) when connecting to someone online. Aside from netiquette, there are also cultural norms that should be taken into consideration when doing activities online such as posting a joke that might be racist or sexist.
  • Market Regulation
    • Drives the cyber world to innovate and improve. Contents, whether on social media or business, are driven by trends. To engage users, websites and businesses should create good marketing strategies to take advantage of the cyber world while taking into consideration the laws, architecture, and norms.
  • Policies for Online Marketing aim to prevent deceptive and unfair marketing
  • During the early days of the Internet, problems were encountered because online marketers could do whatever they wanted to do
  • As time passed by, lawmakers were able to catch up with this trend to prevent misuse and misconduct of companies in the cyber world
  • The goal of these policies is to prevent deceptive and unfair marketing such as the illegal distribution of customer data, making fake news websites, disguising ads to gather personal information, false advertisements, and the like
  • Business Opportunity Rule
    States that sellers and service providers should present enough information to their prospective customers and clients about their products and services. This ensures that the customer can properly weigh the pros and cons before purchasing a product from the seller.
  • Telephone Consumer Protection Act (TCPA)

    Aims to control the increasing number of telemarketer (telephone marketer) calls to protect the customers by restricting automatic dialing and pre-recorded phone calls. This act also states that there should be consent before calling prospective customers. The telemarketers also need to provide a way for customers to stop the call and prevent further telemarketing calls in the future.
  • CAN-SPAM Act

    Covers the forwarding of newsletters and advertisements through email. This act states that businesses cannot send bulk messages to customers without their consent. It helps to avoid spam messages that contain commercial advertisement and if it is indeed an advertisement, it should be clearly defined on the headings. There should also be an option for the customers to stop receiving emails from the seller.
  • Native Advertising Guidelines
    Natives have a set of rules for placing native ads on different websites whether it is on social media, publishing websites, or e-commerce websites. Native advertisements often do not look like an ad because they follow the format of the website they appear or they might look like an article, news, or entertainment.
  • Using an art, idea, or content on the internet without proper citation, credits, or acknowledgment is a violation of copyright laws because you are stealing intellectual property
  • Digital Millennium Copyright Act (DMCA)

    Aims to regulate the access, use, and copyright of digital media. It imposes penalties on people who commit copyright infringement or illegal use and distribution of copyrighted materials and media. It does not only protect big businesses but also small-scale enterprises and freelancers that publish their work online. It prevents piracy-related crimes on games, movies, music, and other content available online.
  • Fair Use
    Deals with the copying and using of copyrighted materials for a limited purpose such as commenting, criticizing, editing, or creating parodies even without the direct permission of the creator given that the user still acknowledges the copyright. This is a protection for users to avoid copyright infringement claims from the original creators. It ensures that there is a balance of rights for the intellectual property owners and those who want to use it.
  • Anti-Cybersquatting Consumer Protection Act (ACPA)

    Is an act to protect the right of a trademark holder from online abuse such as copying the domain name of popular websites to gain profit called cybersquatting. Buying or using a domain that looks similar to another trademarked business or organization, whether to gain profit or traffic on your website, is considered an offense.
  • Privacy is important online because when you share your personal information, anybody can use that information to harm you and steal from you
  • Gramm-Leach-Bliley Act

    Requires institutions and businesses that provide financial products, such as loans, investments, and insurance, to explain their data protection policies to their customers. This is necessary so that customers will know the practices of the company that they are going to invest their money into to avoid fraud.
  • Health Insurance Portability and Accountability Act (HIPAA)

    Ensures that the data collected from the patients will remain confidential and undisclosed. The patient's consent is needed if there is a need to disclose specific information. This also gives the patient their rights to understand and use their medical information. This rule applies to healthcare providers, and health insurance providers.
  • Children's Online Privacy Protection Act (COPPA)
    Lets parents or guardians control the information that different websites collect from their children. This act applies to children under 13 years or age. This prevents third-party websites from collecting information without the consent of the child's parent or guardian for their security. This act is important because many cyber predators target vulnerable children in their scheme such as cybersex.
  • Computer Fraud and Abuse Act (CFAA)
    Governs most computer-related crimes, one of which is hacking. This law regulates the access of people to different networks and computers without proper authorization. This law is being updated due to the nature of the internet and data is prone to misuse and abuse.
  • Internet law is the set of legal principles governing the Internet. It is used to prevent cybercrime and other misconduct in the cyberworld.
  • There are four ways to regulate the cyberworld: laws, architecture, norms, and market regulation.
  • Policies for Online Marketing set the rules and guidelines in online advertising and business-related transactions.
  • Laws for Intellectual Property deals with the proper citation and fair use of copyrighted materials and intellectual property online.
  • Laws for Online Privacy protect the personal data of online users. It safeguards the privacy of individuals using the Internet against cybersecurity risks and danger.
  • In the Philippines, the Cybercrime Prevention Act of 2012 (R.A. No. 10175) is the existing law that protects information and security of individuals online. It covers various computer-related crimes such as illegal access, misuse of devices, computer-related forgery, and cybersex.