SlideShare a Scribd company logo
Online & New Media Marketing
SNC-MKTG350
November 13, 2013
Tonight’s Agenda: Ethics
• Quiz
• Class Discussion:
– Ethics in online marketing
• Laws
• Don’t be evil
• Responsibilities
It’s Legal, does that make it
Ethical?

Legal
Ethical
Ethics on the Internet
Your Ethics Examples
•
•
•
•
•
•

Email Spam
Misleading offers
Outright fraud
Information theft
Failure to protect someone else (fiduciary)
False statements/lack of transparency
Relevant Laws
• CAN-SPAM of 1998

– Don’t send unless you have a relationship (FTC)
– Must have contact info
– Must be able to opt-out

• Children's Online Privacy Protection Act of 1998
– No collecting info from children (FTC)

• Digital Millennium Copyright Act of 1998.

– Civil and criminal penalties for pirating and other
unauthorized use of software.

• And many, many more…
Say you stole an idea online…
• You’re caught
• And convicted
• How did you get the info in the first place?
– Who else is an accessory?
– Computer?
– Internet service provider?
Is Online marketing different
than regular marketing?
Don’t be evil
• Ways to be evil:
– Stealing things
• Hacking
• Mis-appropriating data

– “Snookering” buyers
•
•
•
•

Spam
Mis-routing links
Poor products
False statements
Being transparent
Hacking & Mis-Appropriation
Deceptive Practices
Specialty group targeting
Living trusts
Time shares
Children
Marketing to Children
Less experience in critical thinking
Want to conform
Spending parents’ money
Your Responsibilities
• Protecting things you don’t own but are responsible
for from being stolen or compromised
• Not misleading your audience
• Providing value

• Sourcing and paying for value you received
Invading/Protecting Privacy
Copyright Infringement
Overcharging
Are you going to be ethical?

SO…
• What was a new idea for you?
• What will you do differently?
• What will you be watchful for?
Next session:
• Last Quiz on Monday: ethics
• Week of Nov 18 Discussion:
– Public Policy
– International Digital Marketing

• Week of Nov 22: No class/Thanksgiving
• Week of Dec 2: Workshop your plans in class
• Dec 16: Final presentations

More Related Content

PPTX
Breach of Privacy in the Age of Technology
PDF
Privacy and Security in Mobile E-Commerce
PPTX
Divorce in the Digital Era
PPT
Chapter2
PDF
Legal ethical issues E commerce
PPT
Legal & moral issues in e commerce
PDF
Big Data and Big Law at Walmart - StampedeCon 2013
PPTX
Cyber security and fl data breach
Breach of Privacy in the Age of Technology
Privacy and Security in Mobile E-Commerce
Divorce in the Digital Era
Chapter2
Legal ethical issues E commerce
Legal & moral issues in e commerce
Big Data and Big Law at Walmart - StampedeCon 2013
Cyber security and fl data breach

What's hot (20)

PPT
Legal instrumentation in e commerce
PPTX
Social Media & Legal Risk
PPTX
Identity thefts
PPT
Aleksandr Yampolskiy Presentation
PPT
Legal social ethical
PPTX
social, legal and ethical issues of e-commerce..
PPT
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
PPTX
Data Protection & Risk Management
PPT
Privacy and E-Commerce
PPT
Ethics in e commerce n it
PPT
E-Commerce 10
PPT
legal and ethcal issues of e business
PPT
Personal Data Privacy and Information Security
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPTX
Who ownes the customer? Privacy in the connected age.
PPTX
Cyber Banking Conference
PDF
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
PPTX
Presentation on Information Privacy
PDF
Privacy & publicity trade secrets in Wisconsin
PPSX
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Legal instrumentation in e commerce
Social Media & Legal Risk
Identity thefts
Aleksandr Yampolskiy Presentation
Legal social ethical
social, legal and ethical issues of e-commerce..
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
Data Protection & Risk Management
Privacy and E-Commerce
Ethics in e commerce n it
E-Commerce 10
legal and ethcal issues of e business
Personal Data Privacy and Information Security
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Who ownes the customer? Privacy in the connected age.
Cyber Banking Conference
Essentials of Cyberspace Law: User Generated Content, Privacy and Online Adve...
Presentation on Information Privacy
Privacy & publicity trade secrets in Wisconsin
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Ad

Viewers also liked (17)

PPT
Phonology chapter 9
DOCX
Contact sheets showing range of original photographs
PDF
Gisเป้
PPTX
Trip to mazatlan.
DOCX
Organización de archivos drive
PDF
Leonardo da Vinci
DOCX
Textos analogos
DOCX
Bahan bm c
PPTX
Draft text
PPT
Metodo de Paginaciòn
PDF
Cpa реклама вконтакте
PDF
IANS Connector Event Deck: Factor 6
PPTX
Malaria 13
PDF
ประวัติ
DOCX
Revicion 1 ligia
PDF
Crt рекламы вконтакте
DOCX
Contact sheets showing range of original photographs
Phonology chapter 9
Contact sheets showing range of original photographs
Gisเป้
Trip to mazatlan.
Organización de archivos drive
Leonardo da Vinci
Textos analogos
Bahan bm c
Draft text
Metodo de Paginaciòn
Cpa реклама вконтакте
IANS Connector Event Deck: Factor 6
Malaria 13
ประวัติ
Revicion 1 ligia
Crt рекламы вконтакте
Contact sheets showing range of original photographs
Ad

Similar to Mktg350 lecture 11132013 (20)

PPTX
Kasita's presentation
PDF
The Information Commissioner calls - what to expect and how to react, May 201...
PPTX
Ehsan Kabir Solicitor-Ethics Frameworks
PDF
Chp 05 anonymity, security, privacy and civil liberties (shared)
PPT
ethcpp04-Unit 3.ppt
PPT
ethcpp04-Unit 3.ppt
PPT
E Marketing Ethical and Legal Issues
PPTX
Chapter 3
PPTX
Thierer Internet Privacy Regulation
PPTX
Behavioraltargeting
PPTX
PPTX
Balancing Privacy and Digitization
PPT
Cyber crime Introduction
PPTX
Legal And Ethical Aspects.pptx
PDF
Chapter 9_dp-pertemuan_14
PPTX
Privacy & the Internet: An Overview of Key Issues
PPTX
GDPR_Skillcast Presentation Template.pptx
PPTX
IT_Security_and_Ethics_Presentation.pptx
PPTX
GDPR for Dummies
Kasita's presentation
The Information Commissioner calls - what to expect and how to react, May 201...
Ehsan Kabir Solicitor-Ethics Frameworks
Chp 05 anonymity, security, privacy and civil liberties (shared)
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
E Marketing Ethical and Legal Issues
Chapter 3
Thierer Internet Privacy Regulation
Behavioraltargeting
Balancing Privacy and Digitization
Cyber crime Introduction
Legal And Ethical Aspects.pptx
Chapter 9_dp-pertemuan_14
Privacy & the Internet: An Overview of Key Issues
GDPR_Skillcast Presentation Template.pptx
IT_Security_and_Ethics_Presentation.pptx
GDPR for Dummies

More from lkirkman (19)

PPT
Mktg350 lecture 11182013
PPT
Mktg350 lecture 11062013
PPT
Mktg350 lecture 11042013
PPT
Mktg350 lecture 10302013
PPT
Mktg350 lecture 10212013
PPT
Mktg350 lecture 10232013
PPT
Mktg350 lecture 10162013
PPT
Mktg350 lecture 10142013
PPT
Mktg350 lecture 09302013
PPT
Mktg350 lecture 10022013
PPTX
Mktg350 lecture 09252013
PPTX
Mktg350 lecture 09232013
PPTX
Mktg350 lecture 09182013
PPTX
Mktg350 lecture 09112013
PPTX
Mktg350 lecture 09092013
PPTX
Mktg350 lecture 09052013
PPTX
Mktg350 lecture 08282013
PPTX
Mktg350 lecture 08192013
PPTX
Mktg350 lecture 08212013
Mktg350 lecture 11182013
Mktg350 lecture 11062013
Mktg350 lecture 11042013
Mktg350 lecture 10302013
Mktg350 lecture 10212013
Mktg350 lecture 10232013
Mktg350 lecture 10162013
Mktg350 lecture 10142013
Mktg350 lecture 09302013
Mktg350 lecture 10022013
Mktg350 lecture 09252013
Mktg350 lecture 09232013
Mktg350 lecture 09182013
Mktg350 lecture 09112013
Mktg350 lecture 09092013
Mktg350 lecture 09052013
Mktg350 lecture 08282013
Mktg350 lecture 08192013
Mktg350 lecture 08212013

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
The various Industrial Revolutions .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
O2C Customer Invoices to Receipt V15A.pptx
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
Final SEM Unit 1 for mit wpu at pune .pptx
The various Industrial Revolutions .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
NewMind AI Weekly Chronicles - August'25-Week II
A comparative study of natural language inference in Swahili using monolingua...
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
WOOl fibre morphology and structure.pdf for textiles
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
Module 1.ppt Iot fundamentals and Architecture
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf
OMC Textile Division Presentation 2021.pptx

Mktg350 lecture 11132013

Editor's Notes

  • #2: Let’s say I had some notes here.
  • #12: Mis-appropriation: mis-linking, keyboard sniffers, email take-overs, not pying taxes, over-stating traffic