SlideShare a Scribd company logo
2
Most read
3
Most read
12
Most read
Dr. Wisnu Sakti Dewobroto, MSc
¡ The implementation of EC involves many
legal issues :
§ Privacy
§ Intellectual property
§ Free speech
§ Taxation
§ Computer Crimes
§ Consumer protection
§ Other legal issues
¡ If you do something that is not legal, you are
breaking the law. If you do something
unethical, you may not be breaking the law.
¡ Privacy : Collection, storage and
dissemination of information about
individuals
¡ Accuracy : authenticity, fidelity and accuracy
of information collected and processed
¡ Property : Ownership and value of
information and intellectual property
¡ Accessibility : Right to access information and
payment of fees to access it.
¡ Privacy means different things to different
people.
¡ Privacy issues :
How is private information collected :
§ Reading your newsgroup postings
§ Finding you in the internet directory
§ Making your browser record information about you
§ Recording what your browsers say about you
§ Reading your email
¡ Web sites can gather customer information
through filled – out registration
questionnaires
¡ Consequently, users have concerns over
privacy information, although self
registration creates fewer concerns that
cookies.
¡ Make sure end user knows about the
consequences.
¡ A cookie is a piece of information that allows a web
site to record ones comings and goings.
¡ Cookies help websites maintain user status.This
means that web sites can “remember” information
about users and respond to their preferences on a
particular site, process transparent user password and
so on.
¡ However cookies have brought about more concerns
over privacy than self registration because cookies
allow web sites to collect private information such as
users preferences, interests, and surfing patterns on
the web sites user visit.
¡ Users can delete cookie files stored in their
computer. However deleting cookie files
entirely will cause users to start from scratch
with every website they usually.
¡ Use anti cookie software, usually free
software.
¡ The five basic principles :
§ Notice awareness.Consumers must be given notice of an
entity’s information practices prior to collection of personal
information.
§ Choice / consent.Customers must be made aware of their
options as to how their personal information may be used as
well as any potential secondary uses of the information.
§ Access / participation.Consumers must be able to access their
personal information and challenge the validity of the data.
§ Integrity / security.Consumers must be assured that the data is
secure and accurate.
§ Enforcement / redress.There must always be a method of
enforcement and remedy, otherwise there is no real deterrent
or enforceability for privacy issues.
¡ Intellectual property : associated with intangible property
rights, which are created and protected by law :
§ Copyright
§ Patents
§ Trademarks
¡ Copyrights
§ Usually exist in the following works :
▪ Literature works
▪ Musical works
▪ Dramatic works
▪ Artistic works
▪ Sound recordings, film, broadcasts, cable program
▪ Published editions of literary and musical works.
¡ A patent is a document that grants the holder
exclusive rights on an invention for a fixed
number of years.
¡ Trademarks form an important type of
intellectual property. Well known trade marks
are very valuable assets to a business.
¡ A domain name refers to the upper category
of on internet address (URL), such as
www.google.com, www.astaga.com
¡ Top level domain names : .com, .org, .gov,
.edu
¡ Free speech
§ The debate about free speech on the internet
§ Protecting children : One of the major points in the
free speech versus censorship debate is the potential
damage to children
▪ Parent governing their own children
▪ Government protecting children
▪ Responsibility for internet providers
▪ Forcing internet providers to be accountable
§ Responsibility of employers (in office environment)
¡ Spamming refers to the practice of
indiscriminate distribution of messages without
permission of the receive and without
consideration for the messages appropriateness.
¡ How to cut spamming
§ Tell users not to validate their address by answering
spam request for replies if they want to be taken off
mailing list.
§ Disable the relay feature on mail servers so mail
cannot be bounce off the server
§ Delete spam and forget it
§ Use blockers whenever possible.
¡ Electronic CommerceVS Communication
¡ “Should EC business be allowed to operate
without taxing consumers while regular
telephone companies cannot”
¡ Computer crimes usually refer to computer
fraud and computer abuse.
¡ Computer frauds may be committed by mean
of :
§ Alteration of input
§ Alteration of computer data
§ Alteration misuse of programs
§ Destruction / suppression / misappropriation of
output
¡ Online auction fraud : the majority (68%) of
complaints registered at the National Consumers
league deal with auctions. money is collected but the
goods are not satisfactory or not even delivered
¡ Internet stocks fraud. In fall 1998, the securities and
exchange commission (SEC) brought charges against
44 companies and individuals who illegally promoted
stocks on computer bulletin boards, online
newsletters and investment website.
¡ Other financial fraud.
¡ Other fraud in EC :
§ Receive poor quality product and service
§ May not get product in time
The regulatory environment of electronic commerce

More Related Content

PPTX
E commerce infrastructure
PPTX
Regulatory Framework of E-Commerce
PPT
Chp5 electronic commerce in service industry
PPT
Financial institutions
PPTX
ELECTRONIC FUND TRANSFER
PPTX
Chapter 1 (e business)
PPTX
PPTX
Ecommerce and online publishing
E commerce infrastructure
Regulatory Framework of E-Commerce
Chp5 electronic commerce in service industry
Financial institutions
ELECTRONIC FUND TRANSFER
Chapter 1 (e business)
Ecommerce and online publishing

What's hot (20)

PPTX
Security Threats in E-Commerce
PPTX
Forensic accounting ppt (2)
PPTX
New Business Models & Strategies for Internet Economy strategic management
PPTX
E commerce
PPTX
Profit maximisation vs wealth maximisation
PPTX
Application of mis
PPTX
electronic payment system
PPTX
forensic accounting& role and function of forensic accountant
PDF
Correlation and Regression.pdf
PPTX
Recovery management In Banks
PPTX
ethical,social and poltical issues in E-commerce
PDF
Electronic Transaction Act 2063 (ETA 2063)
PPTX
E-Commerce and Online Publishing
PPTX
Internet banking - College Project
PPTX
E business
DOCX
Foreign exchange management notes
PPTX
Ppt on otcei (1)
PPT
E-Commerce Security
PPTX
Security Threats in E-Commerce
Forensic accounting ppt (2)
New Business Models & Strategies for Internet Economy strategic management
E commerce
Profit maximisation vs wealth maximisation
Application of mis
electronic payment system
forensic accounting& role and function of forensic accountant
Correlation and Regression.pdf
Recovery management In Banks
ethical,social and poltical issues in E-commerce
Electronic Transaction Act 2063 (ETA 2063)
E-Commerce and Online Publishing
Internet banking - College Project
E business
Foreign exchange management notes
Ppt on otcei (1)
E-Commerce Security
Ad

Viewers also liked (7)

PDF
Valuation in Indian Regulatory Environment
PPTX
Terms of trade
PPTX
PPT Banking and Regulations
PPTX
Environmental legislation powerpoint
PPTX
Regulatory Framework Chapter 02
PPTX
The Terms of Trade
PPTX
Business Environments
Valuation in Indian Regulatory Environment
Terms of trade
PPT Banking and Regulations
Environmental legislation powerpoint
Regulatory Framework Chapter 02
The Terms of Trade
Business Environments
Ad

Similar to The regulatory environment of electronic commerce (20)

PPTX
Legal And Ethical Aspects.pptx
PPTX
Meetings and the law chicago digital age 050813
PPT
Chp10 public policy
PPTX
Computer security privacy and ethics
PDF
Social Media and the Law
PDF
What to do after a data breach
PPTX
Cyber Literacy PowerPoints Presentations
PDF
Misuse of computer
PPTX
Web Technologies.pptx
PPTX
Web Technologies.pptx
PPTX
Cyber Safety ppt.pptx
PDF
Issues related to ict
PPTX
Internet Safety & Privacy
PPTX
Kasita's presentation
PPTX
E commerce(report)
PPT
Policies and Law in IT
PPTX
Cyber Safety
PDF
Rachel Carson Essay Silent Spring
PPT
Fundraising On The Internet
Legal And Ethical Aspects.pptx
Meetings and the law chicago digital age 050813
Chp10 public policy
Computer security privacy and ethics
Social Media and the Law
What to do after a data breach
Cyber Literacy PowerPoints Presentations
Misuse of computer
Web Technologies.pptx
Web Technologies.pptx
Cyber Safety ppt.pptx
Issues related to ict
Internet Safety & Privacy
Kasita's presentation
E commerce(report)
Policies and Law in IT
Cyber Safety
Rachel Carson Essay Silent Spring
Fundraising On The Internet

More from Wisnu Dewobroto (20)

PDF
Wirausaha Sosial
PDF
Building a Social Enterprise
PDF
Kompetisi Bisnis Mahasiswa Indonesia 2019
PDF
Beyond business model
PDF
Power of define, ideate power of prototyping
PDF
Design experience
PDF
Story telling
PDF
Design thinking meet the coorporation
PDF
Intro to design thinking
PDF
Converting need into demand
PDF
PESTEL analysis
PDF
Managing growing business trough portfolio analysis and service
PDF
Pro forma financial statement
PDF
Quality and global competitiveness
PDF
Quality management , ethics and csr
PDF
Service quality
PDF
Team building and teamwork
PDF
Quality culture
PDF
Quality concept
Wirausaha Sosial
Building a Social Enterprise
Kompetisi Bisnis Mahasiswa Indonesia 2019
Beyond business model
Power of define, ideate power of prototyping
Design experience
Story telling
Design thinking meet the coorporation
Intro to design thinking
Converting need into demand
PESTEL analysis
Managing growing business trough portfolio analysis and service
Pro forma financial statement
Quality and global competitiveness
Quality management , ethics and csr
Service quality
Team building and teamwork
Quality culture
Quality concept

Recently uploaded (20)

PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Types of control:Qualitative vs Quantitative
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPT
Chapter four Project-Preparation material
PPTX
Amazon (Business Studies) management studies
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Business model innovation report 2022.pdf
PPTX
Probability Distribution, binomial distribution, poisson distribution
DOCX
Business Management - unit 1 and 2
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
5 Stages of group development guide.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Belch_12e_PPT_Ch18_Accessible_university.pptx
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Euro SEO Services 1st 3 General Updates.docx
ICG2025_ICG 6th steering committee 30-8-24.pptx
Types of control:Qualitative vs Quantitative
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Chapter four Project-Preparation material
Amazon (Business Studies) management studies
HR Introduction Slide (1).pptx on hr intro
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Business model innovation report 2022.pdf
Probability Distribution, binomial distribution, poisson distribution
Business Management - unit 1 and 2
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
5 Stages of group development guide.pptx
WRN_Investor_Presentation_August 2025.pdf

The regulatory environment of electronic commerce

  • 1. Dr. Wisnu Sakti Dewobroto, MSc
  • 2. ¡ The implementation of EC involves many legal issues : § Privacy § Intellectual property § Free speech § Taxation § Computer Crimes § Consumer protection § Other legal issues
  • 3. ¡ If you do something that is not legal, you are breaking the law. If you do something unethical, you may not be breaking the law.
  • 4. ¡ Privacy : Collection, storage and dissemination of information about individuals ¡ Accuracy : authenticity, fidelity and accuracy of information collected and processed ¡ Property : Ownership and value of information and intellectual property ¡ Accessibility : Right to access information and payment of fees to access it.
  • 5. ¡ Privacy means different things to different people. ¡ Privacy issues : How is private information collected : § Reading your newsgroup postings § Finding you in the internet directory § Making your browser record information about you § Recording what your browsers say about you § Reading your email
  • 6. ¡ Web sites can gather customer information through filled – out registration questionnaires ¡ Consequently, users have concerns over privacy information, although self registration creates fewer concerns that cookies. ¡ Make sure end user knows about the consequences.
  • 7. ¡ A cookie is a piece of information that allows a web site to record ones comings and goings. ¡ Cookies help websites maintain user status.This means that web sites can “remember” information about users and respond to their preferences on a particular site, process transparent user password and so on. ¡ However cookies have brought about more concerns over privacy than self registration because cookies allow web sites to collect private information such as users preferences, interests, and surfing patterns on the web sites user visit.
  • 8. ¡ Users can delete cookie files stored in their computer. However deleting cookie files entirely will cause users to start from scratch with every website they usually. ¡ Use anti cookie software, usually free software.
  • 9. ¡ The five basic principles : § Notice awareness.Consumers must be given notice of an entity’s information practices prior to collection of personal information. § Choice / consent.Customers must be made aware of their options as to how their personal information may be used as well as any potential secondary uses of the information. § Access / participation.Consumers must be able to access their personal information and challenge the validity of the data. § Integrity / security.Consumers must be assured that the data is secure and accurate. § Enforcement / redress.There must always be a method of enforcement and remedy, otherwise there is no real deterrent or enforceability for privacy issues.
  • 10. ¡ Intellectual property : associated with intangible property rights, which are created and protected by law : § Copyright § Patents § Trademarks ¡ Copyrights § Usually exist in the following works : ▪ Literature works ▪ Musical works ▪ Dramatic works ▪ Artistic works ▪ Sound recordings, film, broadcasts, cable program ▪ Published editions of literary and musical works.
  • 11. ¡ A patent is a document that grants the holder exclusive rights on an invention for a fixed number of years. ¡ Trademarks form an important type of intellectual property. Well known trade marks are very valuable assets to a business.
  • 12. ¡ A domain name refers to the upper category of on internet address (URL), such as www.google.com, www.astaga.com ¡ Top level domain names : .com, .org, .gov, .edu
  • 13. ¡ Free speech § The debate about free speech on the internet § Protecting children : One of the major points in the free speech versus censorship debate is the potential damage to children ▪ Parent governing their own children ▪ Government protecting children ▪ Responsibility for internet providers ▪ Forcing internet providers to be accountable § Responsibility of employers (in office environment)
  • 14. ¡ Spamming refers to the practice of indiscriminate distribution of messages without permission of the receive and without consideration for the messages appropriateness. ¡ How to cut spamming § Tell users not to validate their address by answering spam request for replies if they want to be taken off mailing list. § Disable the relay feature on mail servers so mail cannot be bounce off the server § Delete spam and forget it § Use blockers whenever possible.
  • 15. ¡ Electronic CommerceVS Communication ¡ “Should EC business be allowed to operate without taxing consumers while regular telephone companies cannot”
  • 16. ¡ Computer crimes usually refer to computer fraud and computer abuse. ¡ Computer frauds may be committed by mean of : § Alteration of input § Alteration of computer data § Alteration misuse of programs § Destruction / suppression / misappropriation of output
  • 17. ¡ Online auction fraud : the majority (68%) of complaints registered at the National Consumers league deal with auctions. money is collected but the goods are not satisfactory or not even delivered ¡ Internet stocks fraud. In fall 1998, the securities and exchange commission (SEC) brought charges against 44 companies and individuals who illegally promoted stocks on computer bulletin boards, online newsletters and investment website. ¡ Other financial fraud. ¡ Other fraud in EC : § Receive poor quality product and service § May not get product in time