Lecture 1 (November 3)

advertisement
Introduction to IT and ECommerce Law and Policy
Dr. Theodore H. K. Clark
Associate Professor and Academic Director of
MSc Program in IS Management
Department of Information & Systems Management
Hong Kong University of Science & Technology
and Visiting Associate Professor of Operations & Information Management
(Information Economics and Strategy Group) 1998 - 2001
The Wharton School of the University of Pennsylvania
What is CyberLaw?








Intellectual Property Laws
Internet Laws and Regulations
Telecommunications Laws and Regulations
Software Laws (including encryption)
Copyright Law
Patent Law
Trademark Law
International Trade Laws and Treaties
2
HKUST Business School
Law, Regulation, and Policy




What do we mean by the “rule of law”?
Who makes laws? How are they made?
What is the relationship between laws and
regulations or policy?
Which of these are most applicable to the
different areas of Cyberlaw? Why?
3
HKUST Business School
CyberLaw is a MYTH!






There is no CyberLaw.
There are many CyberLaws.
Noone can make laws in Cyberspace.
Everyone makes laws in Cyberspace.
Cyberspace is unregulated.
Cyberspace is excessively regulated by every
jurisdiction applying conflicting laws.
4
HKUST Business School
Internet Governance

Internet Law and Telecom Law






No laws, many laws, both at once!
Evolving slowly for Telecom Law
Developing slowly for Internet Law
Role of ITU in Telecom and Internet
Role of USA in Telecom and Internet Law
Law, Regulation, and Policy


Why do we need an Internet law at all?
Network Solutions, Inc. as Cyberspace Landlord
5
HKUST Business School
CyberLaw: Mice and Elephants



There are many laws that apply to
Cyberspace, but these laws can be difficult to
enforce against small, entrepreneurial firms.
Large firms are like elephants, they are easy
to see and find and they will crush anything
in their way, but they can’t hind for long.
Small firms, like mice, might be crushed or
killed, but 3 more will rise when one is killed;
governments can not effectively stop them.
6
HKUST Business School
Intellectual Property Law






Copyright Laws
Patent Laws
Trademark Laws
Trade Secrets Laws
Software Law as special application
Encryption different from Software Laws


Military or Government Security Issues
Freedom of Speech Issues
7
HKUST Business School
Software Law


Protected by copyright law, not by patent
laws
Stronger that patents in some ways, but
weaker in others





Longer protected life than patent
Immediate copyright protection upon creation
Fair use doctrine as defense
Does not protect idea, only expression
Stops exact copying, not functional duplication
8
HKUST Business School
Patent Law

Protects FUNCTION, not expression



Lengthy application and approval process




Amazon patented its one-click function, as
copyright would not have protected this function
Replicating code for one-click function easy to do
Significant legal costs may be required
Patents may be required in multiple jurisdictions
Patent limited to exact terms of application
Be careful to limit patent claims narrowly
HKUST Business School
Trademark Law

Protects brands, corporate names or slogans


Significant source of litigation in Cyberspace




“It’s the real thing: Coke”
Same name of firm in different states, who has
right to use the name in Cyberspace?
Domain name squaters? Legalized blackmail?
New cyberspace domains created – confusion?
Can not be generic or functional (Xerox)

Strongest defense for fabricated names
10
HKUST Business School
Trade Secret

Information must be kept confidential



Software can be trade secret if compiled



Sharing with any outside party voids rights
Must inform employees information is secret
Incompatible with copyright – not published
Misappropriation illegal, replication legal
May include elements of public domain in
system, but must have unique secrets
11
HKUST Business School
Software as Expression


Justification for applying copyright to
software is that it is an expression like that of
an artist’s novel or a painting
This raises question regarding applicability of
freedom of speech for software and code



US constitution protects freedom of speech
US government tried to stop publishing of
encryption code as security law violations
Academics claimed code was protected speech
12
HKUST Business School
Copyright, Software, and the
Applications to the Internet

Any copying in print or electronic form of any
expression without author’s consent is violation of
copyright protections, even if only for an instant




Fair use doctrine not adequate defense for Internet



Copyright always exists immediately upon publication
Rights can be waived, but need not be asserted to be valid
Any copying of expression is violation, unless exception
Limited to copying small percentage only for non-profit use
Internet copies the entire site many, many times
Special exceptions to copyright laws created for ISPs

Be careful about copying others’ website code!
13
HKUST Business School
Jurisdiction and Choice of Law


Most businesses have the right to choose the laws
they will operate under and be subject to
Cyberspace firms may be held liable for violations of
laws in ANY JURSIDICTION from which citizens of
that nation can view their websites!





France and eBay auctions for USA – strict liability.
German and Compuserve pro-Nazi sites in USA.
Italian site subject to US law in New York.
State laws in USA – community standards applied
Firms responsible for preventing local law violation


No automatic membership, check address, age, etc.
Alternatively, be small and hard to sue! (e.g., porn sites)
14
HKUST Business School
Contract Law and the Internet

Terms of use important for eCommerce




Warrantees trump disclaimers




Make choice of law and venue clear in contract
Require action to affirm customer has read terms
Inconsistent or unclear terms favor customers
Be careful about express or implied warantees
Make terms clear of any intended guarantees
Make disclaimers clear and consistent everywhere
Puffing allowed, but be careful about bounds
15
HKUST Business School
Computer Crimes

Most computer crimes involve insiders



More than 30% and possibly more than 50%
of major firms experience computer crime



Hacking happens, but generally with inside help
Increasing computer crime and associated costs
Why are reported statistics much lower?
Computer crime analogy to sexual assault
Cost of prevention versus cost of recovery
16
HKUST Business School
Download