E-Marketing 4/E Judy Strauss, Adel I. El-Ansary, and Raymond Frost Chapter 5: Ethical and Legal Issues ©2006 Prentice Hall 5-1 Chapter 5 Objectives • After reading Chapter 5 you will be able to: • Compare and contrast ethics and law. • Discuss the implications of ethical codes and selfregulation. • Identify some of the main privacy concerns within traditional and digital contexts. • Explain some of the important copyright, patent, trademark, and data ownership issues related to the Internet. • Highlight key ethical and legal concerns related to online expression. ©2006 Prentice Hall 5-2 Piracy Rate by Region, 2006 North America 22% Western Europe 34% Asia Pacific 55% Middle East/Africa 60% Central/Eastern Europe 68% Latin America 66% European Union 36% Worldwide 35% http://www.bsa.org/globalstudy/upload/20052006%20Global%20Piracy%20Study.pdf#search=%22world%20piracy %20rates%202006%22 ©2006 Prentice Hall Software Piracy • • • • 40% of all software worldwide was pirated in 2001. Piracy resulted in a US$10.7 billion loss for firms. 840,000 Internet sites sold counterfeited software. Vietnam, China, Indonesia, Ukraine, and Russia have highest piracy rates. (~90%) • Microsoft believes that education is the best weapon against piracy. Do you agree? • http://www.networkworld.com/news/2006/082506owner-of-software-piracy-site.html ©2006 Prentice Hall 5-3 Yahoo! Case study • The legal action was brought in April 2000 by the French organisations the International League against Racism and Anti-semitism (ILCRA) and the French Jewish students organisation (UEJF). • The case was brought against Yahoo! Inc as well as Yahoo! in France and charged that the American company was in breach of French law for allowing French users to access the company’s American site where Nazi memorabilia was being auctioned, since the sale of such items in France is illegal. ©2006 Prentice Hall • The case was heard in May 2000 in a Paris court by Judge Jean-Jacques Gomez. • The judge convened a three-member technical panel to examine whether it was possible to block French users from accessing parts of an American site. • The judge found – in an order talking of “an ethical and moral imperative – that the company was guilty, ordered it to block access by French users to the relevant part of the American site, and threatened fines for non-compliance of 100,000 francs ($13,300) a day. ©2006 Prentice Hall • In January 2001, Yahoo! Inc announced that it would no longer permit the sale of Nazi memorabilia on its American site, thereby removing access not just to French Internet users but all users. • Yahoo! is now appealing in an American court against the right of a non-American court to impose penalties on an American company. • Megan Meier’s case ©2006 Prentice Hall Morally Characteristic of the Internet • The unusual scope of the Internet in providing many-to-many communications on a global scale • The way the Internet facilitates anonymous communication • The way material sources from the Internet can be reproduced easily ©2006 Prentice Hall Ethics and Legal Issues • Ethics and law are closely related. • Ethics concerns the analysis of what is right and wrong and how we judge the differences. • Ethics is a collective (group) consensus about right and wrong • Modern technology presents a challenge to marketing ethics. Critical issues include: • • • • Ownership of intellectual property Freedom of expression Use of data and its collection Status of children (<18) and digital networks ©2006 Prentice Hall 5-4 Legal Issues Law: • Also an expression of values, • Created for broader purposes = national or sometimes international populations, • It is a public endeavor = made by legislatures such as Congress or Parliament, enforced by executives or agencies, and interpreted by the courts, • Progress in the law can be slow, and particularly within the new context of digital communication. ©2006 Prentice Hall Ethics & Codes of Ethics • The study of ethics: • Ethics central focus is analysis and description of basic concepts as what is right and wrong, types of conduct that comprise ethical behavior . • It involves the examination of responsibilities, rights, and obligations, • Not limited to purely theoretical boundaries but study all levels of human interaction, • Important aspect: the study of professional activities, • Groups of individuals possessing special skills or knowledge have established codes and systems of fair practice, • E.g. The American Marketing Association’s (AMA) Code of Ethics : Professional codes provide members with guidelines which are specific to their pursuits. ©2006 Prentice Hall Right or wrong? • Right or wrong? • • • • • • • downloading music and downloading movies purchasing human organs on the Net online gambling purchasing prescription drugs lying about who you are in an internet chat room purchasing pirated software via Internet auctions or other means sending unsolicited bulk mail messages • Should companies which collect the data own the data? • Should data which is collected be used for another purpose without consent? • What is “informed consent”? ©2006 Prentice Hall Test for ethical behavior • • • • • Is it legal? Is it fair? Does it hurt anyone? Have I been honest with those affected? Can my conscience live with this decision? Thought for the day: ETHICAL BEHAVIOR WILL ALWAYS PAY OFF IN THE LONG RUN (Source: Ethics by Steven Hall and Dr. Ellis Langston ) ©2006 Prentice Hall The Problem of Self-Regulation • What are the roles of formal laws vs. free operation of the market? • Supporters of self-regulation stress the private sector’s ability to identify and resolve problems. • Critics argue that incentives for self-regulation are insufficiently compelling and true deterrence will not be achieved. • The commercial internet evolved during the Clinton Administration which believed in selfregulation –This has not continued under the Bush Administration ©2006 Prentice Hall 5-5 Privacy • The concept of privacy has both ethical and legal aspects. • There is legal confusion regarding privacy. • No specific privacy provision within the U.S. Constitution. • Privacy has been addressed in the common law of the courts. (lawsuits-not arrests) • Within society, privacy interests compete with concerns for safety, economics, and need for association with others. ©2006 Prentice Hall 5-6 4 defined invasion of privacy violations 1. Unreasonable intrusion into seclusion of another 2. Unreasonable publicity of another's private life 3. The appropriation of another’s name or likeness 4. The publication of another’s personal information in a false light. ©2006 Prentice Hall Privacy • Disagreement remains: • The seclusion theory = the ability to remain isolated from society. This model encourages laws and ethical standards which are oriented toward maintaining personal distance and punishing those who cross the limits set by individuals. • The access-control: Places its emphasis upon laws and standards which enable persons to reasonably regulate the information which they are giving up. • The autonomy model: Define what constitutes private data = those which are necessary for a person to make life decisions. ©2006 Prentice Hall Privacy Within Digital Contexts • AMA Code of Ethics for Marketing on the Internet: “information collected from customers should be confidential and used only for expressed purposes.” • Online advertising firms such as DoubleClick, have traditionally recorded users’ clickstreams to form user profiles for marketing purposes. • Controversy arose in 2000 when DoubleClick acquired consumer names, addresses and buying histories and planned to combine the offline data with clickstream data. ©2006 Prentice Hall 5-7 Privacy Within Digital Contexts, cont. • Data can be obtained through cookies. • Cookies are packets of data that are created and stored on the user’s hard drive in response to instructions received from a Web page. • Cookies allow marketers to pinpoint an individual’s online behavior. • www.msn.com >> 20 cookies from 4 domains • www.cnet.com >> 21 cookies from 6 domains ©2006 Prentice Hall 5-8 ©2006 Prentice Hall The Privacy Debate • Supporters of systems such as DoubleClick’s argue that users wish to receive the benefits of targeted advertisers. • Critics point out that most users do not understand how computers process data. • Preliminary terms of the FTC agreement include: • Obligation to provide notice of data collection. • Ban on combining existing data with personal information unless opt-in permission is obtained. ©2006 Prentice Hall 5-9 The FTC and Privacy Norms • The FTC has identified the following norms for the ethical use of consumer information: • Notice: Users should be aware of a site’s information policy before data are collected • Consent: Users should be allowed to choose participation or exclusion from the collection • Access: Users should have the ability to access their data and correct them if erroneous. • Security: Policies to ensure the integrity of data and the prevention of misuse should be in place • Enforcement: Users should have effective means to hold data collectors to their policies. ©2006 Prentice Hall 5-10 Australia National Privacy Principles • • • • • • • • • • Principle 1 - Collection Principle 2 - Use and disclosure Principle 3 - Data quality Principle 4 - Data security Principle 5 - Openness Principle 6 - Access and correction Principle 7 - Identifiers Principle 8 - Anonymity Principle 9 - Trans-border data flows Principle 10 - Sensitive information http://www.privacy.gov.au/publications/npps01.html ©2006 Prentice Hall Protection of Digital Property • The law protects intangible or intellectual property through 3 basic mechanisms. • Copyright • Patent law • Trademark ©2006 Prentice Hall 5-11 Copyright • Copyright is the primary means of protecting most expression on the Internet. • Doctrine of Fair Use • Ability to copy protected material for education and news reporting. • Doctrine of First Sale • Limit the ability of copyright holder to obtain profit after the initial time at which the material is sold. • Other copyright protection under No Electronic Theft Act (NET) and Digital Millennium Copyright Act (DMCA). ©2006 Prentice Hall 5-12 Trademarks • Trademark law concerns the ownership of intellectual property that identifies goods or services. • Trademark law as been applied to the Internet naming system of domain names. • Similarities in names may result in trademark infringement claims. • Cybersquatting involves the registration of domains that resemble or duplicate existing ones. • http://www.buydomains.com/ owned by • http://www.namemedia.com/ ©2006 Prentice Hall 5-13 Patents • Applying patent law to computing is an uncertain but developing field. • Creators of software are attempting to make use of patent law protection. • Advocates argue that granting of patents for software will encourage innovation. • Critics argue that patents will have stifling and monopolistic effects. ©2006 Prentice Hall 5-14 Licenses • Licenses are increasingly popular method of intellectual property protection. • Allow the buyer to use the product but restrict duplication or distribution. • Licenses may be two basic types • Shrinkwrap or break-the-seal licenses • Clickwrap licenses where the user is required to click a button to accept the terms • Legal trend favors enforcement of software licenses. ©2006 Prentice Hall 5-15 Online Expression • Freedom of expression is protected by the First Amendment. • Internet technology has resulted in what many consider inappropriate or untargeted types of consumer contact. • Spam is the mass distribution of unsolicited electronic mail. • CAN-SPAM Act creates a framework for email marketing. • Expression directed to children remains a highly visible issue within online law and ethics. ©2006 Prentice Hall 5-16 Maine Spam law • The Maine legislature enacted a new “spam” law, 10 MRSA §1497 (the “Act”), which became effective on September 13, 2003 • Requires Spam to adhere to certain restrictions • Must be labeled • Must have valid return address • Must have opt-out method • Question; Does the SPAM you received conform? Source: http://www.pierceatwood.com/showarticle.asp?Show=22 ©2006 Prentice Hall Emerging Issues • Online governance • The Internet Corporation for Assigned Names and Numbers (ICANN) was formed in 1998. • Jurisdiction • The ability of a court or other authority to gain control over a party. • Traditionally based on physical presence. • Treaties may provide for international resolution and enforcement. ©2006 Prentice Hall 5-17 Emerging Issues, cont. • Fraud • The use of deception and false claims to obtain profit. • Phishing • The Internet provides opportunities for novel deceptions. • Spoofing is the use of e-mail or Web sites to impersonate individuals or corporations. • The FTC, FBI, and state agencies have increased their efforts to track and prosecute fraudulent conduct. ©2006 Prentice Hall 5-18 Conclusion • Changes within the ethical and legal framework of networked communication are occurring at a fast pace. • Marketing professionals are: • Required to remain well-informed of regulations and accepted practices, • Called upon to contribute to the global dialogue about electronic spaces. ©2006 Prentice Hall