Sei sulla pagina 1di 4

1.

Write two or three paragraphs in which you describe the role that culture
plays in the development of a countrys laws and ethical standards.
Culture is the customary beliefs, social forms, and material traits of a racial,
religious, or social group. Laws are created as idea of what would be ethical conduct
in that culture. Culture, laws, and ethics changes everywhere you go.
In some cultures it is it is ethical, legal and expected to give a bribe when doing
business with a company in that country. Businesses in the United States it is both
illegal and unethical to do business using bribery.

2. In the past, geographic borders have helped governments assert jurisdiction


effectively. Write two paragraphs in which you describe one way the Internet
has changed the role borders play in the determination of jurisdiction.
The Internet has change criminal activity using the Internet outside a counties
boarders. Content on a Web page, hacking, products, or service maybe legal in a
source county and illegal in a target county. The citizen of the source county could
not be prosecuted since they are outside the jurisdiction of the target county, and
their laws do not apply to the source counties citizens.
Sometimes cyber-crimes are illegal in both counties, but the source counties
government will fails to cooperate with the target county. Also, cross-border
searches and seizures of cyber-crime evidence by enforcement officials in one
country violate the territorial authority of the country where the data is located.

3. In one or two paragraphs, describe what a long-arm statute accomplishes and


describe a situation in which an online retail business might become subject
to such a statute.
Long-arm statute allows state courts to bring charges, hear cases, and personal
jurisdiction over a nonresident who have legal issues with that state. If a business is
doing any Internet marketing and people out-of-state are buying their products or
services, that businesses is subjected to lawsuits in other states. For example if you
buy a product or service, that you are not satisfied with it or receive an injury due to
product or service malfunction you can sue that out-of-state business in your states
court system.
4. Assume you have downloaded an app for your smart phone. In one or two
paragraphs, describe how you and the apps seller have each obtained
consideration in the completion of the transaction.

Before downloading your app both the buyer and the seller must go through the
consideration element essential to contracts. The apps seller accepts your offer will
exchange the app for your debit, or credit card number. The apps seller acquires
consideration when they receive the payment for the app and you acquire
consideration when you download the app.
5. Many large organizations use Apache Web server software even though it is
not sold by a well-known company that provides ongoing support. Write a
paragraph in which you explain why organizations are willing to do this..
The use of Apache Web server software is preferred by organization because it is a
collaborative software development that is support around the world. The Apache
HTTP Server is developed and maintained an open-source HTTP server for current
operating systems including UNIX and Windows NT. Open source software can be
down loaded for free, but organization purchase it from venders for additional
security. Although open source software is considered to be more secure, because it
is not as well-known as Microsoft Windows OS.

6. In one or two paragraphs, describe the conditions under which a collection of


facts can be copyrighted.

Facts that are selected and arranged into a collection such as data bases may be
copyrighted and fall in to sweat of the brow doctrine. According to the U.S.
Copyright Office, Sweat of the brow was applied to cases involving purely factual
compilations, such as catalogs and directories. Sometimes the two approaches
appeared to be melded together in a single case, with the court focusing on the
labor and skill contributed by the author. With very few exceptions, one or the
other approach was drawn upon by the court to support the conclusion that a
particular compilation was protectable, rather than to deny protection
7. In two or three paragraphs, explain the differences among trademarks,
service marks, and trade names. In your explanation, include at least one
example of each.
A trademark is a mark that is applied to goods, trademarks indicate the source of
goods. One of the most well-known trademark is: McDonalds with its golden arches.
A service mark is a mark that is used identify services provided. An example of a
service mark is Greyhound (service mark Greyhound Bus Lines). This mark would
be termed a service mark, rather than a trademark, because it is used in the
delivery of services rather than being applied to a good. A mark refers to either a
trademark or a service mark. Trademarks and service marks are registered with

state government and/or federal government and protected by trademark laws.


Trade name is a name of a company.
A trade name is generally considered the name a business uses for advertising and
sales purposes. Trade names are not protected by trademark laws they are
protected under common law. Examples of trade names are the use of the name
"Kodak" by the company whose legal name is Eastman Kodak Company or
McDonalds by the company whose legal name is McDonald's Corporation. A
trade name may not include Inc., LLC, Corp. or similar legal endings. Trademarks
relate to goods; service marks relate to services; and trade names relate to
companies.

8. In two or three paragraphs, explain how the WIPOs Domain Name Dispute
Resolution process overcomes some of the jurisdictional issues that might
arise if a United States court were to hear these types of disputes instead.
The United States courts is not equipped to handle domain names disputes. First of
all the U.S. court system is already has many cases on their dockets adding domain
name disputes would slow the court system down even further. The other issue is
domain name exist on the Internet which has no boundaries. U.S. courts have no
jurisdiction outside it border therefor hearing domain name disputes between two
parties one which is out of the county the court ruling could be ignored by the party
outside U.S. borders. On the other hand the United Nations World Intellectual
Property Organization (WIPO) is much better equipped to resolve domain name
disputes, under its Uniform Domain Name Dispute Resolution Policy (UDRP).
The Internet Corporation for Assigned Names and Numbers (ICANN), the
organization responsible for, managing of generic top level domains was in need of
a binding procedures to settle domain name dispute. ICANN commissioned WIPO,
which protects intellectual property worldwide, to produce a report on the conflict
between trademarks and domain names. In 1999, ICANN adopted WIPOs UDRP
which is an international organization, it can go beyond state and county borders
and make binding ruling on domain name disputes. UDRP, is the leading ICANN
recognized domain name dispute resolution service providers (WIPO.int).

9. Explain what a digital watermark is in one or two paragraphs, and then write
an additional paragraph in which you provide an example of an online
business (other than the audio and video recording industries mentioned in
the chapter) that might use digital watermarks.
A digital watermark, is digital code made up of bits or stream embedded into a
digital image, audio or video file that identifies the files copyright information. The
name watermark comes from the barely visible watermarks imprinted on stationery

that identify the manufacturer. The purpose of digital watermarks is to provide


copyright protection for intellectual property that is in digital format.
An online publishing business would use a digital watermarks to copyright protect
their documents. For example the business could create a document in Microsoft
Publisher, or Word click the Design tab and insert a digital watermark then save the
document as PDF. The business then can publish the PDF strait to the Web or as a
links on their Web site

10.Many advance fee frauds are targeted at older, often retired, persons. Write a
paragraph or two in which you provide an example of an advance fee fraud,
and then write another paragraph in which you explain why older persons
might be more likely targets for this type of criminal activity.
An example of an advance fee frauds (AFF) would be you will receive a letter, email,
or fax postmarked from a foreign country, which offers you a confidential business
proposal from someone claiming to be a foreign business professional. The official
looking letter, email, or fax informs you that millions of dollars were paid to a group
of people in a class action law suit, and now the only way to access this money is to
transfer the funds to a foreign bank account, as payment for a debt owed. You had
been selected to help these people to access the money by simply allowing the
funds to be transferred into your bank account.
In exchange for this service, you will receive a percent of the millions of dollars that
is in a holding account, accessible to the business professional. All you need to do
is provide, your banker's name, the account number, address, and name of the
beneficiary who will receive all these millions of dollars.

The reason older people are targets for advance fee frauds is they are likely to have
a nest egg, own their home, and have excellent credit. People who grew up in the
30s, 40s, and 50s were generally raised to be polite and trusting, these individuals
will not say no when contacted by perpetrators. The elderly are less likely to report
a fraud because they dont know who to report it to, ashamed at having been
scammed, or do not know they have been scammed. Finley when an elderly victim
does report the crime, they often make poor witnesses. Perpetrators know all these
weaknesses, and they are count on them to make the elderly victims of advance fee
frauds.

Potrebbero piacerti anche