Cyberlaw: The Major Areas, Development, and Information Security Aspects

Dennis M. Powers, Southern Oregon University

Introduction

Intellectual Property

Copyright Law

Domain Names and Trademark Law

Patent

Defamation

Privacy Concerns

Censorship

Cyberfraud

E-Commerce Law

“Click” Contracts

E-Signatures, Taxation, and Spam

“Terms of Use” Provisions

Validity

Information Security Legal Liabilities

Computer Software and Hardware Manufacturer Liabilities

Security-Related Liabilities (Employee)

Hackers, Crackers, and Viruses

To What Extent Is the Victim Liable?

Insurance Law

The Clash of Laws

Cyberlaw Dispute Resolution

The Law of Linking

Cybercrime

Conclusion

Glossary

Cross References

References

Further Reading

INTRODUCTION

As the number of Internet users, Web connections, and personal computers increased exponentially, controversies and legal problems also accelerated in cyberspace without any specific statutes or case law at first to govern the inevitable conflicts. Despite solid preexisting legal foundation, no information medium ever had such an enormous appetite to leapfrog geographic territories and laws, in turn creating intense pressures on that system.

If somebody “ripped off” another's slogan or logo in “pre-Net” California, it was possible that a business located in Chicago would never know the difference. If one person wrote a defamatory article in a local Florida newspaper about someone in Oregon, the defamed person at that time could have died before reading that particular ...

Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.