0% found this document useful (0 votes)
60 views

E-Business Unit 5

This document discusses several key topics in cyber law: 1) It defines business entities, sales tax, trademarks, internet fraud, copyright, and cyber law. 2) It discusses major ethical issues in e-business like security, privacy, and web tracking. 3) It outlines the objectives of the Information Technology Act of 2000 to facilitate e-commerce and prevent computer crimes.

Uploaded by

Danny Sathish
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

E-Business Unit 5

This document discusses several key topics in cyber law: 1) It defines business entities, sales tax, trademarks, internet fraud, copyright, and cyber law. 2) It discusses major ethical issues in e-business like security, privacy, and web tracking. 3) It outlines the objectives of the Information Technology Act of 2000 to facilitate e-commerce and prevent computer crimes.

Uploaded by

Danny Sathish
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

UNIT 5: CYBER LAWS

Legal Aspects of E-Business


Business entity
A business entity is an organization created by an individual or individuals to conduct business,
engage in a trade or partake in similar activities. There are various types of business entities —
sole proprietorship, partnership, LLC, corporation, etc.
Sales Tax
A sales tax is a tax paid to a governing body for the sales of certain goods and services. Usually
laws allow the seller to collect funds for the tax from the consumer at the point of purchase.
Trademark
A trademark can be any word, phrase, symbol, design, or a combination of these things that
identifies your goods or services. It's how customers recognize you in the marketplace and
distinguish you from your competitors. The word “trademark” can refer to both trademarks and
service marks.
Internet fraud
The term "internet fraud" generally covers cybercrime activity that takes place over the internet
or on email, including crimes like identity theft, phishing, and other hacking activities designed
to scam people out of money.
Internet fraud can be broken down into several key types of attacks, including:
Phishing and spoofing: The use of email and online messaging services to dupe victims into
sharing personal data, login credentials, and financial details.
Data breach: Stealing confidential, protected, or sensitive data from a secure location and
moving it into an untrusted environment. This includes data being stolen from users and
organizations.
Denial of service (DoS): Interrupting access of traffic to an online service, system, or network to
cause malicious intent.
Malware: The use of malicious software to damage or disable users’ devices or steal personal
and sensitive data.
Ransom ware: A type of malware that prevents users from accessing critical data then
demanding payment in the promise of restoring access. Ransom ware is typically delivered via
phishing attacks.
Business email compromise (BEC): A sophisticated form of attack targeting businesses that
frequently make wire payments. It compromises legitimate email accounts through social
engineering techniques to submit unauthorized payments.
Copyright
Copyright (or author’s right) is a legal term used to describe the rights that creators have over
their literary and artistic works. Works covered by copyright range from books, music, paintings,
sculpture, and films, to computer programs, databases, advertisements, maps, and technical
drawings.
Cyber Law
Cyber Law is the area of law that deals with the Internet's relationship to technological and
electronic elements, including computers, software, hardware and information systems (IS).
Cyber Law is also known as Internet Law.
Cyber laws prevent or reduce large scale damage from cybercriminal activities by protecting
information access, privacy, communications, intellectual property (IP) and freedom of speech
related to the use of the Internet, websites, email, computers, cell phones, software and hardware,
such as data storage devices.
Ethical Aspects of E-Business
Ethics is the branch of philosophy that studies what’s right and wrong. Ethics is important in E-
Business if an organization wants the people to trust it and do business with it. Major ethical
issues related to e-commerce are as follows:
Security
Ethics is about responsibility and it’s become moral responsibility of organization to protect the
customer’s information such as names, addresses, and credit card numbers from hackers.
Information can be secure by protecting websites with multi-layers of protection against hackers
using firewall, anti-malware software or encryption for online orders.
Privacy
The second ethical issue relates to privacy, which involves protecting the collection, storage,
processing, and destruction of personal information. Respecting consumer privacy rights is a
legal requirement and represents good business practice. If customers trust a site and business
then they are more likely to trade with it.
Web Tracking
E-businesses can describe information about the visitor’s activity on website through log files.
Companies track individual’s movement through tracking software and cookie analysis.
Programs such as cookies raise a batch of privacy concerns. The tracking history is stored on
your PC’s hard disk and any time you revisit a website the computer knows it. Many smart end
users install programs such as cookie cutters, spam butcher etc., which can provide users some
control over the cookies. For example, software such as Privacy Guardian, My Privacy, etc. can
protect user’s online privacy by erasing browser’s cache, surfing history and cookies.

IT Act, 2000 Salient Features

The Information Technology Act was enacted in the year 2000 with major objectives to the
growth of electronic based transactions, to provide legal recognition for e-commerce and e-
transactions, to facilitate e-governance, to prevent computer based crimes and ensure security
Practices and procedures in the context of widest possible use of information technology
worldwide.

The following are its main objectives of I T Act 2000:

 To give legal recognition to any transaction which is done by electronic way or use of
internet.

 To give legal recognition to digital signature for accepting any agreement via computer.

 To provide facility of filling document online relating to school admission or registration


in employment exchange.

 According to I.T. Act 2000, any company can store their data in electronic storage.

 To stop computer crime and protect privacy of internet users.

 To give legal recognition for keeping books of accounts by bankers and other companies
in electronic form.

 To make more power to IPO (Initial Public Offering), RBI and Indian Evidence act for
restricting electronic crime.

You might also like