Copyright Laws on Computer Programs and Cyberspace Tort
Computer programs and cyber space usage has become a major part of our every day lives. Nearly everyone has to use a computer at some point, and for some it may be an all day every day affair. This being the case, every one should be aware of the laws and boundaries of cyber space usage, copyright infringement on shareware, freeware, and computer software programs. Most of the main legal issues that relate to cyberspace can be listed as: tort issues, contract issues, intellectual property issues, criminal law issues, and constitutional restraint and protections, and securities law issues. A common issue that occurs in the use of cyberspace is the privacy issue. The computer is often used to commit the tort of invasion of privacy by cyberspace. The limitations of cyberspace privacy are, in order to prove the tort of intrusion into public disclosures of private facts or private affairs, the plaintiff must prove that the defendant revealed private information about the plaintiff. In such a case the plaintiff would also have to prove that the information is presumed private, and the information is entitled to privacy protection. The use of a persons name, likeliness, or image for commercial advantage is also a tort of privacy invasion, which is called tort of appropriation. Defamation in cyber cyberspace is a tort that occurs when a party communicates an untrue statement in the factual form about another to a third party by email or source of the World Wide Web. The information on what was said must be give by the provider of the internet service upon request by a law enforcement agency in pursuit of a warrant. When an internet service provides this information to a law enforcement agency this is not an act of invasion of privacy, but merely a means to protect society and. Misrepresentation and fraud in cyberspace is common when dealing with transactions conducted in cyberspace to consumer related businesses. It is considered fraud to intentionally lie about something that is being purchased or auctioned on the internet. It is a violation of federal law for firms not to tell purchasers when the firms cannot ship ordered products. It is fraud for companies to that use search engines to misrepresent the capabilities of their products. Misrepresentation and fraud allow contracts to be terminated and the give the innocent a right to sue for damages that occurred. Businesses that deal in a great amount of online transacting have use an Electronic Digital Interchange (EDI). An EDI is an alternative method to electronically exchange business forms. The EDI has guidelines that are to be followed if making a contract formation transaction. This system of electronic exchanging business forms to create formal contracts via the internet has been in existence for twenty years and is a safe legalized form of making contractual transactions. The use of specific trademarks, copyrights, and patents are protected by the Federal Intellectual property laws. For example one of these laws is the Federal Trademark Dilution Act. This law forbids a party from using another party's trademark in such a way that it reduces the value or reputation of the trademark. A newer law and regulation that has come into effect is the Digital Millennium Copyright Act. This law makes it clear that it is infringement to link to a copyrighted site. Another new policy that was adopted recently by the Internet Corporation for Assigned Names and Numbers (ICANN), the policy is called the Uniform Domain Name Dispute Resolution Policy; it allows the current user of a domain name to continue using it until a dispute over the name is resolved. A positive cyber space tort crime is possible through the stock market. This is called a "Pump and Dump" ,which occurs when a person or persons build up positive but untrue statements about a business stock, this causes the stock to go up and then...
Please join StudyMode to read the full document