Lecture Notes On Legal and Ethical Issues-400
Lecture Notes On Legal and Ethical Issues-400
CONTRACT
SECURITY
AUTHENTICATI0N
All though the Internet eliminates the need for physical contact, it
does not do away with the fact that any form of contract or
transaction would have to be authenticated. Different
authentication technologies have evolved over a period of time to
ensure the identity of the parties entering into online transactions.
However, there are some issues that need to be considered by
companies. a. Digital Signatures to be used as authentication tools:
The IT Act stipulates that digital signatures should be used for the
purposes of authenticating an electronic contract. The digital
signature must follow the Public Key infrastructure (“PKI”). This
acts as a limitation on the use of any other technology for
authentication purposes. If Indian ecommerce companies use
some other form of authentication technology, it could be said that
there has been no authentication at all.
APPLICABLE LAW
PRIVACY
A company must also keep in mind that since IPRs are inherently
territorial in nature, it may be difficult to adjudge as to whether the
IPR in a work or invention is infringed, if it is published or used
over the Internet, which is intrinsically boundless in nature. For
example, if ‘Company A’ has a trademark registered in Ghana for
software products, but a web portal based in the US uses the same
trademark for marketing either software products or for marketing
some other goods, it may become difficult for Company A to sue
for infringement.
DOMAIN NAMES
Failure to comply with such foreign laws may lead to liability under
such law. For example, an Indian company using comparative
advertising on the worldwide web, not knowing that such practices
are prohibited in Germany and France may be liable for violation
of the laws of Germany or France.
The law of torts lays down a duty on every man to take reasonable
care to avoid any harm to nay person. The owner of the website
also owes a duty to the user and is bound to take reasonable care
to avoid any harm that may be done.
Taxation The massive growth of e-commerce business has not
gone unseen by the tax authorities. Realizing the potential of
earning tax revenue from such sources, tax authorities world over
are examining the tax implications of e-commerce transactions and
resolving mechanisms to tax such transactions. Therefore, it would
be the primary duty of every company to take reasonable
precautions to ensure that the content on its website is not in
violation of any domestic or foreign content regulation law.
1. Individual
2. Property
3. Government
Each category can use a variety of methods and the methods used
vary from one criminal to another.
Ransomware
DDoS attacks
Botnets
Social Engineering
It has been seen that most cyber criminals have a loose network
wherein they collaborate and cooperate with one another. Unlike
the real world, these criminals do not fight one another for
supremacy or control. Instead they work together to improve their
skills and even help out each other with new opportunities. Hence,
the usual methods of fighting crime cannot be used against cyber
criminals. While law enforcement agencies are trying to keep pace
with cyber criminals, it is proving to be a Herculean task. This is
primarily because the methods used by cyber criminals and
technology keeps changing too quickly for law enforcement
agencies to be effective. That is why commercial institutions and
government organizations need to look at other methods of
safeguarding themselves.
APPROPRIATION
Section 122(2) of the criminal offences act, 1960 (Act 29) on Acts
which amount to appropriation applies with the necessary
modification to anything whether or not the moving, taking,
obtaining, carrying away or dealing is by means of electronic
processing or procuring procedure in part or in whole. (2) for a
cyber offence, “thing” includes any electronic related matter
which results in the loss of property, identity, electronic payment
medium, information, electronic record and any related matter
whether tangible or intangible wherever located on any network if
the accused is subject to prosecution under this Act.
REPRESENTATION
Section 133 of the criminal offences act, 1960 (act 29) on false
pretences applies with the necessary modification to a
representation whether or not the medium used in
communicating the representation in part or in whole was an
electronic processing system and whether or not the
representation consists of an electronic record in part or in whole.
CHARLATANIC ADVERTISEMENT
CONSPIRACY
FORGERY
INTENT
A person who uses any electronic medium or any electronic agent
whether in part or in whole is deemed to intend to cause or
contribute to causing the event which results from the use or
intervention of the electronic medium or agent.
CRIMINAL NEGLIGENCE
ELECTRONIC TRAFFICKING
Except as provided for in this act, any offence under a law which is
committed in whole or in part by use of an electronic medium or in
electronic form is deemed to have been committed under that act
and the provisions of that act shall apply with the necessary
modification to the person who commits the offence.
UNAUTHORISED CIRCUMVENTION
DENIAL OF SERVICE
A person who commits any act described in this act with intent to
interfere with access to an information system to effect a denial,
including a partial denial of service to legitimate users commits an
offence and is liable on summary conviction to a fine of not more
than two thousand five hundred penalty units or a term of
imprisonment of not more than two years or to both.
ILLEGAL DEVICES
CHILD PORNOGRAPHY
OWNERSHIP OF PROGRAMME
Ownership of programme or electronic record or electronic
record held in a computer is deemed to be property of the
owner of the computer.
this act shall apply if, for the offence in question (a) the
accused was in the country at the material time; (b) the
electronic payment medium, computer or electronic record
was issued in or located or stored in the country at the
material time; (c) the electronic payment medium was issued
by a financial institution in the country; or (d) the offence
occurred within the country, on board a Ghanaian registered
ship or aircraft or on a voyage or flight to or from this country
at the time that the offence was committed, whether
paragraph (a), (b) or (c) applies.
REGULATIONS
The minister may by legislative instrument make regulations
(a) to define, enlarge or restrict the meaning of a word or
expression used in this act; (b) to specify provisions of or
requirements under another enactment to which this act
does not apply; (c) to prescribe records, information or
classes of records or information not applicable to this act;
(d) to prescribe records or classes of records for which a
requirement under law for the signature of a person must be
satisfied by an electronic signature and proof that, in view of
the circumstances including any relevant agreement and the
time the electronic signature was made, (i) the electronic
signature is reliable for the purpose of identifying the person,
and (ii) the association of the electronic signature with the
relevant electronic record is reliable for the purposes for
which the electronic record was made; (e) to provide for
electronic signatures; (f) to provide for the electronic means
to be used to send, receive or retain information or records
in electronic form if Electronic Transactions Act, 2008, an
enactment requires a person to send, receive or retain the
information or records; and (g) to provide for any other
matter necessary for the effective implementation of this act
CHAPTER SEVEN
INTELLECTUAL PROPERTYISSUES
Intellectual property rights are the legally recognized exclusive
rights to creations of the mind. Under intellectual property law,
owners are granted certain exclusive rights to a variety of
intangible assets, such as musical, literary and artistic works,
discoveries and invention, words phrases, symbols and designs.
Intellectual property is something you create that’s unique.
Common types of intellectual property rights include
COPYRIGHT, TRADEMARKS, PATENT INDUSTRIAL
DESIGNS, TRADE DRESS AND IN SOME JURISDICTIONS
TRADE SECRET.
PATENT
A patent grants an inventor the right to exclude others from
making, using, selling, offering to sell and importing an
invention for a limited period of time in exchange for the public
disclosure of the invention. An inventor is a solution to a specific
technological problem, which may be a product or a process.
A patent registers your invention and allows you to take legal
action against anyone who makes, uses, sell or imports your
invention without your permission.
ESSENTIALS OF PATENT
For one to successful claim patent, he must show that the
invention is:
> New,
> Inventive not just an obvious modification of something that
already exists
Something that can be made
or used YOU CAN’T
PATENT:
Literature, dramatic, musical or artistic work
Schemes, rules or methods- including medical treatment
methods
Anything that’s solely an idea- eg a way of thinking, a
scientific or mathematical discovery. New types of plants,
seeds or animals, the way information is presented
> Search for a similar or identical patents.
> Prepare your patent application including a written description
of your invention and legal statements that defines its
distinctive technical features.
> File your patent application
> The intellectual property office (IPO) will check your
application and do its own search to make sure your invention
does not already exist.
> Your patent application will be published by IPO to give other
people the chance to object.
> The IPO will examine your application and ask you to respond
to any comments the examiner makes.
> Your application will be granted or refused
After your patent has been granted you can license it to
other people or defend it against infringements.
OVERSEAS PATENT
DESIGN RIGHT
A registered design protects the visual appearance or item and
gives exclusive right for that appearance to the extent that, if
necessary, there is a legal right to stop an unauthorized party from
producing or using your design.
GEOGRAPHICAL INDICATION
A geographical indication is a sign used on goods that have a
specific geographical origin and possess qualities, a reputation or
characteristics that are essential attributable to that place of origin.
Most commonly, a geographical indication includes the name of the
place of origin of the goods. For example, agricultural products
typically have qualities that derive from their place of product and
are influenced by specific local factors, such as climate and soil.
COPY RIGHT (COPY RIGHT ACT 2005, ACT 690)
Copy right is a basic right which enable creators of literary and
artistic work to receive recognition for their work as author and
financial rewards for their creative works. This right entitled them
to authorize or prohibit the use of their works by others.
WORK ELIGIBLE FOR COPYRIGHT
Section l of Act 690, classifies the following work eligible for
copyright and protection under this Act.
> Literary work
> Artistic work
> Musical work
> Sound recording
> Audio-visual work
> Derivative work and
> Computer software or program.
You do not have the right to "copy and paste" text, graphics or
logo from another's Web site and put it on your Web site (or into
printed materials or electronic correspondence or any other use).
Reading list