SECTION 1 ©
Chpt 4 E-commerce and the role of Third Parties

Verisign, TRUSTe

Chpt 5 The Regulatory Environment
Domain Name System 
o registration issues
o mktg issues

Copyright on the WWW
Patents on the WWW
Advertising Compliance
Consumer Protection

Privacy Issues in Canada, Bill C6

web linking; domain name disputes
 

changes last made to this page 2003 Jan 15th

In Section One  we will use material from the following texts
 
2nd Edition
Chpt 4
Chpt 5

course author:Tim Richardson
 
 
. Learning Objectives for Section 1

Section 1 is organized such that after completing this section participants will be able to

  • understand the role of Third Parties in validation, verification and privacy policies
  • identify the role of the government in restricting cryptographic business
  • identify the role of the government in Third-Party Sharing / Selling of Data
  • appreciate the controversial issues in Web Linking
  • identify some of the registration issues of Domain Names, including Domain Name Disputes and Domain Name Hijacking
  • understand some of the key privacy issues in the Canadian IT community and the relevant legislation
.
 

Chpt 4
E-commerce and the role of Third Parties

 
. S!
.
.
 

Chpt 4
E-commerce and the role of Third Parties
Chpt 4, page 125
TRUSTe is a nonprofit organization that issues a seal to companies that comply with its rules of disclosure and informed consent
 
http://www.truste.com/ TRUSTe is an independent, non-profit initiative whose mission  is to build users' trust and confidence in the Internet by promoting the principles of disclosure and informed consent.
.
"Web sites displaying the TRUSTe  Privacy Seal are committed to abiding by a privacy policy  that gives users notice, choice, access, security, and redress with regard to their personal information."
 
. One of the critical areas that TRUSTe focuses on in their Public Relations is educating people about privacy issues. In fact, on their website they say "Education  is the number one priority in  privacy protection.
WTGR
.
Under the heading of education, TRUSTe has a section titled
TRUSTe's Privacy Protection Guidelines
- go there  www.truste.com/education/protection_guidelines.html 
they have 6 points
1.      Read Privacy Statements.
2.      Seal Programs. 
3.      Credit cards. 
4.      Security. 
5.      Common sense.                                                            
6.      Protect children
.

Chpt 4
E-commerce and the role of Third Parties
Chpt 4, page 126
"Specifically, Veri-Sign provides products that allow websites to transmit encrypted data and to provide authentication about the source and destination of the data"
http://www.verisign.com/  www.verisign.com/corporate/about/index.html
.
. Verisign is one of the earliest companies to establish, and then sell, validation imaging services. The use of such services and accompanying logos helps bring credibility to vendors in a globalized online environment.
.
Network Solutions used to be the original Domain Name registrar. VeriSign bought Network Solutions and through its acquisition of Network Solutions, VeriSign is the world leader in domain name registration.
.

Chpt 5
Regulatory
Environment
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Chpt 5
Regulatory
Environment

"Regulation of Electronic Commerce and the Internet is slowly Evolving" - the lead in sentance to Chpt 5
. While it is important to consider that Regulations are evolving slowly, we must also acknowledge that Regulations happen within a jurisdiction - there is no such thing as an Internet Police or a United Nations law of the web - regulations governing Internet use are witin the context of national government regulations - the textis a U.S. textbook, our course is in Canada, we will discuss Canadian regulations only.
.
Each Country has three categories of Internet Users to serve:
  • Government agencies
  • Businesses
  • private citizens


WTGR adds also

  • industry associations
  • academic institutions
The text suggests the primary issues faced by these three groups, in the context of regulations, are
  • Encryption Regulations
  • Privacy Rights
  • Inappropriate Web Linking
  • Protection of copyright Material
  • Domain Name issues
  • Tax Policies
  • Electronic Agreements
  • Online Auctions
. In Section A of this course we will look at
  • Privacy Rights
  • Inappropriate Web Linking
  • Protection of copyright Material
  • Domain Name issues
  • Electronic Agreements
.
.
 
Cryptography
Issues

Chpt 5
Regulatory
Environment
Regulatory Environment, Cryptography Issues
2nd ed. page 146
Export of Cryptographic Products
 
 
. We will discuss this in a later section of the course - Chpt 10, which deals in Cryptography Issues in detail

WTGR

.
.

Chpt 5
Regulatory
Environment

 

Regulatory Environment
2nd ed. page 156
Third-Party Sharing / Selling of Data
 
. The textbook we use for FCA 240 is an American textbook so it refers to the situations in the U.S.

In Canada, our federal government has already dealt with the consequences of Third-Party Sharing / Selling of Data by enacting Bill C6

We have a unit on Bill C6 in the context of Privacy, go to
 http://www.witiger.com/ecommerce/privacyissues.htm 

WTGR

.
.

Chpt 5
Regulatory
Environment

 

Regulatory Environment
2nd ed. page 157
Carnivore
 
. The topic of Carnivore is discussed in the last section of this course when we deal with
  • National Institutes and IT Security Organizations
  • National Government Security Agencies
WTGR
.
.
META Tags

Chpt 5
Web Linking Issues

META Tags

 

Web Linking Issues
2nd ed. page 160
Linking Using Trademarks in Keyword META Tags
 
. This issue is highly over-rated. The point in question is the use by competitor companies, of key words in META Tags, that might trick the Search Engines into returning hits by companies that have no valid reason for being listed.

Eg. General Motors putting the words Explorer, Escape, Excursion in their META Tags in  order to draw people to the GM site who may have been looking for a Ford SUV.

In reality, META Tags are only one small part of what causes a site to rank high in Search Engines - there are many other factors that influence ranking other than META Tags.

for more details, see
 www.witiger.com/ecommerce/searchengineissues.htm 

WTGR

.
.

Chpt 5
Web Linking Issues

 

Web Linking Issues
 
. A number of companies that have business involving massive amounts of content on their sites [text, images, audio] try to save bandwidth and storage costs by providing content to users, from the sites of people elsewhere. Sometimes this linking is done without consent and causes many problems.

WTGR

.
 Linking to Illegal Files
2nd ed. page 161

"Unfortunately the ease of scanning images and [copying] digital recordings of music and video make it easy for "bootlegged" copies of music and pictures to reside on the Internet. ...MP3 is one such compression technology thathas made it feasible to upload and download digital audio files that were otherwise to large to transmit"

. Many of the technology developments mankind has made in the proceeding decades and centuries have often been used for entertainment. One of the oldest uses of technology is to make
 music - therefore it is no surprise that the Internet is being used
 to allow people to share music all over the world. 

 This increased ability to share music has good benefits (for listeners) and bad benefits (for record companies trying to maintain control and profits) 

 www.witiger.com/ecommerce/music.htm 

WTGR

.
.
http://www.witiger.com/ecommerce/domainnames~register.htm screen capture leading to a special section on registration issues of Domain Names
..

 
http://www.witiger.com/ecommerce/domainnames~mktg.htm screen capture leading to a special section on marketing issues of Domain Names
.
 


Chpt 5
The Regulatory
Environment
Domain Name Disputes
. see the section in
 www.witiger.com/ecommerce/domainnames~mktg.htm
in which we discuss Domain Name Disputes, and 
Canada's role
.
Citing our military role as international peacekeepers, a story in ComputerWorld Canada in May, 2000 noted a Montreal company, named eResolution, backed by ICANN (Internet Corporation for Assignment Names and Numbers), is in a position to handle the full adversarial proceedings from initial complaint filing to the arbitration stage and transfer of evidence. 
.
Domain
Name
Hijacking

Chpt 5
The Regulatory
Environment

Domain
Name
Hijacking
 

. We will use a section in Chpt 5 of the text that discusses Domain Names Registered and held hostage
.
"The low cost and ease of domain name registration has allowed individuals to register domain names of well-known companies. The intent by many registrants was to hold these domain names hostage until a company would offer to buy the rights to use the domain name"
 
 
. Holding Domain Names hostage and ransoming them to the legitimate owners has not been as fruitful as some might expect. The courts in various states and provinces have allowed the aggrieved companies to sue the "hijackers" and in many cases the hijackers have lost because the companies have been able to clearly substantiate that they have a legal right to ownership of the name.
.
The text says on page 165
"Registrations are approved on the basis of the assumption that no other entity has a legal right, such as a registered trademark, to use that domain name. If that assumption proves false, ICANN reserves the right to reexamine the registration of that domain name and generally gives preference to entities with a federally registered trademark."
.
 
 

Chpt 5
The Regulatory Environment
Privacy Issues
2nd ed. page 149
 
. Some of the material we cover on privacy issues comes from your textbook for the course, some of it comes from a link to witiger's special "privacy issues module.

WTGR

.
.
 
http://www.witiger.com/ecommerce/privacyissues.htm screen capture leading to a special section on Privacy Issues
.

.

.