LEGAL ISSUES FOR E-BUSINESS

Solve your problems or get new ideas with basic brainstorming

시작하기. 무료입니다
또는 회원 가입 e메일 주소
LEGAL ISSUES FOR E-BUSINESS 저자: Mind Map: LEGAL ISSUES FOR E-BUSINESS

1. Radio Frequency Identification Technology

1.1. Causes

1.1.1. High development cost (setup and ongoing)

1.1.2. Implementation of RFID technology may take time

1.1.3. RFID chips tend to be more prone to wear and tear

1.1.4. customers should be able to protect themselves from hidden tags that are difficult to locate without a scanner

1.1.5. Lack of planning to make RFID use efficient

1.1.6. Maybe difficult to troubleshoot

1.2. Symptoms

1.2.1. Loss of data, theft and corruption of data

1.2.2. RFID readers could be easily disrupted

1.2.3. It can be read without customers knowledge, and RFID readers can be located from high-gain antennas

1.2.4. RFID readers could overlap

1.3. Possible solutions

1.3.1. outsourcing

1.3.2. encryption

1.3.3. RFID chips should be made from better materials so that they sustain for a longer time.

1.3.4. RFID readers should be placed at all exit points

1.3.5. Sufficient training should be given to staff so that RFID technology can be effectively utilised.

1.3.6. Zebra Technologies, one of the world’s leaders in label and barcode printing, has developed a “print engine” that can embed an RFID transponder directly into a product label

1.3.7. Hitachi has developed 0.4mm-square RFID tag called the “ chip” designed to be embedded into photocopier paper to enable automatic document tracking

2. LIABILITY OF INTERNET SERVICE PROVIDERS

2.1. Causes

2.1.1. Lack of knowledge of identity of infringing party

2.1.2. Lack of legislation on obligation for ISP's to retain traffic data

2.2. Possible solutions

2.2.1. Spread awareness amoung internet users regarding their fundamental rights

2.2.2. Processing of traffic data should be with the authorization of ISP for limited purposes.

2.2.3. Consumer Endpoint Security for Service Providers Provides maximum protection for endpoints (desktops, laptops, smartphones) with technology that automatically eliminates malware and Web threats.

2.2.4. Email Security Platform for Service Providers Delivers email filtering, anti-spam, antivirus, encryption, and policy compliance.

2.2.5. Virus Scan Engine- that executes file scanning and threat detection functions. Together with the virus pattern, it protects computers against known malware threats, including malicious programs.

3. Barriers To successful adoption to E Business

3.1. Websites needed more in local or regional languages to know better about the foreign buyers or selling agents through which they can enhance their market

3.2. Need for the government to embrace new laws.

3.3. Lack of technical expertise and infrastructure

3.4. Lack of interest in adoption and adaption of internet for business activites

3.5. Lack of willingness by SME's to participate and engage

3.6. Problems of attitude and culture. In e business it requires a completely different mindset.

3.7. Requires investment in management skills and communication skills which is lacking in Oman

4. Are similar legal issues being faced in your country or region?

4.1. Yes

4.2. There are number of issues such as legal, regulatory, legeslative

4.3. should take a more comprehensive approach considering a wide range of areas of ICT adoption.

4.4. results are based on a small sample of 51 SMEs, out of that 80% belongs to Micro and Small enterprises.

4.5. Data was collected from SMEs who use some form of ICT in their business

4.6. use of computers were excluded from the study

4.7. Micro businesses do not use any form of ICT for reasons mentioned earlier in the paper.

4.8. general trend and practices of the use and impact of ICT on SMEs in Muscat, the Capital of Oman.

4.9. results should be interpreted or used with these perspectives in consideration. A larger sample is needed to

4.10. further validate these trends

5. BUSINESS REGISTRY

5.1. what is it?

5.1.1. it is a Software system and infrastructure that enhances information channels

5.1.2. Enables organization to store information

5.1.3. Raises issues related to data protection regarding mass information store.

5.2. Symtoms

5.2.1. Loss of data

5.2.2. Business hesitant to do online contracting

5.3. Possible solutions

5.3.1. Various techniques allow analysis of data, information of varying quality can be produced.

5.3.2. Proper Security Systems should be maintained and monitored by the management to avoid hackers.

6. SELF REGULATION ON B2B     INTERNET TRADING    PLATFORMS

6.1. What it means?

6.1.1. This states the need for self regulation rather than state intervention.

6.1.2. Focus is to develop a voluntary code of conduct for B2B trading

6.1.3. self regulation acts as an important facet of internet regulation

6.2. Symtoms

6.2.1. The willingness of businesses to join the B2B trading platform is hampered

6.3. Possible Solutions

6.3.1. The Personal Information Protection and Electronic Documents Act (PIPEDA)

6.3.2. No unauthorized access should be available using password protection .

6.3.3. Confidentiality of the database should be maintained .

6.3.4. B2B parties need to ascertain that party is correctly associated with who they are pretending to be and has the required authorization for the action at the time of enquiry as well as transaction process.

6.3.5. Good internet advertising practices

6.3.6. When using disclaimers, make sure they are clear and easy to find.

6.3.7. Clearly identify the business associated with the product or service being advertised. The advertisements should not mislead consumers as to the type of organization or as to the purpose of the representations. The geographic origin of the advertiser should be clear.