Wednesday, October 16, 2019

MGMT Essay Example | Topics and Well Written Essays - 2000 words

MGMT - Essay Example The internet relays a vast array of information and services within the interlinked documents and emails. However, due to increased technology and widespread use of the internet creates security threats due to the vulnerabilities posed by the system. As a result, internet laws have been established to deal with matters related to internet. It’s necessary for the users to have knowledge of the laws. From the early days, professionals in the technology industry realized that the diversity of the internet functions required trust since it was used by the public. The industry code of conduct was established as a guiding principle to ensure responsible use of the internet by the operators and users. However, with the improving world of technology courts and governments around the world are creating internet laws to handle legal disputes related to internet use. Cyber laws have been designed to fit in the legal system frameworks in order to ensure there is order in the conduct and commerce in cyberspace. The internet law handles cases of trademark and copyright infringement as well as other related cyber crimes (Smith, 2006, 37). Internet has changed the legal landscape since it’s the world largest marketplace. The internet influences committing crimes, torts and infringing intellectual property. The internet law controls many aspects of internet use such as e-commerce, marketing and cyber activities. As a result, the laws protect the users in all the fields that incorporate internet use in their activities. Rules should accommodate new developments such as improvement in the software industry, as well as transformation in the intellectual property laws. The internet creates unique jurisdictional disputes since the technology respects no national borders. The internet rules keep changing due to the advancement in technology posing new threats and challenges. As a result, the legal frameworks must be designed to accommodate the changes to ensure protection of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.