Table Of ContentOverview -- Legal Rights and Responsibilities of Computer Network and Electronic Commerce System Developers, Operators, and Users. Preventing Unauthorized Access -- Information/Theft Espionage. Data Corruption/Sabotage. Unauthorized Use by Authorized Users. The "Zombie" Network Problem. Controlling Access by Automated Agents. Protecting the Physical Integrity of Computer Systems (Servers and User Equipment). Mobile Access. Preventing System Misuse -- Fraud. Defamation. Harassment. Personal Use of Business Networks. Monitoring Computer Use and Communications (By Private Parties and Government). Protecting Data and Intellectual Property -- Securing Personal Data/Privacy. Protecting Trade Secrets. Managing Intellectual Property. Property Rights in Information. Securing Special Forms of Data (e.g., Financial, Medical). Preserving E-Commerce Transaction Integrity -- Unauthorized Interception. Verification of Identity of Parties. Authentication of Transaction Content. Secure Payment Systems. Valid Electronic Orders/Contracts. Mobile E-Commerce. Online Industry Trading Exchanges, Internet Auctions, and Outsourcing. Antitrust Compliance for Business-to-Business Exchanges. Online Auction Integrity. Security Obligations When Network of E-Commerce Operations are Outsourced. Risk-Sharing/Insurance. Conclusion -- Future Trends and Challenges.
SynopsisThis book provides you with a clear overview of the legal and public policy issues associated with computer network and electronic transaction security. It identifies the various forms of potential legal and commercial liability associated with failures of computer network and electronic security, and advises you of what legal claims may be raised, by whom, and the potential impact of these claims. Methods to reduce or eliminate liability are discussed, presenting practical, operational guidance to help you., Geared towards technical professionals, marketing managers, finance/business strategists, law/policy makers, and educators whose work involves e-commerce, this unique book provides a clear overview of the legal and public policy issues associated with computer networks and electronic transaction and security. It identifies various forms of potential legal and commercial liability, and advises what legal claims may be raised, by whom, and the potential impact of these claims. Methods to reduce or eliminate liability are discussed, offering practical, operational guidance to professionals. The book also describes the legal rights of computer system and electronic commerce operators that can be applied to help preserve security and to recover in the event that security is breached.