Cyber Security Ethical Issues

Small business development conference

Today's Top Picks for Our Readers:
Recommended by Recommended by NetLine

Digital Marketing and your business

Today's Top Picks for Our Readers:
Recommended by Recommended by NetLine
Today's Top Picks for Our Readers:
Recommended by Recommended by NetLine

Cyber Security and Ethical Issues Index i.Threats to  internet privacy ii.FTC requirements for ethical uses of consumer information iii.How copyright differs from patent and trademark laws iv.What does it mean to clickwrap a license v.Significance of The Digital Millennium Copyright Act (DMCA) vi.Identify cyber security and ethical issues associated with digital marketing.

Times have changed when describing the typical hacker scenario in these days, you first must begin well before the hack or hacker with the organization behind the attack. Today, hacking is all crime, all the time, complete with bidding markets for malware, crime syndicates, botnets for hire, state actors, and cyber warfare gone amok(Grimes, R, 2018). •Cybercrime syndicates: Organized professional groups, organizing crime of business led largely affiliated conglomerate groups, in vein of  legal distribution marketing hierarchies. •Small Time Cons: Small mom-and-pop operations may steal identities and passwords, or cause nefarious redirection to get credit cards, banking transactions and convert them into local currencies using money mules, electronic cash, and e-banking. •Malware Mercenaries: Teams and companies dedicated to writing malware to bypass specific security defences, and attack customers. •

Privacy is a value for most, two thirds of Americans will give up information in return for something in value. . Privacy means different things to different people. • • Privacy can be divided into the categories of Anonymity, Confidentiality, and Security. There is a variety of privacy violations. •These range from Embarrassment to Personal Loss and Theft.

Privacy, ethics, and security is a combination of user education, technological tools, and administrative policies and procedures. • Each group of individuals has a responsibility to protect users, data, and systems from a variety of threats (Grimes, R, 2018).

Watch the Video Here…


Many companies keep sensitive personal information about customers or employees in their files or on their network. The FTC has free resources for businesses of any size.

Requirements from the FTC in regards to consumer information:






A site must present information of their policies to the users.

The user should be able to choose to participate or the user should be able to exclude them from the collection.

The site must provide the user with the access to change information and correct it if necessary.

The requirement of security. The site must  inform the user policies to ensure the integrity of the data (Ethical and Legal Issues (Grade), 2013).

Copyright    verses    patent      trademark     laws

Copyright Patent And Trademark laws

A patent law is a grant of a property right to the inventor. This gives the inventor the ability to reproduce or manufacture of the goods and distinguish them from other goods.

A patent grants the inventor with the property right. It gives the inventor the ability to reproducer manufacture his or her product.

Trademark helps to prevent others from using a confusingly similar mark as a copyright.

Differences in a Patent and trademark laws

The differences between a copyright and a trademark is that a copyright protects works of authorship and a trademark protects words or phrases related to goods and services. If a slogan or a title needs protected, a trademark is necessary.

Differences in a copyright and a patent is that a patent is centred on invitations and an invention is not something that can be copyrighted.

  A patent expires after twenty years, copyrights expire depending on if the work has been published or unpublished. If the work is owned and published it expires ninety-five years from date of publication or one hundred and twenty years from date of creation(Ethical and Legal Issues (Grade), 2013).


A clickwrap agreement (also known as a clickthrough agreement or clickwrap license) is an online contract that confirms user consent to a company’s terms and conditions.

Examples: •When a user clicks “OK” or “I Agree” button on a webpage to create an account, download software, or complete an online transaction. • •“Type and Click”-when a user must type specific words into an on-screen box and click “Send” to consent with contractual terms.

(What is clickwrap agreement (clickthrough agreement or clickwrap license)? – Definition from, 2018).

The digital millennium copyright act (dmca)

The Digital millennium copyright act (dmca)

The Digital Millennium Copyright Act (DMCA) is a United States digital rights management (DRM) law enacted October 28, 1998 by President Bill Clinton. Created to an updated version of copyright laws to deal with the special challenges of regulating digital material. The aim of DMCA is to protect the right  of both copyright owners and consumers. 


DMCA is considered a compromise measure by many of these groups, whose interests frequently conflict. Strictly interpreted, DMCA would outlaw many entirely ethical, and even necessary activities.

Revisions were made to DMCA to allow specific exceptions, such as encryption and security research.

In April 2003, a group the Broadband and Internet Security Task Force produced an update to the law, referred to as “Super DMCA” which adds “the internet to defraud” to the stipulations of the original law(What is Digital Millennium Copyright Act (DMCA)? – Definition from, 2018).

Cyber Security and Ethical issues in digital marketing

 9 out of 10 Americans expect companies to do more than make a profit—they expect them to operate socially, responsibly, and would boycott a company that egregiously violated these expectations.

MISLEADING ADVERTISING:  Regulated by The Federal Trade Commission (FTC) mandating that businesses make accurate statements in their advertising campaigns and, when possible, back their claims with scientific evidence.

BLACK-HAT LINK BUILDING: Ethical ways to build links and increase mentions of your brand; the most common is to use guest posting opportunities to write high-quality content for your target audience that cites one of your brand ‘s pieces of original research.

CONTRACTING PEOPLE WITHOUT CONSENT:  Many businesses have used this tactic to contact people who they otherwise wouldn’t have known. The FTC enforce a law called the CAN-SPAM act, where you are legally allowed to email people without their consent, but, for one time only.

INSENSITIVE CONTROVERSY: Where  introducing a product into a Black Lives Matter protest while their intentional attempt to get political notice backfires and venture into a world of controversy hazard.

EMOTIONAL EXPLOITATION: Making them laugh or evoking a sense of nostalgia helps consumers forge a small bond with your brand. However, when you intentionally evoke rage or sadness in a tasteless way, you could be exploiting emotions, rather than sympathizing with them(5 Common Unethical Marketing Practices: Are You Guilty?, 2018).

Grimes, R. (2018). IT’s 9 biggest security threatsCSO Online. Retrieved 12 December 2018, from:

Ethical and Legal Issues (Grade). (2013). Samantha Cassano. Retrieved 12 December 2018, from:

What is clickwrap agreement (clickthrough agreement or clickwrap license)? – Definition from:

  (2018). SearchCloudSecurity. Retrieved 12 December 2018, from:

What is Digital Millennium Copyright Act (DMCA)? – Definition from (2018). Retrieved from:

5 Common Unethical Marketing Practices: Are You Guilty?. (2018). Retrieved from:


Silver Buffalo on sale only $0.74 over spot

Daniel Fortune

Daniel Fortune is a successful business professional, entrepreneur, father, and lover of travel.

Leave a Reply

Your email address will not be published. Required fields are marked *