Question 1: What Do You Know About Cybersquatting? When Typo Squatting Problem Does Occur in Domain Names?

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Question 1: What do you know about Cybersquatting?

When typo
squatting problem does occur in domain names?

Cybersquatting:
Cybersquatting refers to illegal domain name registration or use.
Cybersquatting can have a few different variations, but its primary purpose is to steal or misspell
a domain name in order to profit from an increase in website visits, which otherwise would not
be possible. Trademark or copyright holders may neglect to reregister their domain names, and
by forgetting this important update, cyber squatters can easily steal domain names.
Cybersquatting also includes advertisers who mimic domain names that are similar to popular,
highly trafficked websites. Cybersquatting is one of several types of cybercrimes. Cybersquatting
is also known as domain squatting.

Typo squatting
Typo squatting, also called URL hijacking, a sting site, or a fake URL, is a
form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made
by Internet users when inputting a website address into a web browser.

When typo squatting problem does occur in domain names?


A few scrambled letters here, the
wrong domain ending there, or a forgotten hyphen such small deviations are all it takes to lead
users to the wrong site. While these may seem like harmless mistakes, the reality can sometimes
prove to be anything but. This is because many websites, especially popular ones, are targeted by
typo squatters. Those operating such domains speculate on the carelessness of the internet
community when it comes to correctly entering URLs and await their misguided guests with
advertisements, malware, and phishing sites.

Experiment
We chose six domains: Facebook, Google, Twitter, Microsoft, Apple and, while we
were about it, Sophos.
To keep things simple but representative, we limited ourselves to typos of one alphabetic
character in the company name: one letter omitted, one letter mistyped, or one letter added.
Typos involving numbers or punctuation marks were ignored.
We generated all possible one-character mistakes in the www.companyname.com form of the
above six domains. That produced 2249 unique site names, from www.pple.com, through
www.facemook.com, to www.twitterz.com.
Of course, a few of these generated names are meaningful in their own right. The domain
www.racebook.com, for example, sounds like a betting site, and it is. Goole.com is a site about
Goole, a large port on the East coast of England. And witter.com is a site owned by an American
called Glen Witter.

Figure 1 you can see in this picture's depiction, RaceBook that sounds like FaceBook and Goole.com that sounds like
Google.com.

How to protect yourself and your visitors form typo squatters


While there is ample legislation in the
United States to help protect your site from typo squatters, taking legal action can be costly in
terms of both time and energy. Taking preventative measures to ensure that your site doesn’t
become the target of a typo squatting scheme in the first place is highly recommended for those
who think their site might be of interest to free riders.

Register typo versions of your domain before squatters do


When registering a domain for a
product or service, many trademark owners try to nip the problem in the bud by registering
potential typo variants of their desired domain as well. Website operators whose domain names
are often misunderstood should also make sure to follow these steps. Once registered, misspelled
domains can be easily be rerouted to the actual website with the help of redirects.

Reserve the different typo domains for your domain:

Use ICANN’s monitoring service


The introduction of new top-level domains (nTLDs) has made it
even easier for squatters to target mistyped or misspelled versions of popular websites for their
own private gain. Fortunately, ICANN’s trademark clearing house allows brand owners to find
out how their names are being used within different domains. This service, however, is available
exclusively to nationally or internationally registered brands.

SSL certificates build trust


These certificates are preventative measures that can be employed
to help guide lost users back to the into the light. Website operators need to be able to signal to
users that they are on the original site. SSL certificates don’t only protect users when data is
transferred during a financial transaction; they also supply visitors with information on the site
operator and the company responsible for issuing the certificate.
Question 2: Discuss the environment of electronic commerce: legal, ethical,
and tax issues in context of E-commerce?

The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues:

The Legal Environment of Electronic Commerce


Online businesses
Must comply with the same laws and regulations that govern the operations of all
businesses.
Face complicating factors:
 The Web extends a company’s reach beyond traditional boundaries
 The Web increases the speed and efficiency of business communications
 The Web creates a network of customers

Jurisdiction on the Internet


1. Power, effects, legitimacy, and notice do not translate well to the virtual world of
electronic commerce.
2. Governments that want to enforce laws must establish jurisdiction over business conduct.
3. Contract (Promise or set of promises between two or more legal entities.)
4. Tort (Intentional or negligent action taken by a legal entity that causes harm to another
legal entity.)
5. A court has sufficient jurisdiction in a matter if it has both subject matter jurisdiction and
personal jurisdiction.

Subject Matter Jurisdiction

1. Subject
Matter jurisdiction is a court’s authority to decide a type of dispute.
2. Personal jurisdiction
Determined by the residence of the parties.

3. Forum selection clause


States that a contract will be enforced according to the laws of a
particular state.

4. Long-arm statutes
Create personal jurisdiction over nonresidents who transact
business in the state.

Contracting and Contract Enforcement in E-Commerce

1. Contract
Contract formed when one party accepts the offer of another party.
Includes three essential elements; An offer, an acceptance, and consideration.

 Offer
Commitment with certain terms made to another party.

 Acceptance
Expression of willingness to take an offer.

 Consideration
Agreed upon exchange of something valuable

2. Implied contract
Formed by two or more parties that act as if a contract exists
Statute of Frauds.
The following must be created by a signed writing
 Contracts for the sale of goods worth over $500
 Contracts requiring actions that cannot be completed within one year

3. A writing
Exists when the terms of a contract have been reduced to some tangible form.

4. Signature
Any symbol executed or adopted for the purpose of authenticating a writing.

5. Warranties on the Web


Any contract for the sale of goods includes implied warranties

6. Warranty disclaimer
Statement declaring that the seller will not honor some or all
implied warranties

7. Authority to bind
Determining whether an individual has the authority to commit a
company to an online contract.

8. Terms of service (ToS)


Intended to limit a Web site owner’s liability.

Use a Protection of Intellectual Property in Online Business

 Intellectual property
Includes all products of the human mind, products can be tangible
or intangible.

 Intellectual property rights


Include protections by governments through:
  Granting of copyrights and patents
  Registration of trademarks and service marks
Website Content Issue
 Copyright (Right granted by a government to an author or creator of a
 literary or artistic work.)
 Creations that can be copyrighted include all forms of artistic or intellectual expression.
 Works copyrighted by corporations or notfor- profit organizations are protected for 95
years.
 Fair use of a copyrighted work (Includes copying it for use in criticism, comment, news
reporting, teaching, or research.)
  Vicarious copyright infringement
Entity becomes liable if:
 It is capable of supervising infringing activity
 It obtains financial benefit from infringing activity

Patent Infringement
 Patent (Exclusive right granted by a government to an individual to make, use, and sell an
invention.)
 To be patentable the invention must be genuine, novel, useful, and not obvious, given the
current state of technology.
 Business process patent (Protects a specific set of procedures for conducting a particular
business activity.)

Trademark Infringement
1.  Trademark
Distinctive mark, device, motto, or implement that a company affixes to
goods it produces.

2.  Service mark
Used to identify services provided.

3. Trade name
Name that a business uses to identify itself.

4.  Common law
Part of British and U.S. law established by the history of court decisions.

Domain Names, Cybersquatting, and Name Stealing


 Cybersquatting
Registering a domain name that is the trademark of a person or company
and hoping to sell it to that person or company for money.
 Name changing
Registering misspelled variations of well known domain names.
 Name stealing
Ownership of a site’s assigned domain name is changed to another site and
owner.

Protect Intellectual Property Online


 Proposed solutions to problems in digital copyright protection include:
– Host name blocking
– Packet filtering
– Proxy servers

Defamation
• Defamatory statement
Statement that is false and injures the reputation of another person or
company.

• Product disparagement
If a defamatory statement injures the reputation of a product or service
instead of a person.

• Per se defamation
Court deems some types of statements to be so negative that injury is
assumed.

Online Crime, Terrorism, and Welfare


Obstacles faced by law enforcement:

 Jurisdiction
Difficulty applying laws written before the Internet   became prone to
criminal actions.
 Online warfare and terrorism
Sustained effort by a well-financed terrorist group
could slow down operation of major transaction-processing centers.

References
https://www.techopedia.com/definition/2393/cybersquatting
https://www.ionos.com/digitalguide/domains/domain-tips/how-to-protect-
your-domain-from-typosquatting/
https://en.wikipedia.org/wiki/Typosquatting
https://nakedsecurity.sophos.com/typosquatting/
https://ecommerceandwebsitedev.wordpress.com/the-environment-of-
electronic-commerce-legal-ethical-and-tax-issues/

You might also like