Legal Considerations Contract Law
Intellectual Property Privacy Laws
Employment Law Compliance
Tort Law Cybersecurity

 

The body of law that governs agreements and enforceable promises between parties. The factors and laws that must be taken into account when making legal decisions, such as compliance with regulations, contracts, and ethical standards.
The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data. The legal rights to creations of the mind, such as inventions, literary and artistic works, and symbols, designs, or names used in commerce.
The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities. The area of law that governs the rights and duties between employers and employees, including issues such as hiring, wages, working conditions, and termination.
The practice of protecting computer systems, networks, and data from digital attacks and unauthorized access. The branch of law that deals with civil wrongdoings and provides remedies for damages caused by someone's negligence, intentional actions, or strict liability.

 

Consumer Protection Corporate Governance
Software Copyright Patents
Infringement Trade Secret
Open Source Invention

 

The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed. The laws and regulations that aim to safeguard consumers from unfair business practices, such as false advertising, defective products, and deceptive trade practices.
A government-granted monopoly right that gives the inventor exclusive control over their invention for a limited period of time. The exclusive legal right granted to the creator of an original work of software to use, distribute, and sell their creation.
Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm. An unauthorized use, reproduction, distribution, or display of someone's intellectual property, such as using patented software without permission.
A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.

 

Fair Use Freeware
Shareware Proprietary
Commercial Public Domain
Trialware End-User License Agreement (EULA)

 

Software that can be used and distributed for free. A legal doctrine that allows limited use of copyrighted material without permission from the owner for purposes such as criticism, commentary, or education.
Software that is owned by a specific organization or individual and cannot be freely modified or distributed. Software that is initially provided for free, but requires payment after a trial period.
Software that is not protected by copyright and can be freely used and distributed. Software that is developed and sold for profit.
A legal contract between the software copyright holder and the user, specifying the terms and conditions of use. Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version.

 

Site License Software License
Open Source License Freeware License
Shareware License Commercial License
Single User License Multi-User License

 

A legal agreement that allows individuals or organizations to use software under certain terms and conditions. A software license that allows the use of the software by all users within a specific location or organization.
A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification. A type of software license that allows users to access, modify, and distribute the source code of the software.
A type of software license that is sold for profit, usually with additional features or support. A type of software license that allows users to try the software before purchasing a full license.
A type of software license that allows multiple users within an organization to access and use the software. A type of software license that allows only one user to access and use the software.

 

Multi User License Cybercrime Laws
Computer Fraud Digital Forensics
Online Harassment Ransomware
Identity Theft Intellectual Property Laws

 

Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud. A license that allows multiple individuals to access and use a software or a website concurrently.
The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court. The use of computer technology to deceive or manipulate others for financial gain or personal advantage.
A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access. The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels.
Laws that protect creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce. The fraudulent acquisition and use of another person's personal information, typically for financial gain.

 

Copyright Trademark
Patent Creative Commons
Data Protection Breach Notification
Consent Cybersecurity Laws

 

A distinctive sign, symbol, or logo used to identify and distinguish goods or services from those of others, granting legal protection against unauthorized use or imitation. A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission.
A licensing system that allows creators to give permission for others to use their work under certain conditions, promoting collaboration, sharing, and building upon existing intellectual creations. A government-granted exclusive right to an inventor or assignee for a limited period, providing protection for new inventions and preventing others from making, using, or selling them without authorization.
The requirement to inform individuals and authorities of a security breach that involves their personal data. Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction.
The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches. The permission granted by an individual for the collection and processing of their personal data.

 

Online Defamation Cyberbullying
Social Media Slander
Harassment Trolling
Online Reputation Management Anonymity

 

The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats. The act of making false statements about a person or organization through the internet with the intent to harm their reputation.
The spoken form of defamation, where false statements are communicated orally to damage someone's reputation. Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities.
Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions. Persistent and unwanted behavior that causes someone distress, fear, or annoyance, often done with the intention of exerting power or control.
The state of being unknown or unidentifiable online, often used to protect privacy or facilitate malicious activities. The practice of monitoring and controlling an individual's or company's online reputation by managing search engine results and addressing negative content.

 

Impersonation Domain Name Disputes
Cybersquatting Uniform Domain-Name Dispute-Resolution Policy (UDRP)
DNS Hijacking

 

Disputes that arise over the ownership, registration, or use of an internet domain name. Using someone else's identity or pretending to be someone else online to deceive or harm others.
A policy implemented by ICANN for resolving domain name disputes by arbitration. The act of registering or using a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes.