Legal Considerations | Contract Law |
Intellectual Property | Privacy Laws |
Employment Law | Compliance |
Tort Law | Cybersecurity |
The body of law that governs agreements and enforceable promises between parties. | The factors and laws that must be taken into account when making legal decisions, such as compliance with regulations, contracts, and ethical standards. |
The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data. | The legal rights to creations of the mind, such as inventions, literary and artistic works, and symbols, designs, or names used in commerce. |
The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities. | The area of law that governs the rights and duties between employers and employees, including issues such as hiring, wages, working conditions, and termination. |
The practice of protecting computer systems, networks, and data from digital attacks and unauthorized access. | The branch of law that deals with civil wrongdoings and provides remedies for damages caused by someone's negligence, intentional actions, or strict liability. |
Consumer Protection | Corporate Governance |
Software Copyright | Patents |
Infringement | Trade Secret |
Open Source | Invention |
The system of rules, practices, and processes by which a company is directed and controlled, including the relationships among stakeholders and the goals for which the corporation is governed. | The laws and regulations that aim to safeguard consumers from unfair business practices, such as false advertising, defective products, and deceptive trade practices. |
A government-granted monopoly right that gives the inventor exclusive control over their invention for a limited period of time. | The exclusive legal right granted to the creator of an original work of software to use, distribute, and sell their creation. |
Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm. | An unauthorized use, reproduction, distribution, or display of someone's intellectual property, such as using patented software without permission. |
A novel and useful creation, usually in the form of a product or process, resulting from human creativity and ingenuity. | Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions. |
Fair Use | Freeware |
Shareware | Proprietary |
Commercial | Public Domain |
Trialware | End-User License Agreement (EULA) |
Software that can be used and distributed for free. | A legal doctrine that allows limited use of copyrighted material without permission from the owner for purposes such as criticism, commentary, or education. |
Software that is owned by a specific organization or individual and cannot be freely modified or distributed. | Software that is initially provided for free, but requires payment after a trial period. |
Software that is not protected by copyright and can be freely used and distributed. | Software that is developed and sold for profit. |
A legal contract between the software copyright holder and the user, specifying the terms and conditions of use. | Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version. |
Site License | Software License |
Open Source License | Freeware License |
Shareware License | Commercial License |
Single User License | Multi-User License |
A legal agreement that allows individuals or organizations to use software under certain terms and conditions. | A software license that allows the use of the software by all users within a specific location or organization. |
A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification. | A type of software license that allows users to access, modify, and distribute the source code of the software. |
A type of software license that is sold for profit, usually with additional features or support. | A type of software license that allows users to try the software before purchasing a full license. |
A type of software license that allows multiple users within an organization to access and use the software. | A type of software license that allows only one user to access and use the software. |
Multi User License | Cybercrime Laws |
Computer Fraud | Digital Forensics |
Online Harassment | Ransomware |
Identity Theft | Intellectual Property Laws |
Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud. | A license that allows multiple individuals to access and use a software or a website concurrently. |
The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court. | The use of computer technology to deceive or manipulate others for financial gain or personal advantage. |
A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access. | The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels. |
Laws that protect creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce. | The fraudulent acquisition and use of another person's personal information, typically for financial gain. |
Copyright | Trademark |
Patent | Creative Commons |
Data Protection | Breach Notification |
Consent | Cybersecurity Laws |
A distinctive sign, symbol, or logo used to identify and distinguish goods or services from those of others, granting legal protection against unauthorized use or imitation. | A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission. |
A licensing system that allows creators to give permission for others to use their work under certain conditions, promoting collaboration, sharing, and building upon existing intellectual creations. | A government-granted exclusive right to an inventor or assignee for a limited period, providing protection for new inventions and preventing others from making, using, or selling them without authorization. |
The requirement to inform individuals and authorities of a security breach that involves their personal data. | Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction. |
The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches. | The permission granted by an individual for the collection and processing of their personal data. |
Online Defamation | Cyberbullying |
Social Media | Slander |
Harassment | Trolling |
Online Reputation Management | Anonymity |
The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats. | The act of making false statements about a person or organization through the internet with the intent to harm their reputation. |
The spoken form of defamation, where false statements are communicated orally to damage someone's reputation. | Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities. |
Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions. | Persistent and unwanted behavior that causes someone distress, fear, or annoyance, often done with the intention of exerting power or control. |
The state of being unknown or unidentifiable online, often used to protect privacy or facilitate malicious activities. | The practice of monitoring and controlling an individual's or company's online reputation by managing search engine results and addressing negative content. |
Impersonation | Domain Name Disputes |
Cybersquatting | Uniform Domain-Name Dispute-Resolution Policy (UDRP) |
DNS Hijacking | |
Disputes that arise over the ownership, registration, or use of an internet domain name. | Using someone else's identity or pretending to be someone else online to deceive or harm others. |
A policy implemented by ICANN for resolving domain name disputes by arbitration. | The act of registering or using a domain name with the intent to profit from the goodwill of a trademark belonging to someone else. |
The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes. | |