Business plan e-commerce strategy formulation

One of the key points in the start of was inwhere Ray Tomlinson sent the very first email and his technology set the platform to allow people to send and receive files through different machines [8]. However, the more recognisable period as being the start of Digital Marketing is as this was where the Archie search engine was created as an index for FTP sites. In the s, the storage capacity of computer was already big enough to store huge volumes of customer information. Companies started choosing online techniques, such as database marketingrather than limited list broker.

Business plan e-commerce strategy formulation

This law is already in effect as the Supreme Court uphold its constitutionality February 18, Although some provisions were deemed as unconstitutional struck down particularly Sections 4 c 37, 12, and It is a law considered to be 11 years in the making as various groups, organizations, and personalities lobbied for its passage.

It took awhile for the law to be passed as legislators and various stakeholders need to understand the magnitude of cybercrime and whether the penalty provisions indicated in the E-Commerce Law — Republic Act is sufficient or not.

business plan e-commerce strategy formulation

I always look at cybercrime as something under the 2nd block or special penal laws where I think the E-Commerce Law is in. Although it seems there is now a set of laws in place that are already in that 3rd block and increasing further which may already include the E-Commerce Law as it is the first policy in place against hacking and online piracy.

As we use and integrate ICT and Internet in our lives, perhaps it is possible that new forms of crimes can happen online and where broader or special legislation will business plan e-commerce strategy formulation to be created that provides mandate for resource allotment too.

From my review and understanding, the law: Penalizes section 8 sixteen types of cybercrime Section 4.

business plan e-commerce strategy formulation

Types of Cybercrime 1. Illegal access Unauthorized access without right to a computer system or application. Reclusion temporal imprisonment for twelve years and one day up to twenty years or a fine of at least Five hundred thousand pesos P, up to a maximum amount commensurate to the damage incurred or BOTH 2.

Illegal interception Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.

Data Interference Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses. Authorized action can also be covered by this provision if the action of the person went beyond agreed scope resulting to damages stated in this provision.

System Interference Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses.

Unauthorized use of computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under Republic Act Cyber-squatting Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same.

This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it. Those who get domain names of prominent brands and individuals which in turn is used to damage their reputation — can be sued under this provision.

Note that freedom of expression and infringement on trademarks or names of person are usually treated separately. A party can exercise freedom of expression without necessarily violating the trademarks of a brand or names of persons.

Computer-related Forgery Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; orThe act of knowingly using computer data which is the product of computer-related forgery as defined here, for the purpose of perpetuating a fraudulent or dishonest design.

Computer-related Fraud Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

Computer-related Identity Theft Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.

Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. However, if one party in a couple or relationship sues claiming to be forced to do cybersex, then it can be covered.

Penalty to be imposed shall be one 1 degree higher than that provided for in Republic Actif committed through a computer system.

Libel Unlawful or prohibited acts of libel as defined in Article of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future.

Revised Penal Code Art. The Cybercrime Prevention Act strengthened libel in terms of penalty provisions. The electronic counterpart of libel has been recognized since the year when the E-Commerce Law was passed.

Management for All: CORPORATE STRATEGIES

The E-Commerce Law empowered all existing laws to recognize its electronic counterpart whether commercial or not in nature. Penalty to be imposed shall be one 1 degree higher than that provided for by the Revised Penal Code, as amended, and special laws, as the case may be.With the issuance of the “New Generation Artificial Intelligence Development Plan," China has set out an ambitious roadmap for AI.

From my review and understanding, the Cybercrime Prevention Act of (Republic Act ) law penalizes (section 8) seventeen types of cybercrime (Section 4). Ever used a road map to get somewhere? Well, a strategy is a road map for a business.

In this lesson, you'll learn about the process of strategy formulation. Executive Summary.

China’s Plan to ‘Lead’ in AI: Purpose, Prospects, and Problems

Reprint: RE. Many executives rely on a process for devising strategy suited to stable, predictable environments even when they know conditions are highly volatile and mutable. Stability strategy does entail changing the way the business is run, however, the range of products offered and the markets served remain unchanged or narrowly focused.

Ever used a road map to get somewhere? Well, a strategy is a road map for a business. In this lesson, you'll learn about the process of strategy formulation.

Undergraduate Study < UMSL