You will be able identify the benifits of CRM.
You will be able identify the tools to improve CRM.
You will be able identify legal issues that impact E-commerce.
Include: You need to include a CRM compnent in your Marketing Plan
Read: Chapter 8 & 12
Read: 3 Legal Issues that can make or break your E-commerce Startup
Read: Legal Issues for Ecommerce business
Read: The benifits of Good CRM
Review: The services that Legal Zoom has a to offer an online business.
Reminder: Post your articles on Canvas under the Weekly Articles on the Discussion Board Section.
Critical Areas for Internet Business:
- Protecting Your Customers' Privacy (You should have a privacy statement on your site!!)
- Collecting Sales Tax Over the Internet
- Selling Internationally / Exporting
- Online Advertising and Marketing
- Digital Rights / Copyright
Customer Customer Relationship Management (CRM)Tools for CRM:
Keeping customers happy is very important to any business but it is critical to Online business. There are various tools that will be able to track current and future customer interaction.
The benifits of Good CRMLegal Issues of Online Business:Copyright Protection
FTC Federal Trade Commission is a starting point for rules and regulations of online business.Keeping up with the Hackers
Respecting Copyright is a must, Remember: Napster!!
Copyright Website is a great primer for Copyright issues.
Hold your data in encrypted storage!
US Government Cyber Crime info
The Best computer security you can have is common sense!
Biometric methods are one way to confirm the identity of users of your computers
Protect your password (don't give it to anyone)
Use a firewall on your network.
Report attacks and check for the latest attempts on computer systems
CERT® Coordination Center Carnegie Mellon University's Computer Emergency Response Team
CSRC Computer Security Resource Center
Forester Research Research into markets and Cyber-trends (Crime included)
Privacy, Spam, Identity Theft, Copyright Protection, Trademark, Firewall, Patches, Cryptography, Public Key Encryption, PGP, Virus Types: Trojan Horse, Worm