Chapter 4
A safe harbor is information permission to reuse data, given with knowledge of all the facts needed to make a rational decision.
False
Advances in data storage have made routine violation of individual privacy more difficult.
False
Any unsolicited email is legally considered spam.
False
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.
False
Most American and European privacy law is based on a set of five principles called COPPA.
False
The key concepts in patent law are originality, novelty, and value.
False
The last step in analyzing an ethical issue should be to identify the stake holders.
False
A drawback to copyright protection is that the ideas underlying the work are not protected, only their manifestation in the work.
True
A web beacon is a tiny object embedded in email messages and web pages that is designed to monitor online Internet user behavior.
True
Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.
True
Copyright is the legal protection afforded intellectual property such as a song, book, or video game.
True
Ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
True
European countries do not allow businesses to use personally identifiable information without consumers' prior consent.
True
Liability refers to the existence of laws that permit individuals to recover damages done to the by other actors, systems, or organizations.
True
Most Internet business do very little to protect the privacy of their customers.
True
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizaitons.
True
Professionals have special rights and obligations because of their claims to knowledge, wisdom, and respect.
True
Protections for trade secrets vary from state to state.
True
Spyware is software that comes hidden in downloaded applications and can track your online movements.
True
The most common type of computer-related RSI is CTS.
True