Legal Foundations of Business Chapter 17
Which of the following is an INCORRECT statement regarding the E-SIGN Act?
The E-SIGN Act requires a handwritten signature to accompany an electronic signature in order for an Internet-based contract to be enforceable.
Brick and mortar companies are reaching a much broader market than in the past due to the growth of all of the following EXCEPT?
internet crime and cyberpiracy
A party who is granted limited rights in or access to intellectual property or information rights owned by a licensor is known as which of the following?
licensee
Which of the following is an INCORRECT statement regarding the registration of domain names?
Domain names cannot be registered, since they do not constitute intellectual property.
One of the main features of the ________ is that it recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.
E-SIGN Act
The _______ gives an e-signature the same force and effect as a handwritten, pen-inscribed signature on paper.
E-SIGN Act
The _______ recognizes an electronic signature, or e-signature.
E-SIGN Act
The ________ provides that electronically signed contracts cannot be denied effect because they are in electronic form or delivered electronically.
E-SIGN Act
_____ are enforceable as long as they meet the requirements necessary to form a traditional contract, including agreement, consideration, capacity, and lawful object.
E-mail contracts
Which of the following is an INCORRECT statement regarding e-mail contracts?
E-mail contracts are unenforceable unless accompanied by a traditional, written contract.
Suppose Henry owns a computer on which he sends and receives e-mail. Harriet learns Henry's access code to his e-mail account. Harriet opens Henry's e-mail and reads his e-mails. Harriet has violated the _____.
ECPA
An employer can access stored e-mail communications of employees using the employer's service. This is granted by the _________.
Electronic Communications Privacy Act
Barb owns a computer on which she sends and receives e-mail. Bob learns Barb's access code to her e-mail account. Bob opens Barb's e-mail and reads her e-mails. Bob has violated the ______.
Electronic Communications Privacy Act
Government and law enforcement entities that are investigating suspected illegal activity are allowed to access online communications. This is granted by the _______.
Electronic Communications Privacy Act
Which of the following is an INCORRECT statement regarding email contracts?
Email contracts are unenforceable unless accompanied by a traditional, written contract.
The domain name extension that represents the word "organization" and is used primarily by nonprofit groups is ________.
.org
Which of the following is an INCORRECT statement regarding the Electronic Communications Privacy Act (ECPA)?
In light of its severe criminal penalties, the ECPA does not recognize the right of an injured party to sue for civil damages for violations of the ECPA.
Which of the following is NOT a remedy under the the Anticybersquatting Consumer Protection Act (ACPA)?
Jail time
Which of the following statements about licensing agreements is true?
Most software programs and digital applications are licensed electronically.
Which of the following is an INCORRECT statement regarding e-commerce and Web contracts?
Out of concern regarding their validity and enforceability, the number of e-contracts has been decreasing in recent years.
Stu sends a text message to Sandy offering to sell his car to her for $5,000. Sandy accepts the offer via text message. Unfortunately, her text did not go through due to spotty cellular service in their coverage area. When Stu does not receive a response from Sandy, he sells the car to another person. Sandy sues Stu because she accepted the offer. Who will prevail and why?
Sandy will prevail because she accepted a valid offer and the mailbox rule applies.
A federal statute stating that Internet service providers are not liable for the content transmitted over their networks by e-mail users and websites is called ________.
The Communications Decency Act
_____ is designed to place the world of electronic commerce on a par with the world of paper contracts in the United States.
The E-Sign Act
______ creates contract law for the licensing of information technology rights
The Uniform Computer Information Transactions Act
According to the E-SIGN Act, a digital signature can be verified in all of the following ways EXCEPT?
an online polygraph examination
Domain names ________.
can be registered
Sometimes a party registers a domain name of another party's trademarked name or a famous person's name. This act is called ________.
cybersquatting
A unique name that identifies an individual's or a company's website is called which of the following?
domain name
Examples of _____ include www.pearson.com, www.microsoft.com, and www.mcdonalds.com.
domain names
Suppose Dorothy owns a computer and licenses a computer software program from SoftWare Company to use on her computer. Dorothy downloads the software onto her computer from SoftWare Company's website. There is a(n) _____ between the two parties.
e-license
Cora owns a computer and licenses a computer software program from Tech Company to use on her computer. Cora downloads the software onto her computer from Tech Company's website. There is a(n) ________ between the two parties.
electronic license
A(n) _______ is a contract whereby the owner of software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.
electronic license
The owner of an electronic program or application is the ________.
electronic licensor
Anticybersquatting Consumer Protection Act (ACPA) is a federal statute that permits trademark owners and ________________to recover domain names that use their names where the domain name has been registered by another person or business _____________________.
famous persons; in bad faith
Large and small businesses sell goods and services over the internet through ______________.
websites and registered domain names