Chapter 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A safe harbor is information permission to reuse data, given with knowledge of all the facts needed to make a rational decision.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

Any unsolicited email is legally considered spam.

False

Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is not yet a federal crime.

False

Most American and European privacy law is based on a set of five principles called COPPA.

False

The key concepts in patent law are originality, novelty, and value.

False

The last step in analyzing an ethical issue should be to identify the stake holders.

False

A drawback to copyright protection is that the ideas underlying the work are not protected, only their manifestation in the work.

True

A web beacon is a tiny object embedded in email messages and web pages that is designed to monitor online Internet user behavior.

True

Computer abuse involves the commission of acts involving the computer that may not be illegal but are considered unethical.

True

Copyright is the legal protection afforded intellectual property such as a song, book, or video game.

True

Ethics refers to the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

European countries do not allow businesses to use personally identifiable information without consumers' prior consent.

True

Liability refers to the existence of laws that permit individuals to recover damages done to the by other actors, systems, or organizations.

True

Most Internet business do very little to protect the privacy of their customers.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizaitons.

True

Professionals have special rights and obligations because of their claims to knowledge, wisdom, and respect.

True

Protections for trade secrets vary from state to state.

True

Spyware is software that comes hidden in downloaded applications and can track your online movements.

True

The most common type of computer-related RSI is CTS.

True


Kaugnay na mga set ng pag-aaral

Contemporary American Indian Voices

View Set

Programming test 2 - C++ (part 3)

View Set

Business Law Contracts Ch. 19: Breach of Contract and Remedies

View Set

L.2 French Revolution Questions - Study Guide

View Set

Quiz #2 Beginnings Of English America

View Set

Geol Ch. 7 quiz questions/study guide

View Set

Nurs 4 - Nursing Process: Nursing diagnosis (EAQ's)

View Set