Chapter 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Retailers collect information about consumers using

Cookies

Online defamation occurs when an individual communicates a false statement about a person through the internet.

True

Is the act of buying domain names that are similar to well-known domains, except for slight misspellings.

Typo squatting

Distributed network

A network that can be used by persons located (distributed) around the country or the globe to share computer files.

Electronic Communications Privacy Act

Amended federal wiretapping law to cover electronic forms of communication

Is the act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner.

Cybersquatting

Prohibited activités of the CAN-SPAM act

Deceptive information Misleading information False return addresses False information Sending messages to randomly generated e-mail addresses

One of the major problems in pursuing an online defamation claim is that:

Discovering and proving the identity of the person who posted the defamation can be difficult.

Social Media

Electronic media that allows people with similar interests to participate in a social network

Currently, there are no state laws protecting individuals from disclosing their social media passwords.

False

Internet service providers are generally treated the same as print publishers and other media regarding liability for defamation.

False

Cloud computing

Is a delivery model that enables delivery to users of on-demand services from third-party servers over a network.

Occurs when another party uses a domain name similar to yours.

Loss of goodwill

Hobbs owns a small internet service provider. He is sued by Allison because someone who pays Hobbs a monthly fee posted a defamatory statement about Allison. Will Allison prevail in court?

No, because the Communications Decency Act treats Internet service providers differently from print publishers.

Because you are suspected of sending out bulk unsolicited e-mail advertisements, the FTC asks your internet service provider to supply information on what you do in foreign jurisdictions. Will you succeed in a lawsuit against your internet service provider for providing such information to the FTC?

No, because the U.S. Safe Web Act provides immunity to the ISP from liability for such action.

Which agency investigates consumer complaints of privacy violations?

The Federal Trade Commission

Which act prevents cell phone companies and social media networks from divulging private communications to certain entities and individuals?

The Stored Communications Act

The Electronic Communications Privacy Act prohibits:

The intentional interception of an employee's personal electronic communications by an employer on a non-employer-supplied device The intentional disclosure of information obtained by electronic interception not subject to exclusion under the ECPA.The intentional interception of a phone call by a person not a party to the phone call

Peer-to-peer Networking

The sharing of resources (such as files, hard drives, and processing styles) among multiple computers without necessarily requiring a central network server.

Which of the following instances of circumvention (bypassing) of copyright are allowed under the Digital Millennium Copyright Act?

The testing of computer security Protection of personal privacy Enabling parents to monitor their children's internet use Conducting encryption research

When can social media posts be used by law enforcement?

To determine the identities of suspects To further federal regulators' investigation into illegal activities To locate a suspect To detect and prosecute criminals

Courts and administrative agencies usually uphold an employer's right to terminate a person based on his or her violation of a social media policy.

True

Employees' posts on social media may be protected under labor law.

True

In 2003, Congress enacted the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, which prohibits the sending of unsolicited commercial emails.

True

The Anticybersquatting Consumer Protection Act applies to all domain name registrations and trademarks.

True

Under the Proposed Consumer Privacy Bill of Rights, consumers have a right to reasonable limits on the personal data that companies collect and retain.

True

Because the federal CAN-SPAM Act applies only to e-mails originating in the United States, Congress enacted the

U.S Safe Web Act

Digital Millenium Copyright Act

Was passed to give significant protection to owners of copyrights in digital information.

In which situations do people have a reasonable expectation of privacy?

When they enter their personal banking information with an online mortgage lender When they disclose credit information to obtain a loan online


Kaugnay na mga set ng pag-aaral

CH.8 Risk Management: identifying and assessing risk

View Set

Chapter 7: Arrays and the ArrayList Class

View Set

environmental geology chapter 13-15 exam

View Set

Helpdesk: Understanding Networking (Ch.7)

View Set

CL OUD -E NA B L I NG T E CHNOL OG Y

View Set

CSCI Final (4) + Microsoft Access

View Set

Chapter 4: The Nursing Process in Drug Therapy

View Set

National 2 Quiz (Property & Government Rights)

View Set