Ethics & Law in IT Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Fair Credit Reporting Act

The ___ outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data

Family Educational Rights and Privacy Act

The ___ presumes that a student's records are private and not available to the public without the consent of the student.

Electronic Communications Privacy Act

The ___ prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards and social networking sites.

Fourth Amendment

The ___ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

Safeguards Rule

The ___ requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data.

protected by the Bill of Rights

The concept of privacy is

expression

The concept that an idea cannot be copyrighted but the ___ of an idea can be is key to understanding copyright protection.

enable interoperability

The courts have ruled in favor of using reverse engineering to ___.

open source license

The redistribution of a program code with no copyright as a proprietary software can be avoided by using a(n) _____.

Electronic Communications Privacy Act

Title I of the ___ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the internet.

there is no need to file an application or disclose a trade secret to gain protection

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ___ .

be obvious to a person having ordinary skill in the same field

One of the tests that an invention must pass to be eligible for a patent is that it must ___.

event data recorder

One purpose of a(n)___ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

inventions

Patent law protects

Internet filters

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify ___.

USA PATRIOT Act

The ___ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records.

Gramm-Leach-Bliley Act

The ___ is an act that repealed a depression-era law known as Glass-Steagall.

public schools and universities

Although they may implement a speech code, ___ are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint.

software patent

A ___ claims as its invention some feature or process embodied in instructions executed by a computer.

slander

An oral defamatory statement is called ___.

USPTO

A patent is a grant of a property right issued by the ___ to an inventor.

decompiler

A(n) ___ can read the machine language of a software program and produce the source code.

trap and trace

A(n) ___ is a device that records the originating number of incoming calls for a particular phone number.

trademark

A(n) ___ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.

Internet filter

A(n) ___ is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material.

non-compete agreement

A(n) ___ prohibits a departing employee from working for any competitors for a period of time.

defamation

Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of ___.

The US Constitution

Copyright and patent protection was established through ___.

register domain names for famous trademarks or company names to which they have no connection

Cybersquatters ___.

anonymity

Despite the importance of ____ in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights.

evidence

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain ___ from the other party by various means.

created a hostile work environment

If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has __.

First

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the __ Amendment.

without reasonable expectation of privacy, there is no privacy right.

In the context of the Fourth Amendment, the courts have ruled that

competitive intelligence

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ___.

Communications Decency Act

Section 230 of the ___ provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider.

subpoenas requesting the identity of anonymous Web posters

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to ___.

does not cover the dissemination of information to children.

The Children's Online Privacy Protection Act

written consent

The Health Insurance Portability and Accountability Act requires healthcare providers to obtain ___ from patients prior to disclosing any information in their medical records.

defamation

The Supreme Court has held that obscene speech and ___ are not protected by the First Amendment and may be forbidden by the government.

Three

The U.S. Supreme Court has ruled that there are ___ classes of items that cannot be patented.

Fair and Accurate Credit Transactions Act

The ___ allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies.

European Union Data Protection Directive

The ___ bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries.

Freedom of Information Act

The ___ enables the public to gain access to certain government records.

extradited

U.S. laws do not allow a person to be ___ for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country.

Gramm-Leach-Bliley Act

Under the ___, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

Communications Assistance for Law Enforcement Act

Under the ___, the federal Communications Commission responded to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.

Digital Millennium Copyright Act (DMCA)

Unlike traditional copyright law, the ___ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.

A John Doe lawsuit

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

Remailers

Which of the following can provide a virtually untraceable level of anonymity to email messages?

Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?

The problem with the CDA was its broad language and vague definition of "indecency", a standard that was left to individual communities to determine.

Which of the following statements is true of Communications Decency Act (CDA)?

Anonymous expression

___ allows people to state their opinions without revealing their identity.

Fair use doctrine

___ allows portions of copyrighted materials to be used without permission under certain circumstances.

Doxing

___ involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster.

Truth

___ is an absolute defense against a charge of defamation.

Plagiarism

___ is the act of stealing someone's ideas or words and passing them off as one's own.

Internet censorship

___ is the control or suppression of the publishing or accessing of information on the Internet.

Prior art

___ is the existing body of knowledge available to a person of ordinary skill in the art.

Reverse engineering

____ is the process of taking something apart in order to understand it, build a copy of it, or improve it.


Ensembles d'études connexes

Evolve Adaptive Quiz - Fundementals

View Set

The Essential Elements of Public Speaking - Chapters 1 - 5 (Credits to Hany_Zaky)

View Set

Chapter 70: Management of Patients with Oncologic or Degenerative Neurologic Disorders

View Set

Mega International Econ (Part 6) Essay Questions

View Set

Bio 1 - Chapter 12 Molecular Biology of the Gene

View Set

NIC 3rd Semester; ATI targeted neurosensory and muscultoskeletal online practice 2019

View Set