Week 6 Mindtap- Business LAW

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Sandy, a businessperson, is convicted of RICO offenses. Sandy's penalties may include

All of the choices

A person's intent to return embezzled property—or its actual return—is not a defense to the crime of embezzlement.

True

A suspect cannot be tried twice in the same court for the same crime.

True

An employer may have a right to terminate a person based on his or her violation of the employer's social media policy.

True

An internal company network can better protect the company's trade secrets.

True

Constitutional safeguards to protect the rights of individuals apply in federal courts.

True

Cyber torts are torts that arise from online conduct.

True

Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

True

Federal wiretapping law covers electronic forms of communication.

True

In some states, an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.

True

It is a federal crime to use income obtained from racketeering activity to buy an interest in any enterprise.

True

Online defamation is wrongfully hurting a person's reputation by communicating false statements about that person to others online.

True

Public officials prosecute criminal defendants.

True

Online conduct gives rise to only a narrow variety of legal actions.

True MAYBE FALSE (2)

Using another's trademark in a meta tag does not normally constitute trademark infringement, even if it is done without the owner's permission.

True Maybe False

Robert registers a domain name—sweetfriedpotatos.com—that is a misspelling of a popular brand—sweetfriedpotatoes.com. This is

typosquatting.

BeFriends Corporation uses the trademark of Community Life Inc., a social media site, as a meta tag without Community Life's permission. This may be permissible

under no circumstances.

Sales & Revenue, Inc., discovers that defamatory statements about its policies and products are being posted in an online forum. TransWeb Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. Sales & Revenue files a suit against the anonymous users. The plaintiff can obtain from TransWeb the identity of the persons responsible for the defamatory messages by

using the authority of the court.

To test computer security and conduct encryption research, Tech Solutions Inc. circumvents the encryption software and other technological antipiracy protection of United Business Corporation's software. Under the Digital Millennium Copyright Act, this is

​a "fair use" exception to the provisions of the act.

Employees, clients, and others with authorization use World Transport Corporation's network around the globe to share computer files. This is

​a distributed network.

InfoFree Inc. makes and sells devices and services for the circumvention of encryption software. Under the Digital Millennium Copyright Act, this is

​a violation of copyright law.

Web Marketing Inc. buys and sells domain names with the click of a mouse. A domain name can be bought and sold many times. Each change of owner is registered automatically as part of a mass registration. In this environment

​cybersquatting can flourish.

Suzu, an employee of Ridgeline Credit Union, deposits into her personal account checks entrusted to Ridgeline through its ATM system by customers to deposit into their accounts. This is

​embezzlement.

Chad signs Dolly's name, without her authorization, to the back of her paycheck, which was issued by Eastside Market. This is​

​forgery.

Rhino causes a disturbance at Soufflé Café. He is arrested and charged with disorderly conduct, a misdemeanor. A misdemeanor is a crime punishable by

imprisonment up to one year.

Federal law permits the intentional interception of any wire, oral, or electronic communication.

False

File-sharing software can be used to download others' copyrighted property without liability for any infringement.

False

Much of the material on the Internet, including software and database information, is not copyrighted.

False

No federal statute specifically addresses cyber crime.

False

The purpose of the exclusionary rule is to encourage criminals to provide exclusive evidence of their crimes.

False

Mae is granted immunity after she agrees to testify about a crime. Mae has an absolute privilege against self-incrimination and can

Maybe not refuse to testify

Mia offers Nevin, a building inspector, money to overlook the violations in her new warehouse. Nevin accepts the money and overlooks the violations. Mia is charged with the crime of bribery. The crime occurred when

Mia offered the bribe.​

A cyberterrorist might target a government agency, but not a business.

False

A stolen credit card is more likely to hurt the cardholder than a merchant.​

False

An Internet service provider is liable for any act of copyright infringement by its customer.​

False

Criminal law spells out the duties that exist between persons or between citizens and their governments.

False

Cybersquatting occurs when key words are inserted into a Web site's keywords coding to tell Internet browsers specific information about a Web page.

False

Federal law permits the intentional accessing of stored electronic communication even if the accessing is unauthorized.

False

Enrico accesses Finance Bank's computer system without authority to obtain protected financial and credit records. Under federal law, this is

a felony if it was done for a commercial purpose.

Grain Mill Company brings a suit against Milled Grain Company under the Anticybersquatting Consumer Protection Act, alleging that Milled Grain is profiting from a domain name that is confusingly similar to Grain Mill's trademark. If Grain Mill is successful, a recovery may include

actual damages and profits in any amount.

Eddie and other users of Facebook and other social networking sites post trademarked images and copyrighted materials on these sites without permission. This is

c. ​a violation of the intellectual property rights of the owners of the images and materials.

Don sends e-mail to Eve, promising her a percentage of the amount in a foreign bank account if she will assist in transferring the funds to a U.S. bank account. Eve forwards her account number, but the funds are never sent. Instead, Don quickly withdraws the funds in Eve's account. This is

cyber fraud.

Tech Outsourcing, Inc., registers a domain name that is the same as, or confusingly similar to, the trademark of Tech Resourcing Corporation and then offers to sell the domain name back to Tech Resourcing. This is

cybersquatting.

Far & Wide Corporation uses the trademark of Google Inc. in a meta tag without Google's permission. This is

d. ​trademark infringement.

Bev wrongfully takes an unopened carton from a Cold Storage Warehouse loading dock, puts the carton in her car, and drives away. This is

larceny.

Berto pushes Consuela to the ground, grabbing her smartphone as she falls. The use of force or fear is required for this act to constitute

robbery.

Ludwig receives from Milo a marimba stolen from Nadine. Which of the following, if Ludwig knew, would cause him to be criminally liable?

that the marimba is stolen and he intended to keep it

Paxton uses social media to post links that, when clicked, secretly install software on hundreds of others' personal computers without their owners' knowledge Paxton's software is harmful to the computers on which he installed it. This program is

​malware.

Refer to Fact Pattern 9-2. CallTalk wants to sue Call&Talk for its unauthorized use of the domain name "callltalk" on a theory of trademark dilution. This claim requires proof that

​none of the choices.

Ossie enters a convenience store and points a gun at the clerk Pico. Ossie forces Pico to open the cash register and give him all the money. Ossie will most likely be charged with

​robbery.


संबंधित स्टडी सेट्स

Chapter 15: The Digestion and Absorption of Food

View Set

Macro Chapter 02: Production Possibilities, Opportunity Cost, and Economic Growth

View Set

Chapter 6: Arrays and ArrayLists

View Set

Exemplar Chronic Obstructive Pulmonary Disease

View Set