CBAD Test 2 Ch.5 Print out
What act did Congress pass in 1998 to provide additional protection to copyright holders? Anticybersquatting Consumer Protection Act (ACPA) Electronic Communications Privacy Act (ECPA) Digitally Made Copyrights Act (DMCA) Digital Millennium Copyright Act (DMCA)
Digital Millennium Copyright Act (DMCA)
The use of cookies by online retailers is illegal. True False
False
The right to privacy is guaranteed by the United States' Bill of Rights. True False
True
Sally registers the domain name thedallascowboys.com before the NLF football team is able to do so, with the title of her web site called The Dallas Cowboys, a nightclub in Austin, Texas. Sally's use of the domain name and the name of her bar is: trademark squatting. trademark theft. trademark dilution. trademark infringement.
trademark dilution.
Delite Toys, Inc., makes EZ Goo, a famous children's toy. Without Delite's consent, Fast Adhesives Company begins to use "ezgoo" as part of the URL for Fast's Website. Fast claims that no consumer would confuse the Web site with the toy. Fast has committed: trademark infringement. no actionable violation. patent infringement. copyright infringement.
trademark infringement.
Victor uses the trademarked name "Wal-Mart" as a meta tag for his business's Website in order to increase the likelihood that his site will be included in search engine results. Victor's actions constitute: cybersquatting. enjoinment from licensing. typosquatting. trademark infringement.
trademark infringement.
An Internet service provider (ISP) is not normally liable for its users' defamatory remarks. True False
True
Ben has consulted with an attorney regarding his employer having reviewed his personal communications at work. Ben would have a viable claim for a violation of the Electronic Communications Privacy Act for which of the following actions? Accessing Ben's voicemail on his company issued cell phone Accessing Ben's private Facebook page by guessing his password Reviewing Ben's telephone calls on his work phone Reviewing Ben's work email on his work computer
Accessing Ben's private Facebook page by guessing his password
Which of the following is not subject to copyright when posted on the Internet? News articles All of these are generally subject to copyright. Movies Photos
All of these are generally subject to copyright.
Which of the following represents a violation of the Electronic Communications Privacy Act (ECPA)? A supervisor fires an employee after hearing that person sexually harass a customer during a sales call that takes place after 5:00 PM. An employer intercepts and reads the personal emails an employee sent from the employee's personal cell phone during work hours. An employer records a phone call that an employee has with a major customer on the landline at the employee's desk. An employer reads the emails employees send over the company-owned server.
An employer intercepts and reads the personal emails an employee sent from the employee's personal cell phone during work hours.
WeShare Corp. is a peer-to-peer network that connects students to others on their college campus. WeShare attracts users by promoting how the software allows students to collaborate on coursework, as well as how it enables them to share their music libraries with one another. Specifically, the software allows a user to see what MP3 files are on their connections' computers and download these files for their own use. Who is liable for copyright infringement in this case? Both the students sharing files and WeShare Corp Neither the students sharing files nor WeShare Corp WeShare Corp The students sharing files
Both the students sharing files and WeShare Corp
Jared recently returned from vacation to find his home burglarized. One of the items stolen was a one-of-a-kind painting he had purchased at a gallery. After reporting the break-in to police, Jared went on Facebook. He saw that one of his friends had commented on a photo of a painting that looked just like the one that had been stolen. Jared does not know the person that posted the photo. What should Jared do? The police can't use the post in their investigation, so Jared should do a Google search to find the poster's address, then go to that address to see if he can determine if the person has the painting. Nothing, if the poster and Jared were connected as friends, then the police could use the information in their investigation. However, because the Facebook exchange was only between Jared's friend and the original poster, neither Jared nor the police are allowed to use the information in the post. Nothing, social media posts are personal communications. Police are not allowed to use them to identify or locate a suspect. Call the police. The police are allowed to use social media to determine the identity of a suspect and/or locate that person.
Call the police. The police are allowed to use social media to determine the identity of a suspect and/or locate that person.
In a number of cases, software providers that offer products that enable file sharing have been held liable for copyright infringement, even though the companies themselves did not store or distribute any copyrighted content. This is an example of what kind of copyright infringement? Direct Fair use Unknown and/or unknowable Contributory and/or vicarious
Contributory and/or vicarious
Any time an Internet user is required to use a password in order to access a website, they have a reasonable expectation of privacy on that website. True False
False
Because it was enacted and modified before social media networks existed, the Electronic Communications Privacy Act (ECPA) cannot be applied to communications made via social media. True False
False
Because the Internet is vast, the unauthorized use of another's mark in a domain name is generally permissible. True False
False
Federal courts have made it clear that digitally sampling a copyrighted sound recording of any length constitutes copyright infringement. True False
False
Google's popular "Sheets" tool allows users to create spreadsheets. These spreadsheets can be shared among different users. The users are provided a link that allows them to access the document from Google's servers. They can then either edit the document collaboratively in real time or review it separately when it is convenient for each individual. Google Sheets is an example of peer-to-peer networking (P2P). True False
False
In administrative law cases, social media posts are automatically considered free speech. As a result, a judge cannot use them in rendering a decision. True False
False
In general, a copyright is only infringed if an Internet user distributes another's copyrighted material without authorization, for example by posting it to his or her Website. True False
False
It is illegal for an Internet service provider (ISP) to keep private the identity of its customers. True False
False
Like newspapers and television stations, Internet service providers (ISPs) publish or distribute content. Thus, like newspapers and television stations, (ISPs) are typically liable for defamatory statements made on their sites. True False
False
The "right to be forgotten" has been written into law at the federal level in the United States. True False
False
The Consumer Privacy Bill of Rights has been proposed by a collection of Internet companies, such as Google. True False
False
The Federal CAN-SPAM Act prohibits the sending of unsolicited commercial e-mail. True False
False
The invention of internal social media networks, or intranets, means that companies no longer need to worry about protecting trade secrets. True False
False
There are no statutes regulating the use of spam. True False
False
With more and more information being transmitted over the Internet, copyright infringement is becoming less and less of an issue because the relevant laws are less stringent for digitally produced content. True False
False
What government body is responsible for investigating consumer complaints of privacy violations? Department of Defense (DoD) Internet Corporation for Assigned Names and Numbers (ICANN) Consumer Watchdog Group (CWG) Federal Trade Commission (FTC)
Federal Trade Commission (FTC)
CrazyCoupon Corp. maintains an online database of customers to whom it emails coupons. Georgia is an employee of CrazyCoupon. She downloads part of the database and sends it to her friend Alan, who wants to use the contacts to solicit customers for his auto dealership. By downloading information from a database, Georgia may have committed copyright infringement. True False
True
Gabe and his two partners operate a website called CatWorld.com. Together, they write articles about the latest trends in cat ownership, which they post on the site. Which of the following is least likely to be a case of copyright infringement? Gabe sends the draft of an interview he did with his neighbor's cat Bonkers to one of his partners. His partner edits the text, then uploads it as a feature on CatWorld.com. Gabe uses a peer-to-peer file sharing site to download 10 half-hour Garfield cartoons that one of his partners recently purchased. He watches the videos after a long day of work. Gabe downloads 30 cat videos from YouTube. He splices short clips of the videos together and uploads the resulting video montage to CatWorld.com. Gabe finds an interesting article about the brands of yarn that cats like best on the site YarnTails.com. He copies the text of the article and pastes it in the "Toy Time" section of CatWorld.com.
Gabe sends the draft of an interview he did with his neighbor's cat Bonkers to one of his partners. His partner edits the text, then uploads it as a feature on CatWorld.com.
The nonprofit organization that oversees the distribution of domain names and operates an online arbitration system is: FCC. CNET. ACPA. ICANN.
ICANN.
Cut-Ups is a barbershop where the barbers tell jokes as they cut customers' hair. Recently, someone has been posting anonymous online reviews claiming that Cut-Ups gives terrible haircuts and that the barbers' jokes are not funny. Cut-Ups might be able to file a lawsuit for defamation if which of the following is true? It can prove the person posting the comments has never been a customer at the shop. It can prove the customer posting the reviews is related to a barber at another barbershop. All of its previous online reviews have been positive. A professional comedian writes its jokes.
It can prove the person posting the comments has never been a customer at the shop.
What is one reason why the Internet has made prosecuting an individual for defamation more difficult? Prosecution of online defamation requires that the alleged defamatory comments be statements of fact. It is legal to make defamatory statements on Internet discussion boards. Defamatory comments made online are inadmissible in court. It is often difficult to identify an individual making defamatory statements online.
It is often difficult to identify an individual making defamatory statements online.
The development of this file compression and decompression system is largely credited with the emergence of widespread music sharing on the Internet. P2P SP2 CD MP3
MP3
Oscar Lorosa recently opened a local restaurant named "Oscar's Dishes." He registered the domain name oscarsdishes.com for his website. Two weeks later he was sued by the company "The Oscar Dish" for trademark infringement. The company is asking for $90,000 in damages. The Oscar Dish hosts a website that discusses rumors about each year's Academy Awards, which are also known as the Oscars. Which of the following defenses is most likely to succeed in court? Because his first name is legally Oscar, Mr. Lorosa has a greater right to the trademark than The Oscar Dish. Mr. Lorosa has not even made $90,000 of revenue since opening his restaurant, so he could not possibly have taken that much business from The Oscar Dish. Mr. Lorosa did not have a "bad faith intent" to profit from The Oscar Dish's trademark. He agrees to stop using the domain name immediately. "The Oscars" is not the official name of the Academy Awards, so the The Oscar Dish is not a valid trademark.
Mr. Lorosa did not have a "bad faith intent" to profit from The Oscar Dish's trademark. He agrees to stop using the domain name immediately.
When Jorge started a new job at Acme, Inc. he signed a document stating that he would not post any negative comments about his co-workers on social media sites. A few months later, Jorge wrote on Facebook that an employee that reported to him was "lazy" and "knew nothing about Acme's industry". Jorge was fired after his supervisor discovered the post. Is it likely that Acme, Inc.'s actions violated the law? No, because they are providing employment, companies are free to restrict whatever employees say about their work, the business, or their co-workers. Yes, because Jorge's comments were about an employee other than his supervisor, the supervisor has no right to fire him. Yes, Jorge's signature is irrelevant. The company has no right to prevent him from saying anything he likes about the organization and its employees. No, as long as a company has clearly stated its policy on employees' use of social media, courts have generally found that it is within the company's rights to enforce that policy.
No, as long as a company has clearly stated its policy on employees' use of social media, courts have generally found that it is within the company's rights to enforce that policy.
Ronald owns a hamburger shop. One of his major competitors is Wendell's Burger Bar. In order to size up his competition, Ronald goes to Wendell's and orders a jumbo burger. He thinks it tastes gross. He goes home and writes an online review saying how terrible the burger was. Is this post defamatory? No, because the review was posted anonymously. Yes, because Ronald only thought the hamburger was gross because he was biased. Yes, because Ronald owns a competing hamburger stand. No, because the comment was an opinion, not a statement of fact.
No, because the comment was an opinion, not a statement of fact.
The company "The Oscar Dish" hosts a website that discusses various rumors, events, and other topics related to each year's Academy Awards, which are also known as The Oscars. The company works hard to generate traffic to its site because it makes money by charging other companies to advertise on its pages. To increase traffic, The Oscar Dish uses a variety of meta tags. Which of the following tags is likely to represent trademark infringement if used by the company? Academy Awards None of these met tags are likely to be trademark infringement Actors Rumors
None of these met tags are likely to be trademark infringement
Rachel is CEO of Burger Queen, a publicly traded chain of fast food outlets. Over the weekend, she successfully lands famous basketball star LeDon Jameson as a spokesperson for the chain. Rachel posts the big news on her Twitter and Facebook accounts before the company issues a press release. Is Rachel likely to have an issue with the SEC as a result of her actions? No, Rachel can say whatever she wants on social media. No, because the information was truthful. Only if investors had not been told that Rachel would be communicating company information via these accounts. Yes, because executives are never supposed to comment on their companies via social media.
Only if investors had not been told that Rachel would be communicating company information via these accounts.
Deana was planning a big wedding in June. In May, she slipped on a wet floor while doing laundry at Suds n' Soap Laundromat. She sued Suds n' Soap, claiming that her injuries forced her to postpone her wedding and cancel her honeymoon to Mexico. Initially, Deana won the case and was awarded $90,000. Then, it was discovered that on June 3, Deana had posted photos of herself relaxing on the beach in Mexico. One photo was captioned: "Well, we may not be getting married for another month - but, we'll enjoy our pre-wedding honeymoon on Suds n' Soap's dime!" What impact, if any, might Deana's posts have on the outcome of her case? Since Deana posted the photos on her personal Facebook page, they cannot be used in court. She will get to keep the full $90,000. Since the photos demonstrate that Deana lied about taking the trip, the result of the case is automatically invalidated. She must immediately return the full $90,000 to Suds n' Soap. Since the posts occurred after the jury made its initial decision, it is too late. Deana is entitled to keep the full $90,000. Since the post provides evidence that Deana did not have to cancel her trip, the jury could reduce the amount of damages she was awarded.
Since the post provides evidence that Deana did not have to cancel her trip, the jury could reduce the amount of damages she was awarded.
The advent of social media has impacted what aspect of the legal process? Criminal investigations Social media has impacted all of these aspects of the legal process. Settlement agreements Litigation
Social media has impacted all of these aspects of the legal process.
If passed, the proposed Consumer Privacy Bill of Rights would make which of the following illegal? Collecting personal information such as a consumer's address and telephone number when they make a purchase online All of these would be illegal if the Consumer Privacy Bill of Rights becomes law. Storing consumers' personal information on unsecured company servers The use of cookies by online retailers
Storing consumers' personal information on unsecured company servers
Which of the following is likely not a reasonable expectation of privacy for Internet users to have? That Facebook will keep an employee's boss from viewing the pictures they post on the site. That Facebook will not use one's photos to advertise other companies' products without the person's permission. That the Internal Revenue Service will keep one's social security number from being accessed by third parties. That Amazon.com will keep credit card information private and secure.
That Facebook will keep an employee's boss from viewing the pictures they post on the site.
Which of the following is likely to warrant an exception to the Communications Decency Act (CDA) and make an Internet service provider (ISP) liable for defamatory content by third parties? The ISP provides unmoderated discussion boards for use by users. All of these may constitute an exception and make the ISP liable. The ISP does not confirm the identities of users before allowing them to access to its sites. The ISP has prompted users to make such comments.
The ISP has prompted users to make such comments.
Frankie's employer believes that she might be selling sensitive market share information to competitors. The company believes she might be conveying the information via her personal cell phone and asks her service provider to turn over records of her calls. What act might the cell phone company cite if it does not wish to turn over the records? The CAN-SPAM Act All of these acts could be a plausible defense. The Distributed Data Act (DDA) The Stored Communications Act (SCA)
The Stored Communications Act (SCA)
Which of the following is a benefit of winning a defamation lawsuit against an unknown party, or "John Doe"? The Internet service provider (ISP) has to pay damages to plaintiffs in cases where the true identity of the defendant is unknown. In 1986, a real person named John Doe established a bank account with donated funds for cases where the true identity of a defendant is unknown. The plaintiff may be able to receive damages from this account. The government has to pay damages to plaintiffs in cases where the true identity of the defendant is unknown. The win may allow the plaintiff to use the authority of the courts to obtain from Internet service providers (ISPs) the identity of the persons responsible for the defamation.
The win may allow the plaintiff to use the authority of the courts to obtain from Internet service providers (ISPs) the identity of the persons responsible for the defamation.
Why are many lawsuits involving online defamation brought against John Doe and Jane Doe? Judges like to use these names because it makes their verdicts shorter and easier to read. These are the Internet pioneers that invented email, which is a major vehicle for online defamation. These are names typically used when the true identity of a party is not known. The two are an Internet couple widely known for spreading rumors online.
These are names typically used when the true identity of a party is not known.
What was the purpose of the Electronic Communications Privacy Act, or ECPA? To provide a national network for social media information The ECPA did not have any of these purposes To prevent foreign nationals from pirating copyrighted works To amend federal wiretapping law to cover electronic forms of communication
To amend federal wiretapping law to cover electronic forms of communication
Which of the following is a reason an online retailer might want to use cookies? To offer consumers coupons customized to their interests To save on server costs To avoid FTC oversight To store credit card information securely
To offer consumers coupons customized to their interests
Lucille owns a cookie shop in Boston called "Cookie Time" that her father started in 1946. The shop makes small batches of delicious, high quality cookies. In 2009, Burt Crank started a cookie delivery business called "It's Cookie Time!" The company's cookies are of fairly low quality, but the delivery service is convenient for customers. Burt created a website under the domain name itscookietime.com that people use to place their orders. What claim might Lucille's company have against Burt's? Spam infringement Trademark theft Copyright infringement Trademark dilution
Trademark dilution
KnittedTogether.com is a social media site that connects people who love to knit. When a new user joins, they are presented the opportunity to download a thirty page document outlining the site's privacy policy. To access the document, the user needs to download special software that requires detailed knowledge of a rare programming language to install. The document itself is written in small print, using formal legal language. Which element of the proposed Consumer Privacy Bill of Rights might require KnittedTogether to change this set up? Timeliness Cost Security Transparency
Transparency
Jeff tells Suzanne that their boss, Delia, is having an affair with her secretary. Suzanne hates Delia and posts the juicy gossip on her blog. Delia's boss reads the blog and fires her. Delia sues for defamation, as she wasn't really having an affair. Suzanne is likely liable, even though she originally got the information from Jeff. True False
True
UTrickUm.com is a website that sells products to magicians. When a customer makes a purchase, the company collects various bits of personal information that it uses in a number of ways. Which of the following will the company likely have to stop doing if the proposed Consumer Privacy Bill of Rights becomes law? UTrickUm hosts a social media site where customers can create a profile listing information such as where they live, their favorite tricks, and if they are interested in meeting other magicians in their area. UTrickUm would have to stop all of these practices if the Consumer Privacy Bill of Rights became law. UTrickUm allows customers to store their credit card information in the company's database so they don't need to re-enter it if they return and make another purchase. UTrickUm sells customer names and addresses to MatchMagic.com, a personals site for single magicians. Customers are not told their information is sold to MatchMagic.
UTrickUm sells customer names and addresses to MatchMagic.com, a personals site for single magicians. Customers are not told their information is sold to MatchMagic.
Derek is a lawyer that competes for business with Veronica, who has an office on the other side of town. Derek posts on his Twitter feed that Veronica embezzled $25,000 from a former client. In order for Derek's comments to be considered defamation, which of the following must be true? Veronica must not be doing work for any of Derek's former clients. Derek must have proof that Veronica embezzled the money. Derek must have also made these comments somewhere other than Twitter. Veronica must not have actually embezzled the money.
Veronica must not have actually embezzled the money.
Harry recently interviewed for a sales clerk position at Betty's Bargains, a discount retailer in Grand Rapids, Michigan. He thought the interview went great, but later learned from Betty that he did not get the position. He believes this is because his Facebook page is full of pictures of him smoking marijuana with his friends. He knows that in Michigan, it is illegal to take actions against job applicants based on their social media postings. He tells Betty that he will take her to court if she doesn't give him the job. Betty is not worried. Which of the following is a plausible basis for her confidence? While Betty did look at Harry's page, marijuana is illegal in Michigan and Harry's illegal actions override her own. Betty's Bargains is privately owned, not a publicly-traded corporation. The relevant law does not apply to retail positions. While Betty did look at Harry's page, she did so with her Internet browser set to "Private Browsing."
While Betty did look at Harry's page, she did so with her Internet browser set to "Private Browsing."
Debra recently bought a DVD copy of a popular new movie. Several of her friends were interested in the movie, so Debra offered to use her computer to burn copies for them. Is Debra violating copyright law if she makes the copies? Yes, but only if she makes 10 or more copies. No Yes Yes, but only if she charges her friends for the DVD copies.
Yes
An Internet service provider must disclose personal information about its customer when: a court orders the company to provide the information. none of these choices. a plaintiff alleges defamation in the customer's online posting. a plaintiff petitions the company for the information.
a court orders the company to provide the information.
Daniel wants his website to comply with the proposed Consumer Privacy Bill of Rights. Daniel will have to implement all of the following consumer protections except: secure and responsible handling of personal data. reasonable limits on what personal data Daniel collects and retains. access to Daniel's private server by consumers to view his data management practices. individual control by consumers over what data Daniel collects.
access to Daniel's private server by consumers to view his data management practices.
Unobtainium Venture Capital, a new venture capital start-up, wants to create a place for employees to communicate and share files, but wants to minimize its potential risk to competitors by protecting trade secrets that the shared data may contain. UVC should utilize: a public social media site. an internal social network. standalone PCs. email.
an internal social network.
Salesforce.com is an online customer relationship management (CRM) platform. Companies use CRMs to help their salespeople manage customer accounts. With Salesforce.com, employees can log in to the platform from any computer and access their customers' information. Salesforce.com is an example of: peer-to-peer (P2P) networking. an Internet service provider (ISP). a distributed network. cloud computing.
cloud computing
Invisible files that computers, smartphones, and other mobile devices create to track a user's Web browsing activities are called: malware. bytes. spam. cookies.
cookies.
The term for a tort that arises from online conduct is: Internet tort. viral tort. online tort. cyber tort.
cyber tort.
The act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner is called: peer-to-peer networking. cybersquatting. cybermarking. cloud computing.
cybersquatting.
Kodak learns that www.kodak.com has already been registered by someone else as a domain name. The company owns the trademark to the 'Kodak' name. Kodak can pursue all of the following under the Anticybersquatting Consumer Protection Act except: sue to receive statutory damages from the owner of the infringing Web site ranging from $1,000 to $100,000. enjoin the owner of the infringing Web site from purchasing other domain names. sue to collect actual damages and profits from the owner of the infringing Web site. ask the court for a subpoena to discover the identity of the owner of the infringing Web site.
enjoin the owner of the infringing Web site from purchasing other domain names
The goal of the proposed Consumer Privacy Bill of Rights is to: give free speech to consumers who wish to criticize companies anonymously. none of these are goals of the proposed Consumer Privacy Bill of Rights. protect business executives from defamation by consumers. ensure that personal information is safe online.
ensure that personal information is safe online.
"gLTD" stands for: generic top level domain. none of these choices. good level to demand. general, limited.
generic top level domain
Criminal penalties for copyright violations can be imposed: only if someone physically steals a copyrighted work from a brick-and-mortar store. only if the individuals exchanging the copyrighted work are not friends. if unauthorized copies were exchanged, regardless if the exchange was made for profit. only if unauthorized copies were exchanged for financial gain.
if unauthorized copies were exchanged, regardless if the exchange was made for profit.
One of the legal difficulties posed by defamatory remarks made online is that: defendants in online defamation suits retaliate by spamming the plaintiffs, thus overloading the plaintiffs' Web sites and causing them to suffer further harm. it is difficult to learn the identity of the person who made the defamatory remarks. the Internet makes it is so easy to locate those who make the defamatory statements that the courts are overburdened with tort lawsuits. it makes it difficult for Internet service providers (ISPs) to stay in business, because they are held liable for the defamatory remarks made by those using their services.
it is difficult to learn the identity of the person who made the defamatory remarks.
ChristianHire.com is a website for employers looking for employees that belong to Christian religions. In order to apply for jobs, applicants must list their religious affiliation and how often they attend church services. Hiring based on religious affiliation violates the Equal Employment Opportunity Act. An atheist job applicant sues ChristianHire.com. ChristianHire is most likely: liable in this case, despite being an Internet service provider. not liable in this case because the job applicant was an atheist, not a Christian. liable because Internet service providers are always responsible for content posted on their sites. not liable because Internet service providers are not liable for content posted on their sites.
liable in this case, despite being an Internet service provider.
Frank wants to use a trademark owned by Anna. Frank knows that Anna will not sell Frank her trademark outright. Instead, Frank can pursue permission to use the trademark through a: trademark transaction fee. hardware distribution management agreement. lawsuit. license.
license.
The widespread use of the Internet has made the protection of trade secrets: impossible, and the laws governing trade secrets are being repealed. undesirable, so companies now readily share their trade secrets with competitors. more difficult, because an employee can easily transfer to competitors or others his or her employer's trade secrets via e-mail or a disk. easier, because most employers monitor their employees' online communications and thus can know when a company trade secret is being disclosed or used without authorization.
more difficult, because an employee can easily transfer to competitors or others his or her employer's trade secrets via e-mail or a disk.
Christina downloads her favorite music through a network that does not use a central Web server but rather numerous personal computers connected to the internet. Christina is using a: cloud computing network. core monitored server network. third-party file storage. peer-to-peer network.
peer-to-peer network.
In order to maintain a suit for the invasion of privacy, a person must: prove the information in question was disclosed to over 1,000 people. prove the information in question was disclosed to over 100 people. prove the disclosure of the information caused his or her identity to be stolen. have a reasonable expectation of privacy in the particular situation.
prove the disclosure of the information caused his or her identity to be stolen.
The term cybersquatting means: registering someone else's mark as a domain name and then offering to forfeit the name for a price. developing an exercise video that is available for sale only online. registering your own unique name as a domain name. stealing another's meta tags.
registering someone else's mark as a domain name and then offering to forfeit the name for a price.