Chapter 8
Retailers collect information about consumers using
Cookies
Online defamation occurs when an individual communicates a false statement about a person through the internet.
True
Is the act of buying domain names that are similar to well-known domains, except for slight misspellings.
Typo squatting
Distributed network
A network that can be used by persons located (distributed) around the country or the globe to share computer files.
Electronic Communications Privacy Act
Amended federal wiretapping law to cover electronic forms of communication
Is the act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner.
Cybersquatting
Prohibited activités of the CAN-SPAM act
Deceptive information Misleading information False return addresses False information Sending messages to randomly generated e-mail addresses
One of the major problems in pursuing an online defamation claim is that:
Discovering and proving the identity of the person who posted the defamation can be difficult.
Social Media
Electronic media that allows people with similar interests to participate in a social network
Currently, there are no state laws protecting individuals from disclosing their social media passwords.
False
Internet service providers are generally treated the same as print publishers and other media regarding liability for defamation.
False
Cloud computing
Is a delivery model that enables delivery to users of on-demand services from third-party servers over a network.
Occurs when another party uses a domain name similar to yours.
Loss of goodwill
Hobbs owns a small internet service provider. He is sued by Allison because someone who pays Hobbs a monthly fee posted a defamatory statement about Allison. Will Allison prevail in court?
No, because the Communications Decency Act treats Internet service providers differently from print publishers.
Because you are suspected of sending out bulk unsolicited e-mail advertisements, the FTC asks your internet service provider to supply information on what you do in foreign jurisdictions. Will you succeed in a lawsuit against your internet service provider for providing such information to the FTC?
No, because the U.S. Safe Web Act provides immunity to the ISP from liability for such action.
Which agency investigates consumer complaints of privacy violations?
The Federal Trade Commission
Which act prevents cell phone companies and social media networks from divulging private communications to certain entities and individuals?
The Stored Communications Act
The Electronic Communications Privacy Act prohibits:
The intentional interception of an employee's personal electronic communications by an employer on a non-employer-supplied device The intentional disclosure of information obtained by electronic interception not subject to exclusion under the ECPA.The intentional interception of a phone call by a person not a party to the phone call
Peer-to-peer Networking
The sharing of resources (such as files, hard drives, and processing styles) among multiple computers without necessarily requiring a central network server.
Which of the following instances of circumvention (bypassing) of copyright are allowed under the Digital Millennium Copyright Act?
The testing of computer security Protection of personal privacy Enabling parents to monitor their children's internet use Conducting encryption research
When can social media posts be used by law enforcement?
To determine the identities of suspects To further federal regulators' investigation into illegal activities To locate a suspect To detect and prosecute criminals
Courts and administrative agencies usually uphold an employer's right to terminate a person based on his or her violation of a social media policy.
True
Employees' posts on social media may be protected under labor law.
True
In 2003, Congress enacted the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, which prohibits the sending of unsolicited commercial emails.
True
The Anticybersquatting Consumer Protection Act applies to all domain name registrations and trademarks.
True
Under the Proposed Consumer Privacy Bill of Rights, consumers have a right to reasonable limits on the personal data that companies collect and retain.
True
Because the federal CAN-SPAM Act applies only to e-mails originating in the United States, Congress enacted the
U.S Safe Web Act
Digital Millenium Copyright Act
Was passed to give significant protection to owners of copyrights in digital information.
In which situations do people have a reasonable expectation of privacy?
When they enter their personal banking information with an online mortgage lender When they disclose credit information to obtain a loan online