Legal Foundations of Business Chapter 17

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an INCORRECT statement regarding the​ E-SIGN Act?

The​ E-SIGN Act requires a handwritten signature to accompany an electronic signature in order for an​ Internet-based contract to be enforceable.

Brick and mortar companies are reaching a much broader market than in the past due to the growth of all of the following​ EXCEPT?

internet crime and cyberpiracy

A party who is granted limited rights in or access to intellectual property or information rights owned by a licensor is known as which of the​ following?

licensee

Which of the following is an INCORRECT statement regarding the registration of domain​ names?

Domain names cannot be​ registered, since they do not constitute intellectual property.

One of the main features of the​ ________ is that it recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts.

E-SIGN Act

The​ _______ gives an​ e-signature the same force and effect as a​ handwritten, pen-inscribed signature on paper.

E-SIGN Act

The​ _______ recognizes an electronic​ signature, or e-signature.

E-SIGN Act

The​ ________ provides that electronically signed contracts cannot be denied effect because they are in electronic form or delivered electronically.

E-SIGN Act

_____ are enforceable as long as they meet the requirements necessary to form a traditional​ contract, including​ agreement, consideration,​ capacity, and lawful object.

E-mail contracts

Which of the following is an INCORRECT statement regarding​ e-mail contracts?

E-mail contracts are unenforceable unless accompanied by a​ traditional, written contract.

Suppose Henry owns a computer on which he sends and receives​ e-mail. Harriet learns​ Henry's access code to his​ e-mail account. Harriet opens​ Henry's e-mail and reads his​ e-mails. Harriet has violated the​ _____.

ECPA

An employer can access stored​ e-mail communications of employees using the​ employer's service. This is granted by the​ _________.

Electronic Communications Privacy Act

Barb owns a computer on which she sends and receives e-mail. Bob learns​ Barb's access code to her​ e-mail account. Bob opens​ Barb's e-mail and reads her​ e-mails. Bob has violated the​ ______.

Electronic Communications Privacy Act

Government and law enforcement entities that are investigating suspected illegal activity are allowed to access online communications. This is granted by the​ _______.

Electronic Communications Privacy Act

Which of the following is an INCORRECT statement regarding email​ contracts?

Email contracts are unenforceable unless accompanied by a​ traditional, written contract.

The domain name extension that represents the word​ "organization" and is used primarily by nonprofit groups is​ ________.

.org

Which of the following is an INCORRECT statement regarding the Electronic Communications Privacy Act​ (ECPA)?

In light of its severe criminal​ penalties, the ECPA does not recognize the right of an injured party to sue for civil damages for violations of the ECPA.

Which of the following is NOT a remedy under the the Anticybersquatting Consumer Protection Act​ (ACPA)?

Jail time

Which of the following statements about licensing agreements is​ true?

Most software programs and digital applications are licensed electronically.

Which of the following is an INCORRECT statement regarding​ e-commerce and Web​ contracts?

Out of concern regarding their validity and​ enforceability, the number of​ e-contracts has been decreasing in recent years.

Stu sends a text message to Sandy offering to sell his car to her for​ $5,000. Sandy accepts the offer via text message.​ Unfortunately, her text did not go through due to spotty cellular service in their coverage area. When Stu does not receive a response from​ Sandy, he sells the car to another person. Sandy sues Stu because she accepted the offer. Who will prevail and​ why?

Sandy will prevail because she accepted a valid offer and the mailbox rule applies.

A federal statute stating that Internet service providers are not liable for the content transmitted over their networks by e-mail users and websites is called​ ________.

The Communications Decency Act

_____ is designed to place the world of electronic commerce on a par with the world of paper contracts in the United States.

The E-Sign Act

______ creates contract law for the licensing of information technology rights

The Uniform Computer Information Transactions Act

According to the​ E-SIGN Act, a digital signature can be verified in all of the following ways​ EXCEPT?

an online polygraph examination

Domain names ​ ________.

can be registered

Sometimes a party registers a domain name of another​ party's trademarked name or a famous​ person's name. This act is called​ ________.

cybersquatting

A unique name that identifies an​ individual's or a​ company's website is called which of the​ following?

domain name

Examples of​ _____ include www.pearson.com​, www.microsoft.com​, and www.mcdonalds.com.

domain names

Suppose Dorothy owns a computer and licenses a computer software program from SoftWare Company to use on her computer. Dorothy downloads the software onto her computer from SoftWare​ Company's website. There is​ a(n) _____ between the two parties.

e-license

Cora owns a computer and licenses a computer software program from Tech Company to use on her computer. Cora downloads the software onto her computer from Tech​ Company's website. There is​ a(n) ________ between the two parties.

electronic license

​A(n) _______ is a contract whereby the owner of software or a digital application grants limited rights to the owner of a computer or digital device to use the software or digital application for a limited period and under specified conditions.

electronic license

The owner of an electronic program or application is the​ ________.

electronic licensor

Anticybersquatting Consumer Protection Act​ (ACPA) is a federal statute that permits trademark owners and​ ________________to recover domain names that use their names where the domain name has been registered by another person or business​ _____________________.

famous​ persons; in bad faith

Large and small businesses sell goods and services over the internet through​ ______________.

websites and registered domain names


Set pelajaran terkait

Pragmatic Ways to Solve Workplace Accidents and Crimes.

View Set

Foundations PrepU: Chapter 38 Oxygenation and Perfusion

View Set

Integración sensorial en los niños

View Set

Week 3: Create 10 Quiz questions and answers

View Set

Chapter 18- Genetics of Viruses and Bacteria

View Set