BLAW CH. 9 Mindtap Practice Questions

Ace your homework & exams now with Quizwiz!

Which act prevents cellphone companies and social media networks from divulging private communications to certain entities and individuals? a. The Stored Communications Act b. The Mega-Data Stored Act c. The Nondivulgance Ac

a. The Stored Communications Act

Cyber torts include online defamation. a. True b. False

a. True

Ben has consulted with an attorney regarding his employer having reviewed his personal communications at work. Ben would have a viable claim for a violation of the Electronic Communications Privacy Act for which of the following actions? a. Accessing Ben's voicemail on his company issued cell phone. b. Reviewing Ben's work email on his work computer. c. Accessing Ben's private Facebook page by guessing his password. d. Reviewing Ben's telephone calls on his work phone.

c. Accessing Ben's private Facebook page by guessing his password.

What act was passed to give significant protection to owners of copyrights in digital information?

Digital Millennium Copyright Act

One of the major problems in pursuing an online defamation claim is that:

Discovering the identity of the person who posted the defamation is often extremely difficult

True or False: Similar to trademark infringement, a claim of trademark dilution in the online world requires proof that consumers will likely be confused by a connection between the unauthorized use and the mark.

False

Hobbs owns a small Internet service provider and is sued by Allison because someone who pays Hobbs a monthly fee posted a defamatory statement about Allison. Will Allison prevail in court?

No, because the Communication Decency Act treat Internet service providers differently from print publishers.

Match each term to the correct definition: Terms: Distributed Network Peer-to-peer (P2P) Networking Cloud Computing Definitions: The sharing of resources (such as files, hard drives, and processing styles) among multiple computers without necessarily requiring a central network server. The delivery to users of on-demand services from third-party servers over a network. Cloud computing is a delivery model. A network that can be used by persons located (distributed) around the country or the globe to share computer files.

Peer-to-peer (P2P) Networking: The sharing of resources (such as files, hard drives, and processing styles) among multiple computers without necessarily requiring a central network server. Cloud Computing: The delivery to users of on-demand services from third-party servers over a network. Cloud computing is a delivery model. Distributed Network: A network that can be used by persons located (distributed) around the country or the globe to share computer files.

Choose which instances from the following word bank are examples of circumvention (bypassing) of copyright that are allowed under the Digital Millennium Copyright Act. Word/Phrase bank: The testing of computer security / the test marketing of a new video game / conducting encryption research / protection of personal privacy / peer monitoring / enabling parents to monitor their children's internet use.

The testing of computer security / conducting encryption research / protection of personal privacy / enabling parents to monitor their children's internet use

When can social media be used? Word/Phrase bank: To detect and prosecute criminals / to detect excessive use of the internet / to further investigate by federal regulations into illegal activities / to determine internet speeds

To detect and prosecute criminals / to further investigate by federal regulations into illegal activities

True or False: Using another's trademark in a meta tag will normally constitute trademark infringement.

True

Match each term to the correct definition: Terms: Cybersquatting Typosquatting Definitions: The act of buying domain names that are similar to well-known domains, except for slight misspellings The act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner.

Typosquatting: The act of buying domain names that are similar to well-known domains, except for slight misspellings Cybersquatting The act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner.

In which situations do people have a reasonable expectation of privacy? word/phrase bank: When they enter their personal banking information online / when they allow 3000 friends on their Facebook account / when they tweet about their daily activities / when they disclose online credit information to obtain a loan

When they enter their personal banking information online / when they disclose online credit information to obtain a loan

Retailers collect information about consumers using: a. Cookies b. Donuts c. Bugs d. Tracer Strings

a. Cookies

Sean is researching federal law to determine if there are civil or criminal penalties associated with the circumvention of the encryption software on a DVD. He should find the a. Digital Millennium Copyright Act b. Digital Anti-Circumvention Act. c. Digital Anti-Piracy Act. d. Digital Copyright Act.

a. Digital Millennium Copyright Act

Which of the following activities is NOT prohibited by the CAN-SPAM Act? a. Sending junk mail via the USPS b. Misleading information c. False return addresses d. Deceptive information e. Sending messages to randomly generated e-mail addresses f. False information

a. Sending junk mail via the USPS

Which of the following does NOT have to be true for the Anticybersquatting Consumer Protection Act to apply. a. The domain name is in another language b. The domain name is identical or confusingly similar to another domain trademark c. The one registering or using that domain name as a "bad faith intent" to profit from that trademark.

a. The domain name is in another language

The Electronic Communications Privacy Act does NOT prohibit which one of the following? a. The sending out of multiple e-mails. b. The intentional interception of an electronic communication. c. The intentional disclosure of the information obtained by illegal electronic interception. d. The intentional interception of a phone call.

a. The sending out of multiple e-mails.

Social media posts that contain -------------- typically infringe the intellectual property of others. a. Trademark images and copyright materials b. home digital videos c. digital images of zoo animals d. digital images of friends

a. Trademark images and copyright materials

Illegal file sharing of movies causes sales of DVDs and Blu-Ray discs to decline. - hint What has happened to the sale of CDs in the last 10 years? a. True b. False

a. True

Russell reserves the domain name "juliaroberts.com" and creates a fan web site dedicated to Julia Roberts, the actress. Russell eventually sends Ms. Roberts a letter offering to sell her the domain name. Russell is a a. cybersquatter. b. hacker. c. cyberstalker. d. tortfeasor.

a. cybersquatter.

Michael, a teacher, posts derogatory comments about his fellow teachers and students on his Facebook page, and is subsequently terminated. His posts likely a. violated school policy, and his termination will be upheld. b. are protected by the First amendment, and his termination will be overturned. c. will be construed as harmless fun, and his termination will be overturned. d. are a violation of the social media labor laws, and his termination will be upheld.

a. violated school policy, and his termination will be upheld.

Jennifer has filed a privacy complaint against Google. The federal agency to conduct an investigation by consumer complaints is the a. SEC. b. FTC. c. FCC. d. FAA.

b. FTC

In 2003, Congress enacted the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, which effectively eliminated unsolicited emails. - hint What constitutes the vast majority of e-mail traffic today? a. True b. False

b. False

There are only criminal penalties for copyright violations of online materials if the copies are made purely for financial gain. a. True b. False

b. False Congress amended copyright law in order to extend criminal liability for the piracy of copyrighted materials even when the persons receiving them pay no money and the person sending them realizes no profit. See Copyrights and Digital Information.

The business-extension exception to the Electronic Communications Privacy Act permits employers to monitor employees' personal communications. a. True b. False

b. False This exception allows employers to monitor employees' electronic communications made in the ordinary course of business. Note, though, that employers can avoid liability under the act if their employees consent to having their personal electronic communications monitored by the employer. See Social Media.

loss of what occurs when another party uses a domain name similar to yours a. Saitfaction b. Goodwill c. Tangible Value d. Book Value

b. Goodwill

Because you are suspected of sending out bulk unsolicited e-mail advertisements, your Internet service provider is asked by the FTC to supply information on what you do in foreign jurisdictions. Will you succeed in a lawsuit against your Internet service provider for illegally providing such information to the FTC? a. Yes, because you should have been asked first. b. No, because the U.S. Safe Web Act provides immunity to the ISP from liability for such action. c. Yes, because your ISP should have obtained permission from the Commerce Department.

b. No, because the U.S. Safe Web Act provides immunity to the ISP from liability for such action.

Which agency investigates consumer complaints of privacy violations? a. The Social Security Administration b. The Federal Trade Commission c. The Federal Communications Commission

b. The Federal Trade Commission

Why would social media posts be included in discovery and litigation? a. They may reveal people's senses of humor. b. They may establish a person's intent or what he or she knew at a particular time. c. Because they may lead to information about foreign conspiracies

b. They may establish a person's intent or what he or she knew at a particular time.

Unobtainium Venture Capital, a new venture capital start-up, wants to create a place for employees to communicate and share files, but wants to minimize its potential risk to competitors by protecting its trade secrets that the shared data may contain. UVC should utilize a. standalone PCs. b. an internal social network. c. email. d. a public social media site.

b. an internal social network.

Susan is concerned about online retailers collecting data about her web browsing activities, also known as a. domain name. b. cookies. c. spam. d. meta tags.

b. cookies

Alchin pays for and downloads a new exercise app on his smartphone. He believes that because he paid for it, he can legally make copies and sell them to his friends at the gym. He is wrong because: - hint Remember all of the "terms and conditions" that you have accepted when you have downloaded apps. a. he did not sign the resale availability contract. b. he only obtained a license to use, not ownership of the app. c. he did not pay a sufficiently high price.

b. he only obtained a license to use, not ownership of the app.

Because the federal CAN-SPAM Act only applied to e-mails originating in the United States, Congress enacted the a. Stop Foreign Spam Act b. Stop Foreign Emails Act c. U.S. Safe Web Act d. Enforcement Beyond Borders Act

c. U.S. Safe Web Act

One of the major reasons that music labels have suffered declines in their revenues and profits is that: a. young people are reading more books. b. most people prefer to go to live concerts. c. most stored music files are shared for free. d. fewer musicians spend as much time perfecting their music. e. young people are listening to more classical music. f. fewer musicians are recording today.

c. most stored music files are shared for free.

Lily developed a blog and relays rumors and gossip she hears in her hometown. She should be concerned about a. trademark infringement. b. copyright infringement. c. online defamation. d. disclosing trade secrets.

c. online defamation.

Sally registers the domain name thedallascowboys.com before the NLF football team is able to do so, with the title of her web site called The Dallas Cowboys, a nightclub in Austin, Texas. Sally's use of the domain name and the name of her bar is a. trademark infringement. b. trademark theft. c. trademark dilution. d. trademark squatting.

c. trademark dilution.

Which one of the following is NOT a reason why lawsuits against cybersquatters are difficult to pursue? a. Some domain name registers offer privacy services that hides the true owners of the website b. Often there are high costs for court proceedings c. Discovery may be costly d. Most cybersquatters have limited mastery of English e. Arbitration can be costly

d. Most cybersquatters have limited mastery of English

Ron reserves the domain name www.wamart.com before Wal-Mart does, which directs a user to a web site he has set up that sells retail goods online. Ron's action is known as a. meta tagging. b. cybersquatting. c. goodwill infringement. d. typosquatting.

d. typosquatting.


Related study sets

Quiz Questions Chapters 1-7 Practice

View Set

Fahmy spanish - German - Cómo Suprimir las Preocupaciones y Disfrutar de la Vida 1

View Set

Section 3: Unit 6: Note and Mortgage Provisions

View Set

Section 15, Unit 1: Reviewing Title in Ohio

View Set

FIN 357 Chapter 13: Return, Risk, and the Security Market Line

View Set