Ch. 9 business law

Ace your homework & exams now with Quizwiz!

... is a delivery model that enables delivery to users of on-demand services from third-party servers over a network. ... is the sharing of resources (such as files, hard drives, and processing styles) among multiple computers without necessarily requiring a central network server.

Cloud computing Peer-to-Peer (P2P) Networking

The ... was passed to give significant protection to owners of copyrights in digital information

Digital Millennium Copyright Act

Hobbs owns a small Internet service provider and is sued by Allison because someone who pays Hobbs a monthly fee posted a defamatory statement about Allison. Will Allison prevail in court?

No, because the Communications Decency Act treats Internet service providers differently from print publishers.

Which of the following activities is NOT prohibited by the CAN-SPAM Act

Sending junk mail via the USPS

Employees' posts on social media may be protected under labor law.

True

Under the Proposed Consumer Privacy Bill of Rights, consumers have a right to reasonable limits on the personal data that companies collect and retain

True

Using another's trademark in a meta tag will normally constitute trademark infringement

True

Which of the following does NOT have to be true for the Anticybersquatting Consumer Protection Act to apply?

The domain name has siphoned customers resulting in a loss of profit from the trademark

The Electronic Communications Privacy Act does NOT prohibit which one of the following?

The intentional interception of an electronic communication of an employee by an employer on an employer-supplied device

Online defamation occurs when an individual communicates a false statement about a person through the internet

True

Which of the following instances of circumvention (bypassing) of copyright are allowed under the Digital Millennium Copyright Act?

Enabling parents to monitor their children's internet use The testing of computer security Protection of personal privacy Conducting encryption research

In 2003, Congress enacted the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, which prohibits the sending of unsolicited commercial emails

False

Internet service providers are generally treated the same as print publishers and other media regarding liability for defamation

False

Invasion of privacy cases can be brought only against private individuals, not organizations

False

Posting negative comments about other individuals on your social media is protected speech.

False

Similar to trademark infringement, a claim of trademark dilution in the online world requires proof that consumers will likely be confused by a connection between the unauthorized use and the mark.

False

There are criminal penalties for copyright violations of online materials only if the copies are made purely for financial gain.

False

Which agency investigates consumer complaints of privacy violations?

Federal Trade Commission

Loss of ... occurs when another party uses a domain name similar to yours

Goodwill

Because you are suspected of sending out bulk unsolicited e-mail advertisements, the FTC asks your internet service provider to supply information on what you do in foreign jurisdictions. Will you succeed in a lawsuit against your internet service provider for providing such information to the FTC

No, because the U.S. Safe Web Act provides immunity to the ISP from liability for such action

Which acts prevents cell phone companies and social media networks from divulging private communications to certain entities and individuals?

The Stored Communications Act

When can social media posts be used by law enforcement?

To detect and prosecute criminals To further federal regulators' inversion into illegal activities To determine the identities of suspects To locate a suspect

By 2016, about half of all states had enacted legislation to protect individuals from having to disclose their social media passwords to potential employers

True

Courts and administrative agencies usually uphold an employer's right to terminate a person based on his or her violation of a social media policy.

True

The Anticybersquatting Consumer Protection Act applies to all domain name registrations and trademarks

True

... is the act of buying domain names that are similar to well-known domains, except for the slight misspellings. ... is the act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner.

Typosquatting Cybersquatting

Because the federal CAN-SPAM Act only applied to e-mails originating in the United States, Congress enacted the

U.S. Safe Web Act

In which situations do people have a reasonable expectation of privacy?

When they enter their personal banking information with an online mortgage lender When they disclose credit information to obtain a loan online

Retailers collect information about consumers using

cookies

One of the major problems in pursuing an online defamation claim is that:

discovering and providing the identity of the person who posted the defamation can be difficult


Related study sets

7.2 Listen and select pero or sino to replace the beep in each statement.

View Set

Chapter 11 properties of the hair and scalp terms

View Set

Chapter 2 Biological Perspective

View Set

Grammaire (as, no matter..;) NO MATTER HOW + adjectif + sujet + verbe = HOWEVER + adjectif + sujet + verbe = ADJECTIF + AS + sujet +verbe

View Set