Filters
Question type

Study Flashcards

Keisha is an employee of Leeway Corporation. She uses social media in a way that violates her employer's stated social media policies. Leeway first disciplinesits employee and then, after a second transgression, fires her. This is


A) a violation of Keisha's rights as an employee.
B) within Leeway's rights as an employer.
C) a subject for dispute resolution by the social media that Keisha used.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

B

Mobile Device Company (MDC) discovers that defamatory statements about its policies and products are being posted in an online forum. NuView Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. MDC should


A) seek to use the authority of the court to obtain the identity from NuView.
B) bring a suit against NuView for publishing the statements.
C) counter the statements with its own posts.
D) post defamatory statements about NuView.

Correct Answer

verifed

verified

Law enforcement uses social media to detect and prosecute criminals.

Correct Answer

verifed

verified

The manufacture, import, sale, and distribution of devices or services for the circumvention of encryption software is prohibited.

Correct Answer

verifed

verified

True

The law does not restrict the "fair use" of methods for the circumvention of encryption software or other technological antipiracy protection for educational and other noncommercial purposes.

Correct Answer

verifed

verified

In an attempt to combat spam, thirty-seven states have enacted laws that prohibit or regulate its use.

Correct Answer

verifed

verified

Employees, clients, and others with authorization use World Transport Corporation's network around the globe to share computer files. This is


A) an invasion of privacy.
B) trademark and copyright infringement.
C) digital sampling.
D) a distributed network.

Correct Answer

verifed

verified

The Anticybersquatting Consumer Protection Act applies to most, but not all, domain name registrations of trademarks.

Correct Answer

verifed

verified

Justin's posts on Facebook provide information that establishes his intent and what he knew at a particular time, indicating potential liability. For this and other reasons, social media posts are often


A) included in discovery in litigation.
B) used by law enforcement to detect and prosecute criminals.
C) used by federal regulators in investigations into illegal activities.
D) all of the choices.

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into a Web site's key-words coding to tell Internet browsers specific information about a Web page.

Correct Answer

verifed

verified

Sales & Revenue, Inc., discovers that defamatory statements about its policies and products are being posted in an online forum. TransWeb Inc., the Internet service provider whose users are posting the messages, refuses to disclose the identity of the person or persons responsible. Sales & Revenuefiles a suit against the anonymous users. The plaintiff can obtain from TransWeb the identity of the persons responsible for the defamatory messages by


A) using the authority of the court.
B) gaining unauthorized access to TransWeb's servers.
C) deceiving TransWeb into revealing the posters' identities.
D) no legal or illegal means.

Correct Answer

verifed

verified

Cyber torts are torts that arise from online conduct.

Correct Answer

verifed

verified

Cybersquatting is illegal only if a domain name is identical to the trademark of another, not if the name is merely confusingly similar.

Correct Answer

verifed

verified

False

Using a domain name that is identical or similar to the trademark of another is legal.

Correct Answer

verifed

verified

File-sharing software can be used to download others' copyrighted property without liability for any infringement.

Correct Answer

verifed

verified

An Internet service provider is liable for any act of copyright infringement by its customer.

Correct Answer

verifed

verified

When you download an application on your smartphone, you are typically entering into a license agreement.

Correct Answer

verifed

verified

OntheWeb Company is an Internet service provider. OntheWeb's customer Phoebe commits copyright infringement. OntheWeb is not liable for Phoebe's activity


A) unless OntheWeb is aware of Phoebe's violation.
B) unless OntheWeb is not aware of Phoebe's violation.
C) unless OntheWeb shuts down Phoebe after learning of the violation.
D) under any circumstances.

Correct Answer

verifed

verified

Rowan registers a domain name—sweetfriedpotatos.com—that is a misspelling of a popular brand—sweetfriedpotatoes.com. This is


A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.

Correct Answer

verifed

verified

Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.

Correct Answer

verifed

verified

Showing 1 - 20 of 72

Related Exams

Show Answer