Filters
Question type

Study Flashcards

Cyber torts are torts that arise from online conduct.

Correct Answer

verifed

verified

Refer to Fact Pattern 5-1. In those states with antispam laws, federal law​


A) prohibits or regulates the use of spam.
B) requires the use of spam by business entities.
C) bans the use of spam altogether.
D) preempts the application of state law to commercial e-mail with certain exceptions.

Correct Answer

verifed

verified

Cybersquatting occurs when key words are inserted into a Web site's key-words coding to tell Internet browsers specific information about a Web page.

Correct Answer

verifed

verified

Refer to Fact Pattern 5-2. By using a domain name similar to CallTalk's, CellTalk is most likely​


A) diminishing the quality of CallTalk's mark.
B) making a fair use of CallTalk's mark.
C) licensing the use of CallTalk's mark to itself.
D) engaging in smart competitive conduct.

Correct Answer

verifed

verified

Using a domain name that is identical or similar to the trademark of another is legal.

Correct Answer

verifed

verified

InfoFree Inc. makes and sells devices and services for the circumvention of encryption software and other technological antipiracy protection. Under the Digital Millennium Copyright Act, this is​


A) a violation of copyright law.
B) prohibited but not a violation of copyright law.
C) a "fair use" exception to the provisions of the act.
D) permitted for reconsideration every three years.

Correct Answer

verifed

verified

An employer may have a right to terminate a person based on his or her violation of the employer's social media policy.

Correct Answer

verifed

verified

Using another's trademark in a meta tag does not normally constitute trademark infringement, even if it is done without the owner's permission.

Correct Answer

verifed

verified

Tech Outsourcing, Inc., registers a domain name that is the same as, or confusingly similar to, the trademark of Tech Resourcing Corporation and then offers to sell the domain name back to Tech Resourcing. This is​


A) cybersquatting.
B) typosquatting.
C) trademark infringement.
D) trademark dilution.

Correct Answer

verifed

verified

The employees of The Car Company share company-related resources among multiple computers without requiring a central network server. This is​


A) digital sampling.
B) cybersquatting.
C) cloud computing.
D) peer-to-peer (P2P) networking.

Correct Answer

verifed

verified

Refer to Fact Pattern 5-1. One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law. Federal law permits the sending of​


A) unsolicited commercial e-mail.
B) solicited commercial e-mail only.
C) commercial e-mail to randomly generated addresses.
D) commercial e-mail to addresses "harvested" from Web sites through the use of specialized software.

Correct Answer

verifed

verified

Refer to Fact Pattern 5-2. CallTalk wants to sue Call&Talk for its unauthorized use of the domain name "calltalk" on a theory of trademark dilution. This claim requires proof that


A) none of the choices.
B) consumers are likely to be confused by the names.
C) the products involved are similar.
D) CallTalk has registered all variations of the name "calltalk."

Correct Answer

verifed

verified

Omni Corporation provides cell phones, laptops, and tablets for its employees to use "in the ordinary course of its business." Omni intercepts the employees' business communications made on these devices. This is​


A) a violation of the rights of Omni's employees.
B) a matter for which Omni must obtain its employees' consent.
C) a subject for dispute resolution by the communications providers that Omni uses.
D) excluded from the coverage of the Electronic Communications Privacy Act.Fact Pattern 5-2 CallTalk Corporation, a smartphone and phone-time seller, chooses to use and register "calltalk" as its domain name.Later, CallTalk's less successful competitor, CellTalk Company, chooses to use and register "caltalk" (an intentional misspelling of "calltalk") as its domain name.Still later, Call&Talk, Inc., uses the domain name "calltalk" (also a deliberate misspelling of "calltalk") without CallTalk's authorization, to sell pornographic phone conversations.

Correct Answer

verifed

verified

Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads, file-sharing has created problems for​


A) the motion picture industry.
B) recording artists and their labels.
C) the companies that distribute file-sharing software.
D) all of the choices.

Correct Answer

verifed

verified

Penalties exist for anyone who circumvents encryption software or other technological antipiracy protection without authorization.

Correct Answer

verifed

verified

Copious Bounty, LLC, and other companies operate social media Web sites, issue apps for mobile devices, obtain ad revenue from search engines, and sell directly to consumers from other sites. The privacy rights of the users of these products are frequently defined, not by the courts or legislatures, but by​


A) the companies that own the sites and the apps.
B) retailers who have had to change their procedures to compete.
C) spammers, cybersquatters, and typosquatters.
D) Internet service providers.

Correct Answer

verifed

verified

Federal law prohibits the Federal Trade Commission from cooperating and sharing information with foreign agencies in investigating and prosecuting those involved in spamming.

Correct Answer

verifed

verified

The law does not restrict the "fair use" of methods for the circumvention of encryption software or other technological antipiracy protection for educational and other non commercial purposes.

Correct Answer

verifed

verified

Employers cannot monitor employees' electronic communications made in the ordinary course of business.

Correct Answer

verifed

verified

It is frequently the companies rather than courts or legislatures that are defining the privacy rights of their online users.

Correct Answer

verifed

verified

Showing 21 - 40 of 72

Related Exams

Show Answer