Exam 22: Cyberlaw

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Bidding on one's own goods at an online auction may subject the bidder to liability under anti-fraud statutes as well as liability under state statutes explicitly prohibiting shilling.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

Rachel works for the Internal Revenue Service,but keeps some personal information on her computer at work.The Fourth Amendment to the Constitution,prohibiting unreasonable searches and seizures,does not apply to the government's reaching personal information on her computer.

Free
(True/False)
4.7/5
(42)
Correct Answer:
Verified

False

Rob works for a federal governmental agency.No policy statements have been reported to the employees regarding their privacy rights or regarding their use of workplace computers for personal business.Rob's supervisor has reason to suspect that Rob has used his workplace computer to order an illegal substance.Which of the following is true?

Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
Verified

D

A U.S.company will be permitted to receive personal data from a company in France or Great Britain:

(Multiple Choice)
4.8/5
(36)

Dennis posted a message on the Internet stating that his ex-wife was fat,lazy,and mean.His statement:

(Multiple Choice)
4.9/5
(30)

If a program is on your computer without your permission which monitors your activities,you may be able to get protection through state legislation which makes spyware illegal.

(True/False)
4.8/5
(25)

The CAN-SPAM Act:

(Multiple Choice)
4.8/5
(36)

Hacking is a crime under the federal Computer Fraud and Abuse Act,which applies to any computer attached to the Internet.

(True/False)
4.8/5
(30)

What statute requires banks and other financial institutions to disclose to consumers any non-public information they wish to reveal to third parties?

(Multiple Choice)
4.8/5
(40)

The Electronic Communications Privacy Act is a federal statute regulating e-mail.

(True/False)
4.9/5
(33)

Stuart is vying for a promotion,but faces competition from a co-worker,Brenda.Without authorization,Stuart accesses stored company records and discovers an unfavorable e-mail message Brenda had written about the company.Stuart sends the message to his supervisor in hopes of keeping Brenda from getting the promotion.Discuss whether Stuart has violated any statute and,if so,what sanctions he may face.

(Essay)
4.8/5
(36)

"Hacking" is:

(Multiple Choice)
4.9/5
(40)

You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys.The next time you log on,your screen has a banner ad for Dallas Cowboy hats and shirts.This banner ad is most likely the result of:

(Multiple Choice)
4.8/5
(33)

Lois receives an e-mail asking her to update her personal information on a Web site that is an illegal imitation of a legitimate site.This practice:

(Multiple Choice)
4.8/5
(27)

The U.S.Department of Commerce reached agreement with the European Union on "safe harbor" principles with which most U.S.companies have complied.

(True/False)
4.8/5
(32)

The Computer Fraud and Abuse Act prohibits all but which of the following?

(Multiple Choice)
4.9/5
(36)

The Electronic Communications Privacy Act:

(Multiple Choice)
4.9/5
(34)

The European Union prohibits the transfer of personal data to countries that lack adequate privacy protection.

(True/False)
4.7/5
(33)

The case of Carafano v.Metrosplash.com,Inc.held:

(Multiple Choice)
4.9/5
(39)

E-mail messages are private between a sender and recipient,and they cannot be accessed by an opposing party in the event of litigation.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)