Exam 22: Cyberlaw

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The privacy of e-mail is regulated by:

(Multiple Choice)
4.8/5
(39)

Unsolicited commercial e-mail (UCE)or unsolicited bulk e-mail (UBE)messages:

(Multiple Choice)
4.7/5
(39)

When you surf the Internet,information,much of which is anonymous,is collected about you.

(True/False)
4.7/5
(38)

The United States of America v.Angevine case held that the professor had no reasonable expectation of privacy in his office computer.

(True/False)
4.8/5
(33)

Online auctions:

(Multiple Choice)
4.8/5
(43)

The federal CAN-SPAM Act has noticeably decreased the amount of spam.

(True/False)
5.0/5
(37)

MajorLine offered travel packages,including airfare and hotel accommodations,at a discounted price on their Web site.However,after Jason charged MajorLine's fees to his credit card,he did not receive the promised airline tickets or the coupons for a reduced hotel rate.He found that other customers had been similarly defrauded.MajorLine:

(Multiple Choice)
4.9/5
(50)

Identity theft:

(Multiple Choice)
4.9/5
(36)

The Children's Online Privacy Protection Act prohibits Internet operators from collecting information from children under what age without parental permission?

(Multiple Choice)
5.0/5
(39)

The federal government has preempted the field of online privacy,so states may not pass their own online privacy statutes.

(True/False)
4.8/5
(38)

Tom receives an e-mail from someone alleging to be a Nigerian government official who has stolen money from the government.He needs a safe place to keep the money for a short time.The official promises that,if Tom lets his bank account be used for this purpose,Tom will be allowed to keep a percentage of the stolen money.Tom gives in to the temptation and provides his account information.Instead of receiving money,Tom loses everything he had in the account to the scammer.In this situation:

(Multiple Choice)
4.8/5
(38)

Discuss common abuses that occur with auctions on the Internet and how these abuses are being addressed.

(Essay)
4.7/5
(40)

Clarise,a 12-year-old,visited a Web site that wanted to know her family size,her parents' educational level,and her weekly allowance.The site also asked Clarise's name,mailing and e-mail addresses,and age.Under COPPA:

(Multiple Choice)
4.8/5
(29)

Which of the following countries has not passed legislation to comply with the European Union's directive prohibiting the transfer of personal data to any countries that do not provide adequate privacy protection?

(Multiple Choice)
4.8/5
(38)

The Internet was started in the 1960s as a project to link military contractors and universities.The World Wide Web was created in 1991 as a subnetwork of the Internet.

(True/False)
4.7/5
(32)

Maria,who lives in the United States,gains unauthorized access to a bank's computer system and steals financial information about customers.Of what is Maria guilty,and under what statute(s)could she be prosecuted?

(Essay)
4.8/5
(41)

The Gramm-Leach-Bliley Privacy Act of 1999 requires pretexting to find out private financial information.

(True/False)
4.9/5
(42)

Which of the following is NOT true under the Electronic Communications Privacy Act?

(Multiple Choice)
4.8/5
(28)

Under the Electronic Communications Privacy Act:

(Multiple Choice)
4.9/5
(27)

Burns Medicine Shop developed a Web site where customers could ask the pharmacists questions and could refill prescriptions online.What statute requires Burns to have and disclose a privacy policy to anyone using the Web Site?

(Multiple Choice)
4.9/5
(45)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)