Exam 32: Cyberlaw
Exam 1: Introduction to Law45 Questions
Exam 2: Business Ethics and Social Responsibility42 Questions
Exam 3: Dispute Resolution44 Questions
Exam 4: Common Law, Statutory Law, and Administrative Law45 Questions
Exam 5: Constitutional Law45 Questions
Exam 6: Torts and Product Liability45 Questions
Exam 7: Crime45 Questions
Exam 8: International Law46 Questions
Exam 9: Introduction to Contracts45 Questions
Exam 10: Agreement46 Questions
Exam 11: Consideration46 Questions
Exam 12: Legality46 Questions
Exam 13: Capacity and Consent45 Questions
Exam 14: Written Contracts47 Questions
Exam 15: Third parties45 Questions
Exam 16: Performance and Discharge45 Questions
Exam 17: Remedies46 Questions
Exam 18: practical Contracts46 Questions
Exam 19: Introduction to Sales46 Questions
Exam 20: Ownership and Warranties92 Questions
Exam 21: Performance and Remedies46 Questions
Exam 22: Negotiable Instruments46 Questions
Exam 23: Secured Transactions46 Questions
Exam 24: Bankruptcy45 Questions
Exam 25: Agency45 Questions
Exam 26: Employment and Labor Law45 Questions
Exam 27: Employment and Discrimination45 Questions
Exam 28: Starting a Business46 Questions
Exam 29: Corporations45 Questions
Exam 30: Government Regulations:Securities and Antitrust45 Questions
Exam 31: Consumer Protection47 Questions
Exam 32: Cyberlaw45 Questions
Exam 33: Intellectual Property46 Questions
Exam 34: Real and Personal Property45 Questions
Select questions type
The Children's Online Privacy Protection Act prohibits Internet operators from collecting information from children under what age without parental permission?
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
Under the Electronic Communications Privacy Act:
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
It is legal for websites to sell source code for viruses.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
The Identity Theft and Assumption Deterrence Act of 1998 does all but which of the following:
(Multiple Choice)
4.9/5
(41)
The European Union prohibits the transfer of personal customer information to countries that lack adequate privacy protection.
(True/False)
4.9/5
(36)
The Gramm-Leach-Bliley Privacy Act of 1999 requires pretexting to find out private financial information.
(True/False)
4.7/5
(25)
Consumers have been active in requesting government regulation of web data collection to protect their privacy.
(True/False)
5.0/5
(34)
You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys.The next time you log on,your screen has a banner ad for Dallas Cowboy hats and shirts.This banner ad is most likely the result of:
(Multiple Choice)
4.9/5
(28)
Maria,who lives in the United States,gains unauthorized access to a bank's computer system and steals financial information about customers.Of what is Maria guilty,and under what statute(s)could she be prosecuted?
(Essay)
4.9/5
(34)
Unsolicited commercial e-mail (UCE)or unsolicited bulk e-mail (UBE)messages:
(Multiple Choice)
4.9/5
(34)
When you surf the Internet,information,much of which is anonymous,is collected about you.
(True/False)
4.7/5
(36)
Which of the following countries has not passed legislation to comply with the European Union's directive prohibiting the transfer of personal data to any countries that do not provide adequate privacy protection?
(Multiple Choice)
4.8/5
(24)
Stuart is vying for a promotion,but faces competition from a co-worker,Brenda.Without authorization,Stuart accesses stored company records and discovers an unfavorable e-mail message Brenda had written about the company.Stuart sends the message to his supervisor in hopes of keeping Brenda from getting the promotion.Discuss whether Stuart has violated any statute and,if so,what sanctions he may face.
(Essay)
4.9/5
(35)
You receive an e-mail telling you that your bank's website is undergoing some security updates and you need to log in to update your account information.Conveniently,there is a link in the e-mail allowing you to easily log in.Most likely this is an example of:
(Multiple Choice)
4.7/5
(38)
Which of the following is NOT true under the Electronic Communications Privacy Act?
(Multiple Choice)
4.8/5
(32)
The federal government has preempted the field of online privacy,so states may not pass their own online privacy statutes.
(True/False)
4.7/5
(42)
Explain the difference between an ISP and a Web host,and discuss whether they are treated alike under the Communications Decency Act (CDA).
(Essay)
4.7/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)