Exam 32: Cyberlaw
Exam 1: Introduction to Law45 Questions
Exam 2: Business Ethics and Social Responsibility42 Questions
Exam 3: Dispute Resolution44 Questions
Exam 4: Common Law, Statutory Law, and Administrative Law45 Questions
Exam 5: Constitutional Law45 Questions
Exam 6: Torts and Product Liability45 Questions
Exam 7: Crime45 Questions
Exam 8: International Law46 Questions
Exam 9: Introduction to Contracts45 Questions
Exam 10: Agreement46 Questions
Exam 11: Consideration46 Questions
Exam 12: Legality46 Questions
Exam 13: Capacity and Consent45 Questions
Exam 14: Written Contracts47 Questions
Exam 15: Third parties45 Questions
Exam 16: Performance and Discharge45 Questions
Exam 17: Remedies46 Questions
Exam 18: practical Contracts46 Questions
Exam 19: Introduction to Sales46 Questions
Exam 20: Ownership and Warranties92 Questions
Exam 21: Performance and Remedies46 Questions
Exam 22: Negotiable Instruments46 Questions
Exam 23: Secured Transactions46 Questions
Exam 24: Bankruptcy45 Questions
Exam 25: Agency45 Questions
Exam 26: Employment and Labor Law45 Questions
Exam 27: Employment and Discrimination45 Questions
Exam 28: Starting a Business46 Questions
Exam 29: Corporations45 Questions
Exam 30: Government Regulations:Securities and Antitrust45 Questions
Exam 31: Consumer Protection47 Questions
Exam 32: Cyberlaw45 Questions
Exam 33: Intellectual Property46 Questions
Exam 34: Real and Personal Property45 Questions
Select questions type
Jorgeson Co. ,on its website,promised the company would not give PII to third parties without the customer's consent,but then gave out such information.This practice violates Section 5 of the FTC Act.
(True/False)
4.8/5
(30)
Burns Medicine Shop developed a website where customers could ask the pharmacists questions and could refill prescriptions online.What statute requires Burns to have and disclose a privacy policy to anyone using the website?
(Multiple Choice)
4.8/5
(41)
After Ashley was denied credit for a new car,she checked her credit report with Equifax.The report showed that several credit cards had been issued to her recently,and they had large,unpaid balances.Ashley had not applied for or received these cards.She found out that someone had stolen personal information she had entered onto her computer and used the information to fraudulently obtain the credit cards.Ashley:
(Multiple Choice)
4.7/5
(27)
If a program is on your computer monitors your activities without your permission,you may be able to get protection through state legislation which makes spyware illegal.
(True/False)
4.9/5
(38)
The United States of America v.Angevine case held that the professor had no reasonable expectation of privacy in his office computer.
(True/False)
4.9/5
(42)
Rob works for a federal governmental agency.No policy statements have been reported to the employees regarding their privacy rights or regarding their use of workplace computers for personal business.Rob's supervisor has reason to suspect that Rob has used his workplace computer to order an illegal substance.Which of the following is true?
(Multiple Choice)
4.9/5
(41)
Lois receives an e-mail asking her to update her personal information on a website that is an illegal imitation of a legitimate site.This practice:
(Multiple Choice)
4.9/5
(44)
Tom receives an e-mail from someone alleging to be a Nigerian government official who has stolen money from the government.He needs some place safe to keep the money for a short time.The official promises that,if Tom lets his bank account be used for this purpose,Tom will be allowed to keep a percentage of the stolen money.Tom gives in to the temptation and provides his account information.Instead of receiving money,Tom loses everything he had in the account to the scammer.In this situation:
(Multiple Choice)
4.9/5
(35)
The European Union's e-Privacy Directive requires websites to provide an "opt-out" option for sites that use tracking tools.
(True/False)
4.9/5
(43)
Which of the following protects e-mail messages from unauthorized interception?
(Multiple Choice)
4.8/5
(31)
Rachel works for the Internal Revenue Service,but keeps some personal information on her computer at work.The Fourth Amendment to the Constitution,prohibiting unreasonable searches and seizures,does not apply to the government's right to obtain personal information on her computer.
(True/False)
4.9/5
(31)
Discuss common abuses that occur with auctions on the Internet and how these abuses are being addressed.
(Essay)
4.7/5
(37)
The Computer Fraud and Abuse Act prohibits all but which of the following?
(Multiple Choice)
4.9/5
(33)
Bidding on one's own goods at an online auction may subject the bidder to liability under anti-fraud statutes as well as liability under state statutes explicitly prohibiting shilling.
(True/False)
4.8/5
(40)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)