Exam 7: Privacy and Internet Law
Exam 1: Introduction to Law45 Questions
Exam 2: Ethics and Corporate Social Responsibility45 Questions
Exam 3: Dispute Resolution45 Questions
Exam 4: Common Law, Statutory Law, and Administrative Law45 Questions
Exam 5: Constitutional Law45 Questions
Exam 6: Torts and Product Liability81 Questions
Exam 7: Privacy and Internet Law45 Questions
Exam 8: Crime45 Questions
Exam 9: International Law45 Questions
Exam 10: Introduction to Contracts80 Questions
Exam 11: Legality, Consent, and Writing89 Questions
Exam 12: Performance, Discharge, and Remedies59 Questions
Exam 13: Practical Contracts45 Questions
Exam 14: The UCC: Sales and Secured Transactions91 Questions
Exam 15: Negotiable Instruments62 Questions
Exam 16: Bankruptcy45 Questions
Exam 17: Agency Law45 Questions
Exam 18: Employment and Labor Law45 Questions
Exam 19: Employment Discrimination45 Questions
Exam 20: Starting a Business: Llcs and Other Options77 Questions
Exam 21: Corporations97 Questions
Exam 22: Securities Regulation45 Questions
Exam 23: Antitrust45 Questions
Exam 24: Intellectual Property45 Questions
Exam 25: Property58 Questions
Exam 26: Consumer Protection45 Questions
Exam 27: Environmental Law45 Questions
Select questions type
At its inception, the Communications Decency Act of 1996 created broad immunity for internet service providers (ISPs)and websites.
Free
(True/False)
4.9/5
(39)
Correct Answer:
True
Under what circumstances is intrusion into someone's private life a tort?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
After Jan's boyfriend broke up with her, she posted sexually explicit pictures of him on her Facebook page and wrote about how he was a terrible boyfriend. Jan's actions are protected by the First Amendment to the Constitution.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
Rachel works for the Internal Revenue Service and keeps some personal information on her computer at work. There has been suspicion that Rachel has not been keeping tax return information confidential. The Fourth Amendment to the Constitution, prohibiting unreasonable searches and seizures, protects Rachel from having the government review the personal information she has on her computer.
(True/False)
4.8/5
(24)
A website printed some truthful, but secret, information about Danielle. Which of the following would likely result in a court ruling that Danielle had NOT stated a claim under the public disclosure tort?
(Multiple Choice)
4.9/5
(37)
Daniel went onto an internet message board and found that his ex-wife, Faye, had posted a message calling him a fat, insensitive jerk who only cared about watching sports on TV. Does Daniel have any protection against Faye making such statements to a potentially large number of readers, some of whom may know Daniel and some of whom may not?
(Essay)
4.8/5
(36)
The FISA requires government agencies to delete irrelevant and personally identifying data before providing it to other agencies.
(True/False)
4.7/5
(37)
Burns Medicine Shop developed a website where customers could ask the pharmacists questions and could refill prescriptions online. What statute requires Burns to have and disclose a privacy policy to anyone using the website?
(Multiple Choice)
4.8/5
(36)
Under the ECPA, any intended recipient has the right to disclose the content of an email.
(True/False)
4.8/5
(37)
What provisions are commercial email subjected to under the CAN-SPAM Act?
(Essay)
4.9/5
(27)
You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen has a banner ad for Dallas Cowboy hats and shirts. This banner ad is most likely the result of
(Multiple Choice)
4.8/5
(25)
The internet of things refers to internet-connected everyday devices, vehicles, and even buildings.
(True/False)
4.8/5
(40)
Emily, an 11-year-old girl, wants to sign-up for a fashion newsletter and sweepstakes. In order to do so, the website wants to know Emily's name, address, phone number, and email address. Which of the following is correct?
(Multiple Choice)
4.9/5
(41)
Under the Stored Communications Act, which of the following are considered electronic communication?
(Multiple Choice)
4.8/5
(44)
What are some ways we lose our privacy in the digital world?
(Multiple Choice)
4.8/5
(39)
The practice of inferring needs and preferences from a consumer's online behavior and then targeting related advertisements to them is referred to as
(Multiple Choice)
4.7/5
(45)
When you shop online, most retailers collect personal information about you.
(True/False)
4.7/5
(36)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)