Exam 50: Torts and Crimes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Libby and Marco take photos of themselves in intimate moments. When their relationship ends, Marco posts the photos online without Libby's consent in an attempt to humiliate her. Included with the photos are Libby's name, Facebook page, address, workplace, and phone number. This could be a ground for a civil suit on the basis of

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

C

Opiate Company markets a product using a trademark of Pharma Ltd. that is not registered in this country and has never otherwise been used here. Pharma did not authorize Opiate's use. Under the Lanham Act, Pharma can

Free
(Multiple Choice)
5.0/5
(29)
Correct Answer:
Verified

A

The existence of an ethical duty on the part of Commerce & Trade Company, and other businesses, to prevent an attack by hackers on business computer systems, and consequent theft of customers' and employees' personal data, is evidenced by

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

USA Sales Company publishes a "Privacy Policy" to attract customers, but fails to invest adequate resources in cyber security. A lack of security that allows hackers to steal customers' personal data from a business's computer system can be

(Multiple Choice)
4.8/5
(44)

Yun Ltd. circumvents the anti-cheating code of Zen LLC's free online video game to learn how to automate gameplay to perform with enhanced accuracy. Yun's site sells the knowledge to players who can then outplay less-informed players. Yun most likely violated the Digital Millennium Copyright Act by

(Multiple Choice)
4.8/5
(36)

The intentional use of electronic communications systems to place another in reasonable fear of death or serious bodily injury is a crime under

(Multiple Choice)
4.8/5
(31)

When a registered trademark is infringed to sell a product, the owner of the mark can succeed in an action against the infringer on showing that the defendant's use of the mark

(Multiple Choice)
4.9/5
(25)

Sending a strobe-light image within a tweet that induces a seizure in an epileptic recipient could subject its sender to arrest

(Multiple Choice)
4.8/5
(37)

Hackers infiltrate the computer system of ChemCo Inc. and steal the company's trade secrets. If the hackers can be identified, they can be

(Multiple Choice)
4.9/5
(38)

Hackers infiltrate the computer system of Metro Bank and steal the personal information of Metro's customers and employees. Individuals whose personal information is involved in the breach should be notified, as required by law in

(Multiple Choice)
4.8/5
(34)

Han and Ivy take photos of themselves in intimate moments. When their relationship ends, Han posts the photos online without Ivy's consent in an attempt to humiliate her. This is a crime in

(Multiple Choice)
4.9/5
(35)

Without authorization, Wei LLC copies Xi Inc.'s free online video game-its champions, their abilities, the sound effects, and the icons-and markets the copy under different names. Xi copies its own game to produce and sell a version for mobile platforms. Copyright issues are most likely to arise with

(Multiple Choice)
4.8/5
(38)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)