Exam 7: Internet Law, social Media, and Privacy
Exam 1: The Legal Environment72 Questions
Exam 2: Constitutional Law72 Questions
Exam 3: Courts and Alternative Dispute Resolution72 Questions
Exam 4: Tort Law72 Questions
Exam 5: Product Liability72 Questions
Exam 6: Intellectual Property Rights72 Questions
Exam 7: Internet Law, social Media, and Privacy72 Questions
Exam 8: Criminal Law and Cyber Crime72 Questions
Exam 9: Business Ethics72 Questions
Exam 10: Nature and Classification72 Questions
Exam 11: Agreement72 Questions
Exam 12: Consideration72 Questions
Exam 13: Capacity and Legality72 Questions
Exam 14: Voluntary Consent72 Questions
Exam 15: The Statute of Fraudswriting Requirement72 Questions
Exam 16: Performance and Discharge72 Questions
Exam 17: Breach and Remedies72 Questions
Exam 18: Third Party Rights72 Questions
Exam 19: International Law in a Global Economy72 Questions
Exam 20: The Formation of Sales and Lease Contracts72 Questions
Exam 21: Title and Risk of Loss72 Questions
Exam 22: Performance and Breach of Sales and Lease Contracts72 Questions
Exam 23: Negotiable Instruments72 Questions
Exam 24: Banking in the Digital Age72 Questions
Exam 25: Security Interests and Creditors Rights72 Questions
Exam 26: Bankruptcy72 Questions
Exam 27: Agency Relationships in Business72 Questions
Exam 28: Employment, immigration, and Labor Law72 Questions
Exam 29: Employment Discrimination72 Questions
Exam 30: Sole Proprietorships and Franchises72 Questions
Exam 31: All Forms of Partnership72 Questions
Exam 32: Limited Liability Companies and Special Business Forms72 Questions
Exam 33: Corporate Formation and Financing72 Questions
Exam 35: Corporate Mergers, takeovers, and Termination72 Questions
Exam 36: Investor Protection, insider Trading, and Corporate Governance72 Questions
Exam 37: Administrative Law72 Questions
Exam 38: Antitrust Law and Promoting Competition72 Questions
Exam 39: Consumer and Environmental Law72 Questions
Exam 40: Liability of Accountants and Other Professionals72 Questions
Exam 41: Personal Property and Bailments72 Questions
Exam 42: Real Property and Landlord-Tenant Law72 Questions
Exam 43: Insurance, wills, and Trusts72 Questions
Select questions type
Cyber torts are torts that arise from online conduct.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
Federal law permits the intentional accessing of stored electronic communication even if the accessing is unauthorized.
Free
(True/False)
4.8/5
(46)
Correct Answer:
False
Without authorization,Brady uses the trademark of Ciera Coffee Company to promote cheap,flavorless candy,which is not similar to Ciera's products but diminishes the quality of the coffee company's mark. This is
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
In some states,an unsolicited e-mail must include a toll-free phone number that the recipient can use to ask the sender to send no more unsolicited e-mail.
(True/False)
4.8/5
(32)
Cybersquatting occurs when key words are inserted into a Web site's key-words coding to tell Internet browsers specific information about a Web page.
(True/False)
4.7/5
(38)
Penalties exist for anyone who circumvents encryption software or other technological antipiracy protection.
(True/False)
4.9/5
(34)
A licensor might grant a license allowing a trademark to be used as part of a domain name.
(True/False)
4.9/5
(35)
To test computer security and conduct encryption research,Tech SolutionsInc. circumvents the encryption software and other technological antipiracy protection of United Business Corporation's software. Under the Digital Millennium Copyright Act,this is
(Multiple Choice)
4.9/5
(30)
Eve and other users of Facebook and other social networking sites post trademarked images and copyrighted materials on these sites without permission. This is
(Multiple Choice)
4.9/5
(35)
The Anticybersquatting Consumer Protection Act applies to most,but not all,domain name registrations of trademarks.
(True/False)
4.9/5
(35)
Cybersquatting is illegal only if a domain name is identical to the trademark of another,not if the name is merely confusingly similar.
(True/False)
4.7/5
(40)
Stefano transfers copyrighted music recordings,without the copyright owners' authorization,to his friends. This is
(Multiple Choice)
4.9/5
(38)
InfoFree Inc. makes and sells devices and services for the circumvention of encryption software and other technological antipiracy protection. Under the Digital Millennium Copyright Act,this is
(Multiple Choice)
4.8/5
(34)
An employer may have a right to terminate a person based on his or her violation of the employer's social media policy.
(True/False)
4.8/5
(38)
Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc.,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate.
-Refer to Fact Pattern 7-1. One of the advertisers-either Sound Financials or Instable Investments-is acting within the bounds of federal law. Federal law permits the sending of
(Multiple Choice)
4.9/5
(31)
Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices.Instable Investments,Inc.,sends e-mail ads to any e-mail address that Instable can find on the Web or otherwise generate.
-Refer to Fact Pattern 7-1. Sound Financials and Instable Investments are subject to the laws of the states in which they are located and do business. Thirty-seven states
(Multiple Choice)
4.8/5
(36)
Sonya and other employees of TransGlobal Inc. maintain a password-protected social media page on which they post comments on work-related issues. The posts range from positive to negative,supporting the page's purpose to "vent about work." When TransGlobal learns of the page,the company intimidates Sonya into revealing the password,and after reviewing the posts,fires her and the other participants. Which federal law discussed in thisChapter most likely applies to this situation? Has this law been violated? Discuss.
(Essay)
4.9/5
(32)
Federal law permits the sending of unsolicited commercial e-mail and does not prohibit spamming activities.
(True/False)
4.7/5
(39)
Federal law prevents a provider of communication services-such as a cell phone company-from divulging private communications to certain entities and individuals.
(True/False)
4.8/5
(37)
Showing 1 - 20 of 72
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)