Exam 11: Cyberlaw

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Under the Due Process Clause, certain rules are traditionally employed to determine jurisdiction under state "long-arm" statutes. These rules are not applicable to businesses that choose to transact on the Internet.

(True/False)
4.9/5
(31)

Cyberlaw is a completely new area of law, unrelated to any established field of law.

(True/False)
4.8/5
(36)

Sam accesses the Internet and secures information (including credit history) on another person. If that information is used to purchase products in the other person's name, Sam's actions constitute:

(Multiple Choice)
4.7/5
(42)

The law of real property is included in those categories of legal issues covered by cyberlaw.

(True/False)
4.8/5
(27)

Little "cyber crime" exists today.

(True/False)
4.8/5
(47)

Bon, located in Florida, desires to enter into a contract with Jon, a resident of Maine. Neither wishes to meet face-to-face, as both are busy with a variety of business interests. Instead, they wish to form a contract over the Internet. Would a contract formed over the Internet be valid?

(Essay)
4.8/5
(40)

The formation of contracts in cyberspace is always governed by the law of the United States.

(True/False)
4.9/5
(34)

The term "cyberspace" describes the World Wide Web and Internet communication.

(True/False)
4.8/5
(36)

Copyright protection is not possible for materials located on the Internet.

(True/False)
4.8/5
(30)

The Digital Millennium Copyright Act makes it a federal offense to circumvent, or create programs to circumvent, encryption devices placed in copyrighted material to prevent unauthorized copying.

(True/False)
5.0/5
(32)

The elements of defamation remain the same in cyberspace

(True/False)
4.9/5
(39)

Nonconsensual interception of your e-mail by someone other than your employer is:

(Multiple Choice)
4.8/5
(31)

Cyber crime conduct is defined in:

(Multiple Choice)
4.9/5
(40)

Roxy is employed as a manager at "com.com," an Internet-based company attempting to compete successfully in the highly competitive software development industry. Roxy is concerned that one of her employees, Randy, is not performing at an acceptable level. While Roxy has noticed that Randy spends considerable time using the computer at his workstation, his productivity is lacking. Roxy suspects Randy is using the company's e-mail system for personal use instead of working on company business. Is Roxy permitted to monitor Randy's email?

(Essay)
4.7/5
(33)

The taking of an image, likeness, or name for purposes of commercial advantage is protected by :

(Multiple Choice)
4.7/5
(39)

__________-sign is a federal law that recognizes digital signatures as authentic for purposes of contract formation.

(Multiple Choice)
4.9/5
(33)

Existing securities laws apply to securities transactions over the Internet.

(True/False)
4.8/5
(33)

The Commerce Clause prohibits state governments from taxing Internet transactions.

(True/False)
5.0/5
(37)

The taking of an image off someone's web site and using it for commercial advantage is called:

(Multiple Choice)
4.8/5
(47)

Employers have access and control rights to their employees' e-mail.

(True/False)
4.8/5
(36)
Showing 21 - 40 of 52
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)