Exam 10: Cyberlaw, Social Media, and Privacy
Exam 1: Introduction to Law108 Questions
Exam 2: Business Ethics and Social Responsibility118 Questions
Exam 3: The Judicial System121 Questions
Exam 4: Managing Disputes: Alternative Dispute Resolution and Litigation Strategies138 Questions
Exam 5: Business and the Constitution118 Questions
Exam 6: Administrative Law137 Questions
Exam 7: International Law93 Questions
Exam 8: Business Crime105 Questions
Exam 9: Business Torts130 Questions
Exam 10: Cyberlaw, Social Media, and Privacy62 Questions
Exam 11: Environmental Regulation and Sustainability112 Questions
Exam 12: Contracts and Sales: Introduction and Formation152 Questions
Exam 13: Contracts: Performance, Remedies, and Rights155 Questions
Exam 14: Sales: Product Advertising and Liability138 Questions
Exam 15: Products: Business Intellectual Property95 Questions
Exam 16: Business Competition: Antitrust159 Questions
Exam 17: Management of Employee Conduct: Agency115 Questions
Exam 18: Governance and Structure: Forms of Doing Business138 Questions
Exam 19: Governance and Regulation: Securities Law152 Questions
Exam 20: Management: Employee Welfare131 Questions
Exam 21: Management: Employment Discrimination119 Questions
Select questions type
Jan Lesh was able to gain access to the federal government's records on student loans and loan repayments. Lesh changed his loan balance from $8200.00 to $2800.00. Lesh then repaid the $2800.00 and received his notice of payment in full. Has Lesh committed any crimes?
Free
(Essay)
4.9/5
(50)
Correct Answer:
Lesh has violated the Counterfeit Access Device and Computer Fraud and Abuse Act.
He accessed the information on student loans without authorization and then changed the amount of his loan balance. In addition, the repayment of only $2800 as opposed to
$8200 and the receipt of the "payment in full" statement was a form of theft. Lesh took funds from the government that did not belong to him. He accomplished the embezzlement in a peculiar way, but he did take government funds.
Employee e-mails can be used to establish criminal intent in prosecution of companies.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
Employers have no right of access to employees' emails if they promised the employees privacy.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
Which federal law controls websites that collect information from children?
(Multiple Choice)
4.8/5
(33)
Rune Rutledge was looking for a mercenary to kill his business partner. He found a listing on Craigslist that indicated the following: "Former IRAQ War solider. Protection services and other types of services available for those who need to send a message to others." Rune made contact with the soldier and the two entered into a contract for the solider to kill Rune's partner. Rune's partner was killed and his partner's family has sued Craigslist. Which of the following is an accurate summary of the legal issues in this situation?
(Multiple Choice)
4.8/5
(37)
The Computer Fraud and Abuse Act (CFA) applies only to federal employees.
(True/False)
4.8/5
(27)
At least one court has held that the placement of cookies on an individual's computer without consent is a form of
unauthorized access.
(True/False)
4.8/5
(34)
Cyberspace companies are exempt from the consumer privacy rules on use of consumer information and sale of consumer lists.
(True/False)
4.8/5
(39)
Which of the following is correct about Lakes' policy on Tweets?
(Multiple Choice)
5.0/5
(38)
Which act makes it a crime to willfully infringe copyrighted materials via electronic means that worth more than $1,000?
(Multiple Choice)
4.8/5
(29)
There are state laws, but no federal laws, concerning cyberbullying.
(True/False)
5.0/5
(29)
Jane Erroll has applied for a position with Lakes Distribution Company. When Jane arrives for her interview she is asked several questions about events and photos that were posted on her Facebook page. Jane has an open setting on her Facebook page so that it is publicly available. Jane apparently did not provide sufficient explanations for what was posted on her Facebook page and does not get the job despite being qualified for the position. Which of the following statements is correct about Jane's experience?
(Multiple Choice)
4.8/5
(33)
Which of the following is correct about Lakes' policy on text messages?
(Multiple Choice)
4.9/5
(37)
Servers are always required to reveal the identity of their customers and users.
(True/False)
4.9/5
(26)
The Electronic Communications Privacy Act applies to all forms of electronic communication.
(True/False)
4.7/5
(35)
The Economic Espionage Act makes it a crime to take trade secrets by computer.
(True/False)
4.8/5
(37)
Tapping into federal income tax returns to get information is a violation of the Computer Fraud and Abuse Act.
(True/False)
4.7/5
(33)
Which of the following is correct about Lakes' policy on Facebook access?
(Multiple Choice)
5.0/5
(41)
Under the Federal Computer Fraud and Abuse Act, unauthorized access to government computers is a felony.
(True/False)
4.7/5
(35)
Employers are permitted to monitor employee Tweets about company issues.
(True/False)
4.8/5
(32)
Showing 1 - 20 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)