Deck 24: Legal Issues and Ethics
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
Play
Full screen (f)
Deck 24: Legal Issues and Ethics
1
The Wassenaar Arrangement can be described as which of the following?
A)An international arrangement on export controls for conventional arms as well as dual-use goods and technologies
B)An international arrangement on import controls
C)A rule governing import of encryption in the United States
D)A rule governing export of encryption in the United States
A)An international arrangement on export controls for conventional arms as well as dual-use goods and technologies
B)An international arrangement on import controls
C)A rule governing import of encryption in the United States
D)A rule governing export of encryption in the United States
A
2
_____________ is the unauthorized entry into a computer system via any means.
A)Computer trespass
B)Computer entry
C)Computer hacking
D)Cyber crime
A)Computer trespass
B)Computer entry
C)Computer hacking
D)Cyber crime
A
3
The CAN-SPAM Act allows unsolicited e-mail as long as there is an unsubscribe link;the content must not be deceptive and not harvest emails.
True
4
Carnivore is an eavesdropping program for the Internet.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
What are laws and regulations created by government-sponsored agencies such as the EPA,the FAA,and the FCC?
A)Statutory laws
B)Administrative laws
C)Common laws
D)Blue laws
A)Statutory laws
B)Administrative laws
C)Common laws
D)Blue laws
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
What is the law that overhauled the financial accounting standards for publicly traded firms in the United States?
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
The Electronic Communications Privacy Act (ECPA)of 1986
A)Implements the principle that a signature,contract,or other record may not be
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
A)Implements the principle that a signature,contract,or other record may not be
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
Privacy laws in Europe are built around the concept that privacy is not a fundamental human right.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
What is the Gramm-Leach-Bliley Act?
A)Implements the principle that a signature,contract,or other record may not be deleted
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
A)Implements the principle that a signature,contract,or other record may not be deleted
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Computer trespass is treated as a crime in many countries.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
A principal reference for rules governing the export of encryption can be found in the
A)Bureau of Industry and Security
B)U.S.Department of Commerce
C)Export Administration Regulations
D)State Department
A)Bureau of Industry and Security
B)U.S.Department of Commerce
C)Export Administration Regulations
D)State Department
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
What do you call a law based on previous events or precedents?
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which law makes it illegal to develop,produce,and trade any device or mechanism designed to circumvent technological controls used in copy protection?
A)Sarbanes-Oxley Act
B)Digital Millennium Copyright Act
C)US Digital Signatures Law
D)Computer Fraud and Abuse Act
A)Sarbanes-Oxley Act
B)Digital Millennium Copyright Act
C)US Digital Signatures Law
D)Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
The Patriot Act permits the Justice Department to proceed with its rollout of the Carnivore program,an eavesdropping program for the Internet.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
The law that regulates unsolicited commercial e-mail is the
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce,or to use a computer in a crime that is interstate in nature?
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
What is a law passed by a legislative branch of government called?
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
What is the Convention on Cybercrime?
A)A convention of black hats who trade hacking secrets
B)The first international treaty on crimes committed via the Internet and other computer networks
C)A convention of white hats who trade hacker prevention knowledge
D)A treaty regulating international conventions
A)A convention of black hats who trade hacking secrets
B)The first international treaty on crimes committed via the Internet and other computer networks
C)A convention of white hats who trade hacker prevention knowledge
D)A treaty regulating international conventions
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
The electronic signatures in the Global and National Commerce Act
A)Implement the principle that a signature,contract,or other record may not be denied legal effect,validity,or enforceability solely because it is electronic form
B)Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
C)Make it a violation of federal law to knowingly use another's identity
D)Are a major piece of legislation affecting the financial industry,and contains significant privacy provisions for individuals
A)Implement the principle that a signature,contract,or other record may not be denied legal effect,validity,or enforceability solely because it is electronic form
B)Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
C)Make it a violation of federal law to knowingly use another's identity
D)Are a major piece of legislation affecting the financial industry,and contains significant privacy provisions for individuals
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a characteristic of the Patriot Act?
A)Extends the tap-and-trace provisions of existing wiretap statutes to the Internet,and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet
B)A major piece of legislation affecting the financial industry,and also one with significant privacy provisions for individuals
C)Makes it a violation of federal law to knowingly use another's identity
D)Implements the principle that a signature,contract,or other record may not be deleted
E)Denies legal effect,validity,or enforceability solely because it is electronic form
A)Extends the tap-and-trace provisions of existing wiretap statutes to the Internet,and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet
B)A major piece of legislation affecting the financial industry,and also one with significant privacy provisions for individuals
C)Makes it a violation of federal law to knowingly use another's identity
D)Implements the principle that a signature,contract,or other record may not be deleted
E)Denies legal effect,validity,or enforceability solely because it is electronic form
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
What are the laws that govern encryption and digital rights management?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Circumventing technological controls used to protect intellectual properties is a violation of the _______________.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
_______________ is the unauthorized entry into a computer system via any means like remote network connections.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
_______________ is a set of contractual rules governing how credit card data is to be protected.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
_______________ involves a piece of malware that defrauds the advertising revenue counter engine through fraudulent user clicks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the laws that govern digital signatures.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Two laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers-or use them to steal information-are the ECPA and the CFAA.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
_______________ allows unsolicited commercial e-mail as long as it adheres to three rules of compliance: unsubscribe,content,and sending behavior compliance.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
_______________ technology is used to protect digital rights management and prevent unauthorized use.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
The _______________ is a legislation that affects the financial industry that includes significant privacy provisions for individuals.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
What are the laws and regulations regarding the import and export of encryption software?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
The _______________ was designed to establish criminal provisions for access to stored electronic records and communications.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Falsifying header information is not covered by the CAN-SPAM Act.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
The _______________ is an international agreement between countries concerning the import/export of cryptographic software,and has enabled mass-marketed products to generally flow across borders.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
What are some ethical issues associated with information security?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
The sale of some types of encryption overseas is illegal.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
The DMCA protects the rights of recording artists and the music industry.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
_______________ have the same legal status as written signatures.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
The low risk of being caught is one of the reasons that criminals are turning to computer crime.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
What are the laws that govern computer access and trespass?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck