Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Business Law Study Set 3
Exam 50: Torts and Crimes
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Libby and Marco take photos of themselves in intimate moments. When their relationship ends, Marco posts the photos online without Libby's consent in an attempt to humiliate her. Included with the photos are Libby's name, Facebook page, address, workplace, and phone number. This could be a ground for a civil suit on the basis of
Question 2
Multiple Choice
Opiate Company markets a product using a trademark of Pharma Ltd. that is not registered in this country and has never otherwise been used here. Pharma did not authorize Opiate's use. Under the Lanham Act, Pharma can
Question 3
Multiple Choice
The existence of an ethical duty on the part of Commerce & Trade Company, and other businesses, to prevent an attack by hackers on business computer systems, and consequent theft of customers' and employees' personal data, is evidenced by
Question 4
Multiple Choice
USA Sales Company publishes a "Privacy Policy" to attract customers, but fails to invest adequate resources in cyber security. A lack of security that allows hackers to steal customers' personal data from a business's computer system can be
Question 5
Multiple Choice
Yun Ltd. circumvents the anti-cheating code of Zen LLC's free online video game to learn how to automate gameplay to perform with enhanced accuracy. Yun's site sells the knowledge to players who can then outplay less-informed players. Yun most likely violated the Digital Millennium Copyright Act by
Question 6
Multiple Choice
The intentional use of electronic communications systems to place another in reasonable fear of death or serious bodily injury is a crime under
Question 7
Multiple Choice
When a registered trademark is infringed to sell a product, the owner of the mark can succeed in an action against the infringer on showing that the defendant's use of the mark
Question 8
Multiple Choice
Sending a strobe-light image within a tweet that induces a seizure in an epileptic recipient could subject its sender to arrest
Question 9
Multiple Choice
Hackers infiltrate the computer system of ChemCo Inc. and steal the company's trade secrets. If the hackers can be identified, they can be
Question 10
Multiple Choice
Hackers infiltrate the computer system of Metro Bank and steal the personal information of Metro's customers and employees. Individuals whose personal information is involved in the breach should be notified, as required by law in