Chapter 9 Internet Law Social Media And Piracy Flashcards Preview

Business Law > Chapter 9 Internet Law Social Media And Piracy > Flashcards

Flashcards in Chapter 9 Internet Law Social Media And Piracy Deck (29):
1

Undertaking spam, spyware and fraud

Allows FTC to work with foreign agencies investigating and prosecuting

International cooperation
Enforcement beyond borders act

uS SAFE WEB ACT

2

Have significant protection to owners of copyrights in digital information

Makes circumvention of encryption software or any anti-piracy software criminal and civil prosecutable

Limits liability of ISP unless they are aware of aubscribera violation

Digital millennium copyright ACT

3

Amended federal wiretapping law to cover electric forms communication

Applies to communications via social media

Also prohibits prohibits the use/disclosure of any information obtained by the interception

Electronic communications privacy act

ECPA
Excludes communications through devices that an employer provides ( in the ordinary course of business)

Allows employers to avoid liability if employees consent to having electronic communications monitored

4

Prevents cell phone companies and social media networks from divulging private communications to certain entities or individuals

Criminal and civil sanctions for violation

Compensatory damages and punitive possible

Stored communications act

SCA

5

Most common cyber tort

Online defamation
( often hard to find perp.)

6

Is negative speech on Social media protected speech ?

NO

7

No provider or user of interactive computer service shall be treated as publisher of info provided by a third party

CDA

Communications decency act

8

Investigates consumer complaints of privacy violations

FTC

Federal trade commission

9

Can employers normally ask for social media passwords

Yes excluding four states that passed legislation in 2013

10

2003 congress enacted the CAN SPAM act which effectively
Eliminated unsolicited emails

T or F

False

11

Because the can spam act only applies to emails originating in the U.S. congress enacted the ---

U.S. Safe web act

12

Loss of ------- occurs when someone uses a domain name similar to yours

Goodwill

13

The act of registering a domain name that is the same as or similar to the trademark of another and then offering to sell that domain name back to the trademark owner

cybersquatting

14

The act of buying names that are similar to well known names exept for slight misspellings

Typo squatting

15

Using another's trademark in a meta-tag will normally constitute trademark infringement

True

16

A claim of trademark dilution requires proof that consumers will likely be confused by a connection between the unauthorized use and the Mark

False !

17

The sharing of resources amoung multiple computers without nessisailly requiring a central network server

Peer to peer networking

18

A network that can be used by perso. Loaches around the country or globe to share computer files

Distributed network

19

The delivery of users of on demand services from third party servers over a network

Cloud computing

20

Social media posts that contain trademarked images and copyrighted materials typically infringe the intellectual property rights of others

True

21

Social media posts can be used to detect and prosecute criminals, further investigation by federal regulators into illegal activities

T or F

True

22

The business extension the the electronics communications privacy act permits employers to monitor employees personal communications

T or F

False

23

Which act prevents cell phone companies and social
Media networks from divulging private communications the certain entities and individuals

Stored communications act

24

To protect from would be cybersquatting and typo squatters large corps may have to

Register 1000's of domain names accross the globe

25

To test computer security and conduct encryption research one can circumvent the exeptional software and anti-piracy provisions

True

26

Downloading music onto your computers RAM without authorization is

Copyright infringement

27

Registered domain names are protected as

Trademarks

28

What does the top level part of a domain name indicate

The type of entity that operates the sight

29

Applies to commercial and electronic mail messages
-false return addresses
-misleading or deceptive information
Randomly generated e-mail addresses/ harvesting

CAN-SPAM ACT
Controlling the assault of non-solicited porn and marketing