Deck 9: Internet Law Social Media and Privacy

ملء الشاشة (f)
exit full mode
سؤال
A license may limit the use of a software application to a specific device.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Federal law permits the sending of unsolicited commercial e-mail to randomly generated e-mail addresses.
سؤال
Under the federal law protecting trademarks, "bad faith intent" is one element of a claim of illegal cybersquatting.
سؤال
Any party who gives information to the Federal Trade Commission concerning possible deceptive conduct in a foreign jurisdiction is immune from liability.
سؤال
"Fair use" cannot be asserted as a defense to a charge of copyright infringement in a dispute concerning digital sampling.
سؤال
Using another's trademark as a meta tag may be permissible.
سؤال
File-sharing can be used to download others' stored music files without raising copyright issues.
سؤال
Cybersquatting is legal when the person offering for sale a domain name that is the same as another's trademark intends to profit from the sale.
سؤال
A social media post is not subject to discovery in litigation.
سؤال
To protect a trademark against typosquatting, a company should attempt to register potential misspellings of the mark.
سؤال
Anyone can circumvent encryption software or other technological antipiracy protection without penalty.
سؤال
An Internet service provider that terminates subscribers who infringe copyrights can qualify for a "safe harbor" under the Digital Millennium Copyright Act.
سؤال
Cybersquatting occurs when the owner of a trademark registers the mark as a domain name but does not use it for that purpose.
سؤال
Cybersquatting is illegal only if a domain name is identical to the trademark of another, not if the name is merely confusingly similar.
سؤال
Digital sampling can constitute copyright infringement.
سؤال
Many states require the sender of an e-mail ad to tell recipients how to opt out of receiving future e-mail ads from the sender.
سؤال
Downloading music into a computer's random access memory, or RAM, without authorization is copyright infringement.
سؤال
The Digital Millennium Copyright Act protects copyrighted material from piracy online.
سؤال
Criminal liability for the piracy of copyrighted materials extends only to persons who exchange unauthorized copies for profit.
سؤال
To maintain a claim of trademark dilution, the products involved must be similar.
سؤال
In entering personal information to a banking site online, a person may have a reasonable expectation of privacy.
سؤال
Online conduct gives rise to only a narrow variety of legal actions.
سؤال
Volatile Investments Inc. sends e-mail ads to any e-mail address that the sender can find on the Web or otherwise generate. Under federal law, Volatile's marketing method

A)may be permitted.
B)is prohibited.
C)must be reviewed by a federal agency.
D)is preempted.
سؤال
Outsourcing Inc. registers a domain name that is the same as the trademark of Resourcing LLC and offers to sell the name to the mark's owner. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
سؤال
Broadband Inc., an Internet service provider, supplies information to the Federal Trade Commission concerning possible unfair or deceptive ads originating in a foreign jurisdiction. Under federal law, Broadband is

A)immune from liability.
B)subject to liability if the information is false.
C)subject to liability if the ads were sent through Broadband's service.
D)subject to liability in the foreign jurisdiction, but not in the United States.
سؤال
Employers are prohibited from taking actions against employees or applicants based on their social network postings.
سؤال
With respect to spam, thirty-seven states

A)prohibit or regulate it.
B)permit its use by business entities.
C)prescribe its use.
D)preempt the application of federal law on the same subject.
سؤال
A company that provides a phone to an employee for business use is not prohibited from intercepting personal communications made on it.
سؤال
Federal guidelines allow a company to disclose material information about itself through social media as long as investors are notified in advance.
سؤال
Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices. The state in which the company is physically located has enacted an antispam law. Under federal law

A)the application of federal law to Sound's ads is preempted.
B)Sound's ads are required to be reviewed by a federal agency.
C)Sound's ads are prohibited.
D)the application of the state's law to Sound's ads is preempted.
سؤال
An Internet service provider can disclose personal information about its customers only when ordered to do so by a court.
سؤال
State law may protect individuals from having to disclose their social media passwords to potential employers.
سؤال
Under the Communications Decency Act, Internet service providers are liable as publishers of defamatory statements that come from a third party.
سؤال
A social media post cannot be used to invalidate a settlement agreement.
سؤال
An online retailer can track a user's web activities with cookies without violating the person's right to privacy.
سؤال
The Federal Trade Commission can effectively force a private company to consent to the agency's review of the company's privacy and data practices.
سؤال
Under the First Amendment, every U.S. citizen has a right to be forgotten with respect to outdated personal information otherwise searchable online.
سؤال
Because federal wiretapping law was enacted before social media networks existed, it does not apply to communications through social media.
سؤال
In posting statements or photos to a social media site, a person clearly has a reasonable expectation of privacy.
سؤال
No court has held that it is legally acceptable for law enforcement to set up a phony social media account to catch a suspect.
سؤال
Web Invest Inc. buys and sells domain names with the click of a mouse. A domain name can be bought and sold many times. Each change of owner is registered automatically as part of a mass registration. In this environment

A)cybersquatting can flourish.
B)typosquatting occurs unintentionally through clerical misspellings.
C)brands and trademarks are automatically protected from cybersquatters.
D)the Federal Trade Commission can sanction Web Invest.
سؤال
Rue obtains permission from Saga Company to use the firm's game app on Rue's mobile devices. But Rue does not obtain ownership rights in the app. This is

A)a license.
B)a cookie.
C)cloud computing.
D)a violation of the law.
سؤال
CallTalk Corporation, a phone-time seller, uses its mark "calltalk" as its domain name. Later, Converse Inc. uses the domain name "callltalk" (a deliberate misspelling of "calltalk")without CallTalk's authorization, to sell sexually explicit phone conversations. This is

A)a legitimate marketing technique.
B)a fair use.
C)a license.
D)trademark dilution.
سؤال
Afford Motors LLC, an auto broker, uses the trademark of Ford Motor Corporation in a meta tag without Ford's permission. This is

A)cybersquatting.
B)a legitimate business practice.
C)trademark infringement.
D)trademark dilution.
سؤال
Chong transfers pirated copies of movies of television programs to an Internet site that permits users to view them without downloading them. With respect to the Digital Millennium Copyright Act, this is

A)a violation.
B)a "fair use" exception.
C)dilution.
D)not subject to the act .
سؤال
Jade transfers selected musical recordings, without the copyright owners' authorization, through her phone to her friends. Jade does not charge her friends for this "service." This is

A)copyright infringement.
B)a license.
C)goodwill.
D)"fair use."
سؤال
Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads, file-sharing has created problems for

A)the motion picture industry.
B)recording artists and their labels.
C)the companies that distribute file-sharing software.
D)all of the choices.
سؤال
Skye posts excerpts from comics and graphic novels on social networking sites without the permission of the owners of the copyrights to the illustrations and stories. This is

A)copyright infringement.
B)a license.
C)goodwill.
D)"fair use."
سؤال
Without authorization, Ben uses the trademark of Cielo Coffee Company to promote cheap, flavorless candy, which is not similar to Cielo's products but diminishes the quality of the coffee company's mark. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
سؤال
The employees of Eco Engineering Inc. share company-related resources among multiple computers without requiring a central network server. This is

A)digital sampling.
B)cybersquatting.
C)cloud computing.
D)peer-to-peer (P2P)networking.
سؤال
Grain Mill Company brings a suit against Milled Grain Company under the Anticybersquatting Consumer Protection Act, alleging that Milled Grain is profiting from a domain name that is confusingly similar to Grain Mill's trademark. If Grain Mill is successful, recovery may include

A)actual damages and profits in any amount.
B)statutory damages no greater than $1,000.
C)statutory damages no less than $100,000.
D)all of the choices.
سؤال
Mix Restaurant Corporation owns the trademark "Mix." Remix Café Company begins to use the mark without authorization as a domain name. Mix files a suit against Remix on a theory of trademark dilution. This claim requires proof that

A)none of the choices.
B)consumers are likely to be confused by the names.
C)the products involved are similar.
D)Mix has registered all variations of the name "Mix."
سؤال
Flash Inc., a maker of athletic shoes, registers and uses "flash" as its domain name. Later, Got Shoes Company begins to use "flast" (an intentional misspelling of "flash")as its domain name. Got Shoes is most likely

A)diminishing the quality of Flash's mark.
B)making a fair use of Flash's mark.
C)licensing the use of Flash's mark to itself.
D)engaging in lawful competitive conduct.
سؤال
BeFriends Corporation uses the trademark of Community Life Inc., a social media site, as a meta tag without Community Life's permission. This may be permissible

A)if the appropriating site has nothing to do with the meta tag.
B)if the two sites appear in the same search engine results.
C)if the use constitutes trademark infringement.
D)in none of these circumstances.
سؤال
InfoFree Inc. makes and sells devices and services for the circumvention of encryption software. Under the Digital Millennium Copyright Act, this is

A)a violation of copyright law.
B)prohibited but not a violation of copyright law.
C)a "fair use" exception to the provisions of the act.
D)permitted for reconsideration every three years .
سؤال
To test computer security and conduct encryption research, Solutions Inc. circumvents the encryption software and other antipiracy protection of Tech Corporation's software. Under the Digital Millennium Copyright Act, this is

A)a violation of copyright law.
B)prohibited but not a violation of copyright law.
C)a "fair use" exception to the provisions of the act.
D)permitted for reconsideration every three years .
سؤال
Haute Dawgs Corporation allows its trademark to be used as part of a domain name for Haute Dawgs NY Inc., an unaffiliated company. Haute Dawgs NY does not obtain ownership rights in the mark. This is

A)trademark infringement.
B)fair use.
C)a license.
D)trademark dilution.
سؤال
Dana downloads music into her computer's random access memory, or RAM, without authorization. This is

A)copyright infringement.
B)within Dana's rights as a computer user.
C)a basis of liability for the computer maker if it does not act against Dana.
D)none of the choices.
سؤال
Pilar registers a domain name-qualitytires.com-that is confusingly similar to the trademark of Quality Tires Inc. Pilar has a "bad faith intent" to profit from the mark by selling the name to Quality Tires. This is

A)a legitimate business practice.
B)illegal.
C)a bid to obtain a license.
D)trademark dilution.
سؤال
Russ registers a domain name-sweetfriedpotatos.com-that is a misspelling of a popular brand-sweetfriedpotatoes.com. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
سؤال
Interactive Entertainment Corporation markets its products online. Through the use of cookies, Interactive Entertainment and other online marketers can

A)track individuals' Web browsing activities.
B)gain access to competitors' servers.
C)"sweet talk" consumers into buying certain products.
D)attack competitors' Web sites.
سؤال
Prodigious Profit, LLC, and other companies operate social media Web sites, issue apps for mobile devices, obtain ad revenue from search engines, and sell directly to consumers from other sites. The privacy rights of the users of these products are frequently defined, not by the courts or legislatures, but by

A)the companies that own the sites and the apps.
B)retailers who have had to change their procedures to compete.
C)spammers, cybersquatters, and typosquatters.
D)Internet service providers.
سؤال
ConnectWeb, Inc., operates a subscription-based service that extends the software and storage capabilities of its subscribers. This is

A)dilution.
B)peer-to-peer (P2P)networking.
C)cloud computing.
D)a distributed network.
سؤال
Sales Corps Inc. provides tablets for its employees to use "in the ordinary course of its business." Sales Corps intercepts the employees' business communications made on these devices. Under the Electronic Communications Privacy Act, this is

A)prohibited.
B)a matter for which an employer must obtain employees' consent.
C)a subject for dispute resolution by an Internet service provider.
D)permissible.
سؤال
Payback Inc. discovers that defamatory statements about its policies are being posted in an online forum. Q Web Inc., the Internet service provider whose users are posting the messages, refuses to reveal the users' identities. To obtain those identities, Payback should initially

A)file a suit against the anonymous users.
B)gain unauthorized access to Q Web's servers.
C)file a suit against Q Web.
D)ask the U.S. Department of Justice to issue a subpoena.
سؤال
Mobile Device Company (MDC)discovers that defamatory statements about its products are being posted in an online forum. NuView Inc., the Internet service provider whose users are posting the messages, can disclose their identity

A)only when ordered to do so by a court.
B)whenever and however the provider chooses.
C)only in egregious circumstances.
D)in no circumstances.
سؤال
Employees, clients, and others with authorization use World Transport Corporation's network around the globe to share computer files. This is

A)an invasion of privacy.
B)trademark and copyright infringement.
C)digital sampling.
D)a distributed network.
سؤال
Employees of Bodega Inc. maintain a password-protected social media page to "vent about work." Bodega learns of the page and intimidates the network that operates it into revealing the password. After reviewing the posts, Bodega fires the participants. Most likely, this is

A)a violation of the Stored Communications Act.
B)within the employer's rights.
C)a subject for dispute resolution by the network.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
سؤال
Deals Inc. provides its sales representatives with phones to use in the ordinary course of business. Deals monitors the employees' electronic communications made through the phones. This is

A)a violation of the rights of the employees.
B)within the rights of the employer even if it did not provide the phones.
C)a subject for dispute resolution by the phone service.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
سؤال
Sonya and other employees of TransGlobal Inc. maintain a password-protected social media page on which they post comments on work-related issues. The posts range from positive to negative, supporting the page's purpose to "vent about work." When TransGlobal learns of the page, the company intimidates Sonya into revealing the password, and after reviewing the posts, fires her and the other participants. Which federal law discussed in this chapter most likely applies to this situation? Has this law been violated? Discuss.
سؤال
"Dawn" is a song included in the sound track of "eDay," a movie produced and distributed by FasTrac Corporation. The song features a digital sampling of a few seconds of the guitar solo of one of George Harrison's copyrighted sound recordings without permission. Does this digital sampling constitute copyright infringement on the part of FasTrac? Explain.
سؤال
Odell is an employee of Packing Corporation. She uses social media in a way that violates her employer's stated social media policies. Packing disciplines Odell and then, after a second transgression, fires her. This is

A)a violation of the Stored Communications Act.
B)within the employer's rights.
C)a subject for dispute resolution by social media.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Internet Law Social Media and Privacy
1
A license may limit the use of a software application to a specific device.
True
2
Federal law permits the sending of unsolicited commercial e-mail to randomly generated e-mail addresses.
False
3
Under the federal law protecting trademarks, "bad faith intent" is one element of a claim of illegal cybersquatting.
True
4
Any party who gives information to the Federal Trade Commission concerning possible deceptive conduct in a foreign jurisdiction is immune from liability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
5
"Fair use" cannot be asserted as a defense to a charge of copyright infringement in a dispute concerning digital sampling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
6
Using another's trademark as a meta tag may be permissible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
7
File-sharing can be used to download others' stored music files without raising copyright issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
8
Cybersquatting is legal when the person offering for sale a domain name that is the same as another's trademark intends to profit from the sale.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
9
A social media post is not subject to discovery in litigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
10
To protect a trademark against typosquatting, a company should attempt to register potential misspellings of the mark.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
11
Anyone can circumvent encryption software or other technological antipiracy protection without penalty.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
12
An Internet service provider that terminates subscribers who infringe copyrights can qualify for a "safe harbor" under the Digital Millennium Copyright Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
13
Cybersquatting occurs when the owner of a trademark registers the mark as a domain name but does not use it for that purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cybersquatting is illegal only if a domain name is identical to the trademark of another, not if the name is merely confusingly similar.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
15
Digital sampling can constitute copyright infringement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
16
Many states require the sender of an e-mail ad to tell recipients how to opt out of receiving future e-mail ads from the sender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
17
Downloading music into a computer's random access memory, or RAM, without authorization is copyright infringement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
18
The Digital Millennium Copyright Act protects copyrighted material from piracy online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
19
Criminal liability for the piracy of copyrighted materials extends only to persons who exchange unauthorized copies for profit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
20
To maintain a claim of trademark dilution, the products involved must be similar.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
21
In entering personal information to a banking site online, a person may have a reasonable expectation of privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
22
Online conduct gives rise to only a narrow variety of legal actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
23
Volatile Investments Inc. sends e-mail ads to any e-mail address that the sender can find on the Web or otherwise generate. Under federal law, Volatile's marketing method

A)may be permitted.
B)is prohibited.
C)must be reviewed by a federal agency.
D)is preempted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
24
Outsourcing Inc. registers a domain name that is the same as the trademark of Resourcing LLC and offers to sell the name to the mark's owner. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
25
Broadband Inc., an Internet service provider, supplies information to the Federal Trade Commission concerning possible unfair or deceptive ads originating in a foreign jurisdiction. Under federal law, Broadband is

A)immune from liability.
B)subject to liability if the information is false.
C)subject to liability if the ads were sent through Broadband's service.
D)subject to liability in the foreign jurisdiction, but not in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
26
Employers are prohibited from taking actions against employees or applicants based on their social network postings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
27
With respect to spam, thirty-seven states

A)prohibit or regulate it.
B)permit its use by business entities.
C)prescribe its use.
D)preempt the application of federal law on the same subject.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
28
A company that provides a phone to an employee for business use is not prohibited from intercepting personal communications made on it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
29
Federal guidelines allow a company to disclose material information about itself through social media as long as investors are notified in advance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
30
Sound Financials Corporation sends daily e-mail ads to its previous customers and those who have opted to receive the notices. The state in which the company is physically located has enacted an antispam law. Under federal law

A)the application of federal law to Sound's ads is preempted.
B)Sound's ads are required to be reviewed by a federal agency.
C)Sound's ads are prohibited.
D)the application of the state's law to Sound's ads is preempted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
31
An Internet service provider can disclose personal information about its customers only when ordered to do so by a court.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
32
State law may protect individuals from having to disclose their social media passwords to potential employers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
33
Under the Communications Decency Act, Internet service providers are liable as publishers of defamatory statements that come from a third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
34
A social media post cannot be used to invalidate a settlement agreement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
35
An online retailer can track a user's web activities with cookies without violating the person's right to privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
36
The Federal Trade Commission can effectively force a private company to consent to the agency's review of the company's privacy and data practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
37
Under the First Amendment, every U.S. citizen has a right to be forgotten with respect to outdated personal information otherwise searchable online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
38
Because federal wiretapping law was enacted before social media networks existed, it does not apply to communications through social media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
39
In posting statements or photos to a social media site, a person clearly has a reasonable expectation of privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
40
No court has held that it is legally acceptable for law enforcement to set up a phony social media account to catch a suspect.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
41
Web Invest Inc. buys and sells domain names with the click of a mouse. A domain name can be bought and sold many times. Each change of owner is registered automatically as part of a mass registration. In this environment

A)cybersquatting can flourish.
B)typosquatting occurs unintentionally through clerical misspellings.
C)brands and trademarks are automatically protected from cybersquatters.
D)the Federal Trade Commission can sanction Web Invest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
42
Rue obtains permission from Saga Company to use the firm's game app on Rue's mobile devices. But Rue does not obtain ownership rights in the app. This is

A)a license.
B)a cookie.
C)cloud computing.
D)a violation of the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
43
CallTalk Corporation, a phone-time seller, uses its mark "calltalk" as its domain name. Later, Converse Inc. uses the domain name "callltalk" (a deliberate misspelling of "calltalk")without CallTalk's authorization, to sell sexually explicit phone conversations. This is

A)a legitimate marketing technique.
B)a fair use.
C)a license.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
44
Afford Motors LLC, an auto broker, uses the trademark of Ford Motor Corporation in a meta tag without Ford's permission. This is

A)cybersquatting.
B)a legitimate business practice.
C)trademark infringement.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
45
Chong transfers pirated copies of movies of television programs to an Internet site that permits users to view them without downloading them. With respect to the Digital Millennium Copyright Act, this is

A)a violation.
B)a "fair use" exception.
C)dilution.
D)not subject to the act .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
46
Jade transfers selected musical recordings, without the copyright owners' authorization, through her phone to her friends. Jade does not charge her friends for this "service." This is

A)copyright infringement.
B)a license.
C)goodwill.
D)"fair use."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
47
Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads, file-sharing has created problems for

A)the motion picture industry.
B)recording artists and their labels.
C)the companies that distribute file-sharing software.
D)all of the choices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
48
Skye posts excerpts from comics and graphic novels on social networking sites without the permission of the owners of the copyrights to the illustrations and stories. This is

A)copyright infringement.
B)a license.
C)goodwill.
D)"fair use."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
49
Without authorization, Ben uses the trademark of Cielo Coffee Company to promote cheap, flavorless candy, which is not similar to Cielo's products but diminishes the quality of the coffee company's mark. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
50
The employees of Eco Engineering Inc. share company-related resources among multiple computers without requiring a central network server. This is

A)digital sampling.
B)cybersquatting.
C)cloud computing.
D)peer-to-peer (P2P)networking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
51
Grain Mill Company brings a suit against Milled Grain Company under the Anticybersquatting Consumer Protection Act, alleging that Milled Grain is profiting from a domain name that is confusingly similar to Grain Mill's trademark. If Grain Mill is successful, recovery may include

A)actual damages and profits in any amount.
B)statutory damages no greater than $1,000.
C)statutory damages no less than $100,000.
D)all of the choices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
52
Mix Restaurant Corporation owns the trademark "Mix." Remix Café Company begins to use the mark without authorization as a domain name. Mix files a suit against Remix on a theory of trademark dilution. This claim requires proof that

A)none of the choices.
B)consumers are likely to be confused by the names.
C)the products involved are similar.
D)Mix has registered all variations of the name "Mix."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
53
Flash Inc., a maker of athletic shoes, registers and uses "flash" as its domain name. Later, Got Shoes Company begins to use "flast" (an intentional misspelling of "flash")as its domain name. Got Shoes is most likely

A)diminishing the quality of Flash's mark.
B)making a fair use of Flash's mark.
C)licensing the use of Flash's mark to itself.
D)engaging in lawful competitive conduct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
54
BeFriends Corporation uses the trademark of Community Life Inc., a social media site, as a meta tag without Community Life's permission. This may be permissible

A)if the appropriating site has nothing to do with the meta tag.
B)if the two sites appear in the same search engine results.
C)if the use constitutes trademark infringement.
D)in none of these circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
55
InfoFree Inc. makes and sells devices and services for the circumvention of encryption software. Under the Digital Millennium Copyright Act, this is

A)a violation of copyright law.
B)prohibited but not a violation of copyright law.
C)a "fair use" exception to the provisions of the act.
D)permitted for reconsideration every three years .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
56
To test computer security and conduct encryption research, Solutions Inc. circumvents the encryption software and other antipiracy protection of Tech Corporation's software. Under the Digital Millennium Copyright Act, this is

A)a violation of copyright law.
B)prohibited but not a violation of copyright law.
C)a "fair use" exception to the provisions of the act.
D)permitted for reconsideration every three years .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
57
Haute Dawgs Corporation allows its trademark to be used as part of a domain name for Haute Dawgs NY Inc., an unaffiliated company. Haute Dawgs NY does not obtain ownership rights in the mark. This is

A)trademark infringement.
B)fair use.
C)a license.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
58
Dana downloads music into her computer's random access memory, or RAM, without authorization. This is

A)copyright infringement.
B)within Dana's rights as a computer user.
C)a basis of liability for the computer maker if it does not act against Dana.
D)none of the choices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
59
Pilar registers a domain name-qualitytires.com-that is confusingly similar to the trademark of Quality Tires Inc. Pilar has a "bad faith intent" to profit from the mark by selling the name to Quality Tires. This is

A)a legitimate business practice.
B)illegal.
C)a bid to obtain a license.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
60
Russ registers a domain name-sweetfriedpotatos.com-that is a misspelling of a popular brand-sweetfriedpotatoes.com. This is

A)cybersquatting.
B)typosquatting.
C)trademark infringement.
D)trademark dilution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
61
Interactive Entertainment Corporation markets its products online. Through the use of cookies, Interactive Entertainment and other online marketers can

A)track individuals' Web browsing activities.
B)gain access to competitors' servers.
C)"sweet talk" consumers into buying certain products.
D)attack competitors' Web sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
62
Prodigious Profit, LLC, and other companies operate social media Web sites, issue apps for mobile devices, obtain ad revenue from search engines, and sell directly to consumers from other sites. The privacy rights of the users of these products are frequently defined, not by the courts or legislatures, but by

A)the companies that own the sites and the apps.
B)retailers who have had to change their procedures to compete.
C)spammers, cybersquatters, and typosquatters.
D)Internet service providers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
63
ConnectWeb, Inc., operates a subscription-based service that extends the software and storage capabilities of its subscribers. This is

A)dilution.
B)peer-to-peer (P2P)networking.
C)cloud computing.
D)a distributed network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
64
Sales Corps Inc. provides tablets for its employees to use "in the ordinary course of its business." Sales Corps intercepts the employees' business communications made on these devices. Under the Electronic Communications Privacy Act, this is

A)prohibited.
B)a matter for which an employer must obtain employees' consent.
C)a subject for dispute resolution by an Internet service provider.
D)permissible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
65
Payback Inc. discovers that defamatory statements about its policies are being posted in an online forum. Q Web Inc., the Internet service provider whose users are posting the messages, refuses to reveal the users' identities. To obtain those identities, Payback should initially

A)file a suit against the anonymous users.
B)gain unauthorized access to Q Web's servers.
C)file a suit against Q Web.
D)ask the U.S. Department of Justice to issue a subpoena.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
66
Mobile Device Company (MDC)discovers that defamatory statements about its products are being posted in an online forum. NuView Inc., the Internet service provider whose users are posting the messages, can disclose their identity

A)only when ordered to do so by a court.
B)whenever and however the provider chooses.
C)only in egregious circumstances.
D)in no circumstances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
67
Employees, clients, and others with authorization use World Transport Corporation's network around the globe to share computer files. This is

A)an invasion of privacy.
B)trademark and copyright infringement.
C)digital sampling.
D)a distributed network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
68
Employees of Bodega Inc. maintain a password-protected social media page to "vent about work." Bodega learns of the page and intimidates the network that operates it into revealing the password. After reviewing the posts, Bodega fires the participants. Most likely, this is

A)a violation of the Stored Communications Act.
B)within the employer's rights.
C)a subject for dispute resolution by the network.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
69
Deals Inc. provides its sales representatives with phones to use in the ordinary course of business. Deals monitors the employees' electronic communications made through the phones. This is

A)a violation of the rights of the employees.
B)within the rights of the employer even if it did not provide the phones.
C)a subject for dispute resolution by the phone service.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
70
Sonya and other employees of TransGlobal Inc. maintain a password-protected social media page on which they post comments on work-related issues. The posts range from positive to negative, supporting the page's purpose to "vent about work." When TransGlobal learns of the page, the company intimidates Sonya into revealing the password, and after reviewing the posts, fires her and the other participants. Which federal law discussed in this chapter most likely applies to this situation? Has this law been violated? Discuss.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
71
"Dawn" is a song included in the sound track of "eDay," a movie produced and distributed by FasTrac Corporation. The song features a digital sampling of a few seconds of the guitar solo of one of George Harrison's copyrighted sound recordings without permission. Does this digital sampling constitute copyright infringement on the part of FasTrac? Explain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
72
Odell is an employee of Packing Corporation. She uses social media in a way that violates her employer's stated social media policies. Packing disciplines Odell and then, after a second transgression, fires her. This is

A)a violation of the Stored Communications Act.
B)within the employer's rights.
C)a subject for dispute resolution by social media.
D)a "business-extension exception" under the Electronic Communications Privacy Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 72 في هذه المجموعة.