Ch.9 - Privacy and Internet Laws Flashcards

1
Q

We lose our privacy through…

A

Data breaches
Surveillance
Big Data
The Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The internet of things

A

Refers to internet-connected everyday devices, vehicles, and even buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Fourth Amendment

A

Prohibits unreasonable searches and seizures by the government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reasonable expectation of privacy

A

The test to analyze whether privacy should be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The two requirements for establishing a reasonable expectation of privacy are…

A
  1. The person had an actual subjective expectation of privacy
  2. Society accepts the person’s expectation of privacy as reasonable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Do employees have a reasonable expectation to privacy?

A

Courts have generally held that employees do not have a reasonable expectation of privacy in the workplace, especially if using hardware provided by the employer, or if the employee handbook says they may be monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public disclosure of private facts

A

A tort providing redress to victims of unauthorized and embarrassing disclosures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The public disclosure tort requires the plaintiff to show…

A
  • The defendant made public disclosure
  • The disclosed facts had been privately disclosed
  • The facts were not of legitimate concern to the public
  • The disclosure is highly offensive to a reasonable person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The tort of intrusion requires the plaintiff to show that the defendant….

A
  1. intentionally intruded, physically or otherwise
  2. upon the solitude or seclusion of another or on their private affairs or concerns
  3. in a manner highly offensive to a reasonable person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ECPA (Electronic Communications Privacy Act of 1984)

A

A federal statute prohibiting unauthorized interception of, access to, or disclosure of wire and electronic communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wiretap Act

A

The section of the ECPA that prohibits the interception of face-to-face oral communications and telephone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stored Communications Act

A

The section of the ECPA that prohibits the unlawful access to stored communications, such as email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Wiretap Act not protect?

A
  • If one party to the conversation consents
  • Businesses may monitor conversations with customers if they give notice
  • only protect speakers with a reasonable expectation of privacy in the conversation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Under the Stored Communications Act…

A
  • Any intended recipient of an electronic communication has the right to disclose it
  • ISPs (Internet service providers) are generally prohibited from disclosing electronic messages to anyone other than the addressee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISPs (Internet Service Providers)

A

Companies that connect users to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employers have the right to… and are prohibited from…

A
  1. monitor electronic communications even if it does not relate to work activities
  2. accessing an employee’s social media profile by trickery or coercion
17
Q

FISA (Foreign Intelligence Surveillance Act)

A

Federal statute governing the government’s collection of foreign intelligence in the United States

18
Q

User-generated content

A

Any content created and made publicly available by end users

19
Q

Defamation exceptions

A

Opinions
Statements that are verifiably false
Anonymity

20
Q

SLAPP (Strategic Lawsuit Against Public Participation)

A

A defamation lawsuit whose main objective is to silence speech through intimidation rather than win a defamation case on the merits

21
Q

The first amendment does not protect against…

A

Treats of violence against individuals

22
Q

Communications Decency Act of 1996

A

Provides ISPs immunity from liability when information was provided by an end user

23
Q

Under the CDA…

A

end users and anyone who simply provides a neutral forum for information (such as ISPs and website operators) are not liable for content that is provided by someone else. Only content providers are liable.

24
Q

Section 5 of the FTC Act…

A

prohibits unfair and deceptive acts or practices

25
Q

Spam

A

Unsolicited commercial email

26
Q

CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing Act)

A

Federal statute that regulates spam, does not prohibit it

27
Q

Commercial emails…

A
  • May not have deceptive headings
  • Must offer an opt-out system and honor them promptly
  • Must clearly indicate that it’s an ad
  • Must provide valid physical return address
  • must clearly indicate the nature of pornographic messages
28
Q

Data breech laws

A

Require businesses to notify individuals affected by a security breach

29
Q

Data disposal laws

A

Mandate that businesses destroy customer data and maintain reasonable security procedures to guard against theft

30
Q

Every time Dave logs on to his company computer, he clicks “I agree” to the firm’s computer usage policy, which states that the employer can monitor everything he does online. On his lunch break, Dave logs on to his Facebook account from his company computer to upload some pictures from his weekend’s activities. Can Dave’s employer snoop?

A

Dave does not have a reasonable expectation of privacy on his work computer, even if he is on break and on his private Facebook page. He consented to employer surveillance when he logged in. © Cengage

31
Q

Dr. Norman Scott was the head of the orthopedics department at a hospital. His contract with the hospital provided for $14 million in severance pay if the hospital fired him without cause. When the hospital fired him, he filed suit seeking his $14 million. He used the hospital’s email system to send emails to his lawyer. The hospital notified him that it had copies of these emails, which it planned to read. He said that the hospital did not have this right because the emails were protected by the attorney–client privilege, which is a legal right to keep communications between a lawyer and a client secret.

A

The court ruled that the hospital could read the emails. If the doctor wanted the content of these emails to be protected under the attorney–client privilege, he should not have sent them over the hospital email system.

32
Q

Ton Cremers was the director of security at Amsterdam’s famous Rijksmuseum and the operator of the Museum Security Network (the Network) website. Robert Smith, a handyman working for Ellen Batzel in North Carolina, sent an email to the Network alleging that Batzel was the granddaughter of Heinrich Himmler (one of Hitler’s henchmen) and that she had art that Himmler had stolen. These allegations were completely untrue. Cremers posted Smith’s email on the Network’s website and sent it to the Network’s subscribers. Cremers exercised some editorial discretion in choosing which emails to send to subscribers, generally omitting any that were unrelated to stolen art. Is Cremers liable to Batzel for the harm that this inaccurate information caused?

A

The court found that Cremers was not liable under the CDA.

33
Q

The following agency is charged with the regulation of electronic communications:
(a) National Security Agency
(b) Federal Trade Commission
(c) Federal Communications Commission
(d) Foreign Intelligence Surveillance Court

A
34
Q

Because Blaine Blogger reviews movies on his blog, cinemas allow him in for free. Nellie Newspaper Reporter also gets free admission to movies.

Blaine_______________
disclose on his blog that he receives free tickets. Nellie_______________ disclose in her articles that she receives free tickets.
(a) must, must
(b) need not, need not
(c) must, need not
(d) need not, must

A

(c) must, need not

35
Q

Which of the following is not protected by the First Amendment?
(a) True threats
(b) All threats
(c) Offensive language
(d) Insults

A
36
Q

An employer has the right to monitor workers’ electronic communications if:
(a) the employee consents.
(b) the monitoring occurs in the ordinary course of business.
(c) the employer provides the computer system.
(d) All of these
(e) None of these

A

(d) All of these

37
Q

Spiro Spammer sends millions of emails a day asking people to donate to his college tuition fund. Oddly enough, many people do. Everything in the emails is accurate (including his 1.9 GPA). Which of the following statements is true?
(a) Spiro has violated the CAN-SPAM Act because he has sent unsolicited commercial emails.
(b) Spiro has violated the CAN-SPAM Act if he has not offered recipients an opportunity to unsubscribe.
(c) Spiro has violated the CAN-SPAM Act because he is asking for money.
(d) Spiro has violated the CAN-SPAM Act unless the recipients have granted permission to him to send these emails.

A

(b) Spiro has violated the CAN-SPAM Act if he has not offered recipients an opportunity to unsubscribe.

38
Q

Sushila suspects that her boyfriend Plum is being unfaithful. While he is asleep, she takes his smart phone out from under his pillow and goes through all his texts. Which law has Sushila violated?
(a) The First Amendment
(b) The Communications Decency Act
(c) The Stored Communications Act
(d) The Wiretap Act
(e) None

A

(e) None