Chapter 9 Flashcards
The part of an Internet address to the right of the ampersand, such as Kent.edu
Domain names
Part of the Internet name/address to the right of the period
Top level domain
Part of the Internet name/address to the left of the period
Second level domain
The non-profit corporation that oversees the distribution of domain names
The Internet Company for Assigned Names and Numbers (ICANN)
Registration of a domain name that is the same as, or confusingly similar to, another’s trademark, followed by the offer to sell the domain name back to the trademark owner
Cubersquatting
Amended the Federal Lanham Act that protects trademarks. Renders cyber squatting illegal when the name is identical or confusingly similar to another’s trademark, and the person or entity who registers, traffics or uses the domain name had a bad faith intent to profit from the trademark
Anticybersquatting Consumer Protection Act (ACPA)
Registration of a domain name that is a misspelling of a popular brand
Typosquatting
Key words that are inserted into the HTML. Communicate specific information about a web page to Internet browsers. Increase the likelihood that a website will be included in search engine results
Metatag
Use of a trademark, sans authorization, in a manner that diminishes its distinctive quality
Trademark dilution
A formal right of ownership of a particular printed, electronic, or audio production.
Copyright
Federal statute that imposes civil and criminal penalties upon anyone who infringes a copyright of digital information
Digital millennium copyright act (DMCA) of 1998
Federal statute that is intended to regulate spam that originates in foreign nations. Allows FTC to cooperate with foreign agencies
U.S. Safe web act of 2006
True or false: Copyright infringement requires the infringers financial gain
False
Files shared online through numerous personal computers are connected to the Internet
Peer-to-peer (P2P) networks
Files shared online through a subscription-based service that extends a computer’s software or storage capabilities.
Cloud computing
Federal statute that prohibits intentional and unauthorized access to stored electronic communication. Also prohibits the service providers, such as Facebook, from divulging private communications.
Stored Communications Act (SCA)
True or false: The federal government has enacted no law to protest social media passwords, especially from an employers demand to know them
True
The 4 states that have enacted laws that prohibit employers from demanding the social media passwords or job applicants and employees.
CA, Illinois, MD and MI
This state’s statute prohibits and employer’s adverse action against an employee, based upon the employee’s social media postings
Michigan
Act that immunized ISPs from being liable for online defamation if they merely passed through their user’s statements and did not contribute to the content of the users’ statements
Communications Decency Act of 1996 (CDA)
Monitors Internet companies, such as Google, Facebook, Twitter and MySpace for privacy and data practices
Federal Trade Commission (FTC)
Use of another’s name, purpose or likeness sans that person’s permission for commercial purposes
Commercial appropriation
Invasion of another’s zone of privacy. Eavesdroppers and peeping toms commit this tort
Intrusion upon seclusion
Publishing a story about someone that inaccurately describes their views
False light
Publication of information that a person would expect to be private, such as bank account balances
Public disclosure of private facts
Intentional deceit for personal gain
Fraudulent misrepresentation, aka fraud
Pursuit of a full lawsuit against another, without probable cause, and with malice
Malicious prosecution
Use of any legal process for an unintended purpose
Abuse of process
Allows a contracting party to sue a third party who interferes with an existing contract
Wrongful interference with contractual relationship
Stealing of personal property
Conversion
Slander of quality or trade libel, slander of title
Disparagement of property