FINAL EXAM SG 4 PT 2 Flashcards

1
Q

how does one create and maintain a trade secret

A

dont tell, and protected by common law and most states have laws based on uniform trade secrets act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the international governing IP

A

Paris convention, Berne convention, Trade related aspects of IP rights, madrid protocol, and anti-counterfeiting trade agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

allows members countries to file for patent and trademark protection in other member counties

A

paris convention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a US citizen write a book, members countries must acknowledge their copyright

A

Berne convention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

establishes standards for international protections of IP aboard and effective remedies for vioaltions of the rights

A

Trade related aspects of IP rights (TRIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intil treaty that says a US company can register its trademark abroad with asingle application and designate other member countries where it wants the mark to be valid

A

madrid protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

increase intil cooperation, facilitate best law enforcement practices, provide legal framework to combat counterfeiting

A

anti-counterfeiting trade agreement (ACTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

there are state regulations that implement software to detect patterns to put spam in isolated folders

A

junk emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

enacted to preempt state laws except provisons in state law that prohibit false and deceptive e-mailing practices

A

CAN-SPAM act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

allows FTC to cooperate with foregin agencies in investigating those involved ins spam and internet fraud

A

US safe web act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

snippets of text that describe the content of a page, appear in the code of the page but maybe not the page itself

A

metatag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

letters and symbols used to identify a site on the internet, overseen by ICAAN

A

DOMAIN name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

registering domain anme that is the same or confusingly similar to the trademark of another then offering to sell it back to the owner of the trademark

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cybersquatting relies on mistakes made by internet users when putting info into web browser

A

typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

preempts state anti spam laws except those that prohibit spam emailing 36 states have enacted stuautes to prohibit or regulate spam use

A

this is how law tried to address spam with CAN-SPAM act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

congress passed the anticybersquatting consumer protection act that amended the lanham act. ACAPA makes cybersquatting illegal when a name is identical or confusingly similar to TM of another or one registering domain name has bad intent to profit from someone elses TM

A

this is how the law addressed cybersquatting and typosquaatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ICANN act allows trademark holders with infringment claims to obtain rapid relief thorugh

A

uniform rapid suspension

18
Q

Metatags are useful because hey

A

narrow down search results

19
Q

using another’s TM in a metatag counts as infringement UNLESS

A

use is reasonably necessary and doesnt suggest the owner authorized the use

20
Q

how are the IP issues different on social media

A

users can post infringed images or copyrighted materials without permission, makes it easy to infringe

21
Q

what can happen with social media posts

A

they can cause incrimination. Example: kid on NYE bragged about being drunk then hit a car at 19, social media is public and fair game

22
Q

the problem with employment and soical media is that employers

A

cannot fully control what employees post on social media regarding their workpalce, but they can implement codes of conduct

23
Q

amended federal wiretapping to law to cover electronic communications in addition

A

electronic communications privacy act

24
Q

exceptions of ECPA (electronic communications privacy act)

A

electronic communications an employer provides for use in ordinary course of business or business use exception allows employers to monitor employee electronic communciations in the oridnary course of business

25
prohibts intentional and authorized access to electronic communications and sets criminal sanctions for violators
Stored communications act
26
can employers demand passwords
no, legislation that protects people from having to share their passwords is common now
27
publication to someone else of a false statement that harms reputation
online defamation
28
if a website hosts defamation can it be liable?
No, ISPs arent liable for defamatory statements that come from a third party which is protected under the communciations decency act
29
ISPs that violate federal or criminal law are liable for situations in which they know the violation on their site and dont try to actively kick off user
in this case protection is not absolute
30
what changes for privacy protection once we are online
it varies based on the settings you use, what terms of service youve agreed to, most of the time youre being tracked with cookies
31
bill of rights, must have reasonable expectation of
privacy in particular situations to be protected
32
what are the pros and cons of cookies
pros: personalized online experience, services, cons: privacy concerns
33
obama administration proposed consumer privacy bill of rights to apply offline and online that establishes
individual control, transparency, respect for context, security, access, and accuracy, focus collection, accountability
34
investigates consumer complaints of privacy violations
federal trade commission (ex: google settled with FTC for using safari to monitor users that had blocked tracking )
35
figure out whats right versus wrong
ethics
36
corporations have evolved to be viewed as corporate citizens in society instead of
profit maximization machines
37
ethics is what you should do whereas law in business is what you must do, comliance with the law is not always enough to
determine the right behaviro
38
baseline following the law, doesnt capture eveyrthing ethics might consider
moral minimum
39
even if one thinks its best to have all fight for profit, what might happen if major ethics violations persist
public notices copmanies that have poor practices and often dont buy from them anymroe
40
requires companies to set up confidential systems so that employees and others can raise red flags about suspected illegal or unethical auditing and accounting practices
Sarbanes-oxley act
41
profits, effect on people, and effect on planet is considered the
Triple bottom line
42
covers the rules and expectations inside the copmany that link ethics and law
codes of conduct