Internet Law, Social Media, Privacy (Chapter 9) Flashcards
Rowan registers a domain name—sweetfriedpotatos.com—that is a misspelling of a popular brand—sweetfriedpotatoes.com. This is
typosquatting.
OntheWeb Company is an Internet service provider. OntheWeb’s customer Phoebe commits copyright infringement. OntheWeb is not liable for Phoebe’s activity
unless OntheWeb is aware of Phoebe’s violation.
Global Reach Corporation uses invisible files created on the computers, smartphones, and other mobile devices of visitors to its Web sites to track the users’ browsing activities. These files are
b. cookies.
Because of the loss of significant amounts of revenue as a result of unauthorized digital downloads, file-sharing has created problems for
a. the motion picture industry.
b. recording artists and their labels.
c. the companies that distribute file-sharing software.
The employees of The Car Company share company-related resources among multiple computers without requiring a central network server. This is
c. cloud computing.
InfoFree Inc. makes and sells devices and services for the circumvention of encryption software and other technological antipiracy protection. Under the Digital Millennium Copyright Act, this is
a violation of copyright law.
Omni Corporation provides cell phones, laptops, and tablets for its employees to use “in the ordinary course of its business.” Omni intercepts the employees’ business communications made on these devices. This is
excluded from the coverage of the Electronic Communications Privacy Act.
Dana downloads music into her computer’s random access memory, or RAM, without authorization. This is
copyright infringement.
Keisha is an employee of Leeway Corporation. She uses social media in a way that violates her employer’s stated social media policies. Leeway first disciplines its employee and then, after a second transgression, fires her. This is
within Leeway’s rights as an employer.
Employees, clients, and others with authorization use World Transport Corporation’s network around the globe to share computer files. This is
a distributed network.
Oversight Corporation monitors employees’ electronic communications made in the ordinary course of business. This is
a “business-extension exception” under the Electronic Communications Privacy Act
Stefano transfers copyrighted music recordings, without the copyright owners’ authorization, to his friends. This is
copyright infringement.
Eve and other users of Facebook and other social networking sites post trademarked images and copyrighted materials on these sites without permission. This is
a violation of the intellectual property rights of the owners of the images and materials.
Stig includes in his song “Sneaky” a few seconds of Wily’s copyrighted sound recording “Wits” without permission. Some federal courts have found that such digital sampling is
a. violation of copyright law.
b. a “fair use” exception to the provisions of the act.
c. not a “fair use” exception to the provisions of the act.
Riley obtains permission from Saga Company to use the firm’s game app on Riley’s smartphone, tablet, and other mobile device. But Riley does not obtain ownership rights in the app. This is
license