Filters
Question type

Study Flashcards

Sonya and other employees of TransGlobal Inc. maintain a password-protected social media page on which they post comments on work-related issues. The posts range from positive to negative, supporting the page's purpose to "vent about work." When TransGlobal learns of the page, the company intimidates Sonya into revealing the password, and after reviewing the posts, fires her and the other participants. Which federal law discussed in this chapter most likely applies to this situation? Has this law been violated? Discuss.

Correct Answer

verifed

verified

The federal law discussed in this chapte...

View Answer

BeFriends Corporation uses the trademark of Community Life Inc., a social media site, as a meta tag without Community Life's permission. This may be permissible


A) if the appropriating site has nothing to do with the meta tag.
B) if the two sites appear in the same search engine results.
C) if the use constitutes trademark infringement.
D) in none of these circumstances.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Prodigious Profit, LLC, and other companies operate social media Web sites, issue apps for mobile devices, obtain ad revenue from search engines, and sell directly to consumers from other sites. The privacy rights of the users of these products are frequently defined, not by the courts or legislatures, but by


A) the companies that own the sites and the apps.
B) retailers who have had to change their procedures to compete.
C) spammers, cybersquatters, and typosquatters.
D) Internet service providers.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Pia registers a domain name-qualitytires.com-that is confusingly similar to the trademark of Quality Tires Inc. Pia has a "bad faith intent" to profit from the mark by selling the name to Quality Tires. This is


A) a legitimate business practice.
B) illegal.
C) a bid to obtain a license.
D) trademark dilution.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Cybersquatting occurs when the owner of a trademark registers the mark as a domain name but does not use it for that purpose.

A) True
B) False

Correct Answer

verifed

verified

In posting statements or photos to a social media site, a person clearly has a reasonable expectation of privacy.

A) True
B) False

Correct Answer

verifed

verified

Under the Communications Decency Act, Internet service providers are liable as publishers of defamatory statements that come from a third party.

A) True
B) False

Correct Answer

verifed

verified

A social media post cannot be used to invalidate a settlement agreement.

A) True
B) False

Correct Answer

verifed

verified

Odell is an employee of Packing Corporation. She uses social media in a way that violates her employer's stated social media policies. Packing disciplines Odell and then, after a second transgression, fires her. This is


A) a violation of the Stored Communications Act.
B) within the employer's rights.
C) a subject for dispute resolution by social media.
D) a "business-extension exception" under the Electronic Communications Privacy Act.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Anyone can circumvent encryption software or other technological antipiracy protection without penalty.

A) True
B) False

Correct Answer

verifed

verified

Online conduct gives rise to only a narrow variety of legal actions.

A) True
B) False

Correct Answer

verifed

verified

The employees of Eco Engineering Inc. share company-related resources among multiple computers without requiring a central network server. This is


A) digital sampling.
B) cybersquatting.
C) cloud computing.
D) peer-to-peer (P2P) networking.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 72 of 72

Related Exams

Show Answer