Unit 7 and 8 Intro to Law Test Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

96 Terms

1
New cards

Contract

A two party promise enforceable by law, formed voluntarily to protect both parties; may be verbal or written.

2
New cards

Examples of Contracts

Marriage, employment, lease, insurance, and financial agreements.

3
New cards

Offer

A proposal made with serious intent, communicated directly, definite, and not a joke or social agreement.

4
New cards

Objective Intent

The offer must be serious.

5
New cards

Directly Expressed

The offer is communicated directly to the intended offeree.

6
New cards

Not in Jest/Anger/Social

Offer cannot be made jokingly, in anger, or as a social agreement.

7
New cards

Definite Terms

The offer must include details.

8
New cards

Sufficiently Clear

The offer must sound like an actual offer.

9
New cards

Not an Advertisement

Ads are invitations to negotiate, not offers.

10
New cards

Revocation

Offeror withdraws the offer before acceptance.

11
New cards

Rejection

Offeree declines the offer.

12
New cards

Stated Time Lapses

Offer expires when the stated time ends.

13
New cards

Counteroffer

Any change to the offer that terminates the original offer.

14
New cards

Incapacitation

One party becomes unable to respond.

15
New cards

Destruction of Subject Matter

The item or subject involved in the offer is destroyed.

16
New cards

Acceptance

Direct communication agreeing to the offer with no changes.

17
New cards

Mirror Image Rule

Acceptance must match the offer exactly.

18
New cards

Silence Not Acceptance

Silence cannot be treated as agreement.

19
New cards

Clickwrap Agreements

Agreements accepted by clicking an on

20
New cards

Valid Clickwrap Requirements

Must be visible, require active consent, easy to understand, and enforceable.

21
New cards

Mailbox Rule

Acceptance is effective when mailed, not when received.

22
New cards

Oral Acceptance

Effective when spoken directly to the offeror.

23
New cards

Fax Acceptance

Preferred communication method for businesses.

24
New cards

Customary Method

Use the acceptance method stated in the offer.

25
New cards

Verbal Acceptance

Spoken agreement.

26
New cards

Genuine Assent

True agreement with no duress, mistake, misrepresentation, or fraud.

27
New cards

Duress

Using force or threats to coerce an agreement.

28
New cards

Economic Duress

Unfair financial pressure used to force agreement.

29
New cards

Mutual Mistake

Both parties misunderstand an important fact.

30
New cards

Unilateral Mistake

Only one party is mistaken.

31
New cards

Undue Influence

Using power or trust to pressure someone into a contract.

32
New cards

Innocent Misrepresentation

Unintentional false statement of fact that is material and relied upon.

33
New cards

Active Concealment

Hiding a problem intentionally.

34
New cards

Fraudulent Misrepresentation

Intentional false statement causing financial harm; allows suing for damages.

35
New cards

Right of Rescission

The right to cancel a contract.

36
New cards

Ratification

Legally binding approval of a contract.

37
New cards

Legal Purpose

The purpose of the contract must be lawful.

38
New cards

Unconscionable Clause

Extremely unfair term in a contract.

39
New cards

Usury Laws

Set maximum legal interest rates.

40
New cards

Price Fixing

Businesses agreeing to charge the same high price.

41
New cards

Non Compete Agreement

Prevents employees from joining competitors or sharing secrets.

42
New cards

Exculpatory Clause

Liability waiver; cannot protect against negligence.

43
New cards

Consideration

Both sides give up something and receive something of value.

44
New cards

No Consideration

If something is free, there is no enforceable exchange.

45
New cards

Non Monetary Consideration

Something of value that is not money.

46
New cards

Capacity

Both parties must be willing and competent.

47
New cards

Voidable Contracts

Contracts involving minors, mentally incompetent persons, or intoxicated individuals.

48
New cards

Disaffirming a Contract

Cancelling a contract due to lack of capacity.

49
New cards

Verbal Contracts

Valid but less reliable than written contracts.

50
New cards

Benefits of Written Contracts

Provide clarity, proof, and enforceability.

51
New cards

Statute of Frauds

Requires written contracts for long

52
New cards

Electronic Signatures

Legally valid but not required to be accepted.

53
New cards

E Signature Exempt Documents

Wills, trusts, adoptions, divorces, foreclosures, insurance cancellations.

54
New cards

Breach of Contract

Failure to perform contractual obligations.

55
New cards

Ways to Breach

Not performing, making performance impossible, or refusing to perform.

56
New cards

Non Breaching Party Options

Urge reconsideration, use ADR, or sue for damages.

57
New cards

Cyber Law

Law governing Internet use and digital technologies.

58
New cards

Cyber Crime

Crime where a computer is the target or the weapon.

59
New cards

Cyber Harassment

Using a computer to harass or post private info about someone.

60
New cards

Identity Theft

Using someone else’s personal information for gain.

61
New cards

Hacking

Breaking into a computer or network.

62
New cards

Computer Virus Transmission

Sending malicious code to cause damage.

63
New cards

Copyright Infringement

Using creative work without permission.

64
New cards

Crimes Against Government

Cyberterrorism, cyberwarfare, accessing classified information.

65
New cards

Pirating Software

Illegally copying or distributing software.

66
New cards

Cybersecurity Attack

Attempt to breach information systems.

67
New cards

Malware

Harmful software such as viruses, worms, or trojans.

68
New cards

Phishing

Fraudulent attempts to obtain information through fake emails.

69
New cards

Password Attacks

Attempts to break into accounts via password theft.

70
New cards

Jurisdiction Issues

Difficulty determining which court handles cyber crimes.

71
New cards

International Issues

Criminals may be located in other countries.

72
New cards

Lack of Cyber Laws

No international cyber jurisdiction laws.

73
New cards

Difficulty Collecting Evidence

Digital evidence stored in the cloud is hard to obtain.

74
New cards

Anonymity

Criminals can hide their identities online.

75
New cards

Online Threats

Legally unclear area; context affects interpretation.

76
New cards

First Amendment Online

Most online speech is protected except credible threats.

77
New cards

Context Factor

Social conditions (like school shootings) influence threat assessment.

78
New cards

Intellectual Property

Creations of the mind protected by law.

79
New cards

Copyright

Protects creative works like music, writing, art.

80
New cards

Trademark

Protects brand names, logos, and symbols.

81
New cards

Patent

Protects new inventions.

82
New cards

Trade Secret

Confidential business information like formulas or recipes.

83
New cards

Right to Privacy

Protection from unauthorized access to personal information.

84
New cards

Pharming

Redirecting users to fake websites to steal information.

85
New cards

Email Monitoring

Employers may legally monitor company email.

86
New cards

Employer Social Media Rules

Employers can fire employees for harmful online posts.

87
New cards

Digital Footprints

Employers can check online history before hiring.

88
New cards

Password Privacy Laws

Some states ban employers from requesting passwords.

89
New cards

Cookies

Track, store, and personalize user data on websites.

90
New cards

Cookie Uses

Recognize users, target ads, track viewed items.

91
New cards

Cookie Risks

Can be used to spy on online activity.

92
New cards

Clearing Cookies

Recommended for privacy and security.

93
New cards

No Federal Data Privacy Law

U.S. lacks a single comprehensive privacy law.

94
New cards

Protected Data Types

Children under 13, financial data, and health information.

95
New cards

Identity Theft (Definition)

Using someone’s information without permission for gain or harm.

96
New cards

Spamming

Sending large amounts of unwanted digital messages.