Business Law Ch. 6: Internet Law, Social Media, and Privacy

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Cloud Computing

the delivery to users of on-demand services from third-party servers over a network

2
New cards

Cookie

a small file sent from a website and stored in a user’s Web browser to track the user’s Web browsing activities

3
New cards

Cybersquatting

the act of registering a domain name that is the same as, or confusingly similar to, the trademark of another and then offering to sell that domain name back to the trademark owner

4
New cards

Cyber Tort

a tort committed via the Internet

5
New cards

distributed network

a network that can be used by persons located (distributed) around the country or the globe to share computer files

6
New cards

domain name

the series of letters and symbols used to identify a site operator on the Internet (an Internet address)

7
New cards

goodwill

in the business context, the valuable reputation of a business viewed as an intangible asset

8
New cards

Internet service provider (ISP)

a business or organization that offers users access to the Internet and related services

9
New cards

peer-to-peer (P2P) networking

the sharing of resources among multiple computer or other devices without the requirement of a central network server

10
New cards

Social media

forms of communication through which users create and share information, ideas, messages, and other content via the Internet

11
New cards

Spam

bulk, unsolicited (junk) e-mail

12
New cards

typosquatting

a form of cybersquatting that relies on mistakes, such as typographical errors, made by Internet users when entering information into a Web browser

13
New cards

three-quarters

Unsolicited junk e-mail accounts for about … of all emails.

14
New cards

The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

two laws enacted to prohibit false and deceptive emails from originating in the U.S.

15
New cards

The U.S. Safe Web Act

allows U.S. authorities to cooperate and share information with foreign agencies in investigating and prosecuting those involved in in spamming, spyware, and various Internet frauds and deceptions

16
New cards

The Internet Corporation for Assigned Names and Numbers (ICANN)

oversees the distribution of domain names and has expanded the available domain names to include new generic top-level domain names

17
New cards

Anti-cybersquatting legislation

makes the practice of cybersquatting illegal if the one registering, trafficking in, or using the domain name as “bad faith intent” to profit from the mark

18
New cards

Meta Tags

search engines compile their results by looking through a website’s key words or …

19
New cards

Trademark dilution

when a trademark is used online, without authorization, in a way that diminishes the distinctiveness of the mark, does not require proof

20
New cards

Licensing

when companies choose to permit others to use their trademarks and other intellectual property

21
New cards

Digital Milennium Copyright Act

protects copyrights online and establishes civil and criminal penalties against anyone who bypasses encryption software or other technologies

22
New cards

File-Sharing

software used to download others’ stored music files or illegally copy movies, usually results in infringement

23
New cards

True

True/False: Law enforcement and administrative agencies now routinely use social media to detect illegal activity or conduct investigations, as do many businesses.

24
New cards

for employees to share information about work

Company-wide social media networks can be used …

25
New cards

Communication Decency Act (CDA)

Internet Service providers generally are not liable for defamatory messages posted by their subscribers

26
New cards

reasonable expectation

To sue for invasion of privacy a person must have a … of privacy in particular situation.

27
New cards

The Electronic Communications Privacy Act (ECPA)

prohibits the intentional interception or disclosure of any wire, oral, or electronic communication

28
New cards

“business extension exception”

The ECPA includes a … that permits employers to monitor employees’ electronic communications made in ordinary course of business

29
New cards

The Stored Communications Act (SCA)

part of the ECPA and prohibits intentional unauthorized access to stored electronic communications (such as back up data stored by employer)

30
New cards

Company Internet Privacy Policies

typically inform users what types of data they are gathering and for what purposes it will be used