Name: Business Law Chapter 19 Study Guide True/False Indicate whether the statement is true or false. 1. Cyberlaw merges concepts and doctrines from many legal fields and puts them in the context of computers. 2. An illegal activity already in the criminal code committed by using a computer is called cyberspoofing. 3. The Digital Millennium Copyright Act makes it legal to copy computer programs that were previously copyrighted. 4. Computer users who spend time in chat rooms are very vulnerable to cyberpiracy. 5. Identity thieves often target your credit card account, and it can take years to fix the problem once they have stolen your identity. 6. When cybervandalism is done as a prank, it is not considered a crime. 7. The two most common types of cybertorts are cyberdefamation and cyberinvasion of privacy. 8. The Communications Decency Act protects Internet providers from being held liable for any cyberdefamation performed by users of their services. 9. Your employer can monitor the e-mail you send from your computer at work if you consent. 10. Once Congress passed the E-sign Act, digital signatures were considered legal. Multiple Choice Identify the choice that best completes the statement or answers the question. 11. The No Electronic Theft Act of 1997 provides prison terms and fines for anyone who a. steals someone’s debit card and uses it. b. uses a piece of copyrighted software before it is sold to the public. c. creates an electronic duplicate of a copyrighted work for profit. d. uses someone else’s digital signature. 12. A domain name is the a. server where a Web site is located. b. trademark used on a business Web site. c. copyrighted name of a business. d. Internet address of a business. 13. The Uniform Computer Information Transactions Act a. allows duplicate domain names as long as the business is in a different state. b. protects the patents of software programmers. c. requires government agencies to use the same computer system. d. governs the law for cybercontracts. 14. Cyberspoofing is a crime in which a person a. creates a virus to disrupt someone else’s computer network. b. commits cyberextortion or blackmail. c. falsely adopts the identity of someone else in order to commit fraud. d. uses a computer to steal data stored in digital format. 15. Firewalls and anti-virus software are specifically designed to protect your computer from acts of a. cybergerm warfare. c. cyberterrorism. b. cybertorts. d. identity theft. 16. The Electronic Communications Privacy Act a. protects your medical records from being transmitted electronically. b. restricts the unauthorized access of e-mail and instant messaging. c. protects your banking and other financial records from unauthorized users. d. prevents the use of an electronic device that can falsely damage a person’s reputation. 17. A legal protection for literary, artistic, and scientific works is called a a. domain. c. patent. b. copyright. d. trademark. 18. A distinctive name, word, symbol, image, or slogan used by a business for identity purposes is called a a. domain name. b. patent. c. trademark. d. copyright. 19. Cybercontract law deals with a. jurisdictional issues related to e-commerce. b. digital music and videos broadcast online. c. contracts that are printed from a computer. d. the buying and selling of computers and computer programs. 20. If someone creates a phony Web site that simulates a real bank and sends false e-mails, it is called a. cyberblackmail. c. cyberspoofing. b. cyberphishing. d. cyberpiracy. Completion Complete each statement. 21. ____________________ is using a computer to steal someone’s financial, educational, or other personal data. 22. When someone disrupts the nation’s ____________________ by using a computer, it is called cyberterrorism. 23. ____________________ makes Internet transactions secure by encoding the data in such a way that only authorized persons can read it. 24. A copyright extends for the creator’s life plus ____________________ years. 25. A(n) ____________________ is someone who registers a trade name as a domain name with no intent to use it. Instead, he or she asks for a large sum of money to sell the name back to the real owner. 26. The Uniform Computer Information Transactions Act governs the law for ____________________, including software agreements and maintenance contracts. 27. ____________________ might destroy a business’s Web site as an act of revenge. 28. The invasion or theft of data stored in a computer for the purpose of committing a tort is called a(n) ____________________. 29. Internet sellers who do not have a store or office in a particular state cannot be ____________________ by that state. Matching Match each term with its definition. a. cyberlaw f. b. cybercrime g. c. cybertrespass h. d. cyberspoofing i. e. cyberpiracy j. cyberblackmail cyberdefamation cybervandalism cybertort cyberinvasion of privacy 30. Phishing is an example of this type of crime 31. Often involve employees who work closely with confidential files 32. Damaging or destroying a Web site or computer network 33. The area of law connected to computers and computer-related crimes 34. Sometimes called cyberextortion 35. Congress passed the Digital Millennium Copyright Act to combat this type of crime 36. Any criminal activity associated with a computer 37. May involve sending out e-mails that contain false information about a company 38. The invasion, theft, falsification, or misuse of data stored in a computer to commit a tort 39. Any illegal activity already in the criminal code committed by using a computer Short Answer 40. Which of the computer laws that you studied in Chapter 19 do you think is the most important? Explain why. Business Law Chapter 19 Study Guide True/False Indicate whether the statement is true or false. 1. Cyberlaw merges concepts and doctrines from many legal fields and puts them in the context of computers. 2. An illegal activity already in the criminal code committed by using a computer is called cyberspoofing. 3. The Digital Millennium Copyright Act makes it legal to copy computer programs that were previously copyrighted. 4. Computer users who spend time in chat rooms are very vulnerable to cyberpiracy. 5. Identity thieves often target your credit card account, and it can take years to fix the problem once they have stolen your identity. 6. When cybervandalism is done as a prank, it is not considered a crime. 7. The two most common types of cybertorts are cyberdefamation and cyberinvasion of privacy. 8. The Communications Decency Act protects Internet providers from being held liable for any cyberdefamation performed by users of their services. 9. Your employer can monitor the e-mail you send from your computer at work if you consent. 10. Once Congress passed the E-sign Act, digital signatures were considered legal. Multiple Choice Identify the choice that best completes the statement or answers the question. 11. The No Electronic Theft Act of 1997 provides prison terms and fines for anyone who a. steals someone’s debit card and uses it. b. uses a piece of copyrighted software before it is sold to the public. c. creates an electronic duplicate of a copyrighted work for profit. d. uses someone else’s digital signature. 12. A domain name is the a. server where a Web site is located. b. trademark used on a business Web site. c. copyrighted name of a business. d. Internet address of a business. 13. The Uniform Computer Information Transactions Act a. allows duplicate domain names as long as the business is in a different state. b. protects the patents of software programmers. c. requires government agencies to use the same computer system. d. governs the law for cybercontracts. 14. Cyberspoofing is a crime in which a person a. creates a virus to disrupt someone else’s computer network. b. commits cyberextortion or blackmail. c. falsely adopts the identity of someone else in order to commit fraud. d. uses a computer to steal data stored in digital format. 15. Firewalls and anti-virus software are specifically designed to protect your computer from acts of a. cybergerm warfare. b. cybertorts. c. cyberterrorism. d. identity theft. 16. The Electronic Communications Privacy Act a. protects your medical records from being transmitted electronically. b. restricts the unauthorized access of e-mail and instant messaging. c. protects your banking and other financial records from unauthorized users. d. prevents the use of an electronic device that can falsely damage a person’s reputation. 17. A legal protection for literary, artistic, and scientific works is called a a. domain. c. patent. b. copyright. d. trademark. 18. A distinctive name, word, symbol, image, or slogan used by a business for identity purposes is called a a. domain name. c. trademark. b. patent. d. copyright. 19. Cybercontract law deals with a. jurisdictional issues related to e-commerce. b. digital music and videos broadcast online. c. contracts that are printed from a computer. d. the buying and selling of computers and computer programs. 20. If someone creates a phony Web site that simulates a real bank and sends false e-mails, it is called a. cyberblackmail. c. cyberspoofing. b. cyberphishing. d. cyberpiracy. Completion Complete each statement. 21. ____________________ is using a computer to steal someone’s financial, educational, or other personal data. 22. When someone disrupts the nation’s ____________________ by using a computer, it is called cyberterrorism. 23. ____________________ makes Internet transactions secure by encoding the data in such a way that only authorized persons can read it. 24. A copyright extends for the creator’s life plus ____________________ years. 25. A(n) ____________________ is someone who registers a trade name as a domain name with no intent to use it. Instead, he or she asks for a large sum of money to sell the name back to the real owner. 26. The Uniform Computer Information Transactions Act governs the law for ____________________, including software agreements and maintenance contracts. 27. ____________________ might destroy a business’s Web site as an act of revenge. 28. The invasion or theft of data stored in a computer for the purpose of committing a tort is called a(n) ____________________. 29. Internet sellers who do not have a store or office in a particular state cannot be ____________________ by that state. Matching Match each term with its definition. a. cyberlaw f. cyberblackmail b. cybercrime g. cyberdefamation c. cybertrespass d. cyberspoofing e. cyberpiracy h. cybervandalism i. cybertort j. cyberinvasion of privacy 30. Phishing is an example of this type of crime 31. Often involve employees who work closely with confidential files 32. Damaging or destroying a Web site or computer network 33. The area of law connected to computers and computer-related crimes 34. Sometimes called cyberextortion 35. Congress passed the Digital Millennium Copyright Act to combat this type of crime 36. Any criminal activity associated with a computer 37. May involve sending out e-mails that contain false information about a company 38. The invasion, theft, falsification, or misuse of data stored in a computer to commit a tort 39. Any illegal activity already in the criminal code committed by using a computer Short Answer 40. Which of the computer laws that you studied in Chapter 19 do you think is the most important? Explain why.