Ethics & Law in IT Test 2

without reasonable expectation of privacy, there is no privacy right.

In the context of the Fourth Amendment, the courts have ruled that

Gramm-Leach-Bliley Act

Under the ___, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

protected by the Bill of Rights

The concept of privacy is

written consent

The Health Insurance Portability and Accountability Act requires healthcare providers to obtain ___ from patients prior to disclosing any information in their medical records.

does not cover the dissemination of information to children.

The Children's Online Privacy Protection Act

Electronic Communications Privacy Act

Title I of the ___ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the internet.

Electronic Communications Privacy Act

The ___ prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards and social networking sites.

Communications Assistance for Law Enforcement Act

Under the ___, the federal Communications Commission responded to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wireta

USA PATRIOT Act

The ___ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records.

Fair Credit Reporting Act

The ___ outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data

trap and trace

A(n) ___ is a device that records the originating number of incoming calls for a particular phone number.

European Union Data Protection Directive

The ___ bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries.

event data recorder

One purpose of a(n)___ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

Gramm-Leach-Bliley Act

The ___ is an act that repealed a depression-era law known as Glass-Steagall.

Freedom of Information Act

The ___ enables the public to gain access to certain government records.

Safeguards Rule

The ___ requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data.

evidence

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain ___ from the other party by various means.

Fourth Amendment

The ___ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

Fair and Accurate Credit Transactions Act

The ___ allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies.

Family Educational Rights and Privacy Act

The ___ presumes that a student's records are private and not available to the public without the consent of the student.

Truth

___ is an absolute defense against a charge of defamation.

Remailers

Which of the following can provide a virtually untraceable level of anonymity to email messages?

Communications Decency Act

Section 230 of the ___ provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider.

Internet filters

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify ___.

defamation

Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of ___.

defamation

The Supreme Court has held that obscene speech and ___ are not protected by the First Amendment and may be forbidden by the government.

Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?

anonymity

Despite the importance of ____ in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights.

A John Doe lawsuit

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

The problem with the CDA was its broad language and vague definition of "indecency", a standard that was left to individual communities to determine.

Which of the following statements is true of Communications Decency Act (CDA)?

subpoenas requesting the identity of anonymous Web posters

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to ___.

public schools and universities

Although they may implement a speech code, ___ are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint.

extradited

U.S. laws do not allow a person to be ___ for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country.

created a hostile work environment

If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has __.

Internet censorship

___ is the control or suppression of the publishing or accessing of information on the Internet.

First

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the __ Amendment.

Internet filter

A(n) ___ is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material.

Anonymous expression

___ allows people to state their opinions without revealing their identity.

Doxing

___ involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster.

slander

An oral defamatory statement is called ___.

inventions

Patent law protects

Reverse engineering

____ is the process of taking something apart in order to understand it, build a copy of it, or improve it.

Prior art

___ is the existing body of knowledge available to a person of ordinary skill in the art.

Three

The U.S. Supreme Court has ruled that there are ___ classes of items that cannot be patented.

The US Constitution

Copyright and patent protection was established through ___.

USPTO

A patent is a grant of a property right issued by the ___ to an inventor.

expression

The concept that an idea cannot be copyrighted but the ___ of an idea can be is key to understanding copyright protection.

decompiler

A(n) ___ can read the machine language of a software program and produce the source code.

non-compete agreement

A(n) ___ prohibits a departing employee from working for any competitors for a period of time.

Digital Millennium Copyright Act (DMCA)

Unlike traditional copyright law, the ___ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.

Fair use doctrine

___ allows portions of copyrighted materials to be used without permission under certain circumstances.

be obvious to a person having ordinary skill in the same field

One of the tests that an invention must pass to be eligible for a patent is that it must ___.

software patent

A ___ claims as its invention some feature or process embodied in instructions executed by a computer.

open source license

The redistribution of a program code with no copyright as a proprietary software can be avoided by using a(n) _____.

there is no need to file an application or disclose a trade secret to gain protection

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ___ .

trademark

A(n) ___ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.

register domain names for famous trademarks or company names to which they have no connection

Cybersquatters ___.

enable interoperability

The courts have ruled in favor of using reverse engineering to ___.

competitive intelligence

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ___.

Plagiarism

___ is the act of stealing someone's ideas or words and passing them off as one's own.

without reasonable expectation of privacy, there is no privacy right.

In the context of the Fourth Amendment, the courts have ruled that

Gramm-Leach-Bliley Act

Under the ___, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

protected by the Bill of Rights

The concept of privacy is

written consent

The Health Insurance Portability and Accountability Act requires healthcare providers to obtain ___ from patients prior to disclosing any information in their medical records.

does not cover the dissemination of information to children.

The Children's Online Privacy Protection Act

Electronic Communications Privacy Act

Title I of the ___ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the internet.

Electronic Communications Privacy Act

The ___ prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards and social networking sites.

Communications Assistance for Law Enforcement Act

Under the ___, the federal Communications Commission responded to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wireta

USA PATRIOT Act

The ___ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records.

Fair Credit Reporting Act

The ___ outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data

trap and trace

A(n) ___ is a device that records the originating number of incoming calls for a particular phone number.

European Union Data Protection Directive

The ___ bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries.

event data recorder

One purpose of a(n)___ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

Gramm-Leach-Bliley Act

The ___ is an act that repealed a depression-era law known as Glass-Steagall.

Freedom of Information Act

The ___ enables the public to gain access to certain government records.

Safeguards Rule

The ___ requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data.

evidence

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain ___ from the other party by various means.

Fourth Amendment

The ___ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

Fair and Accurate Credit Transactions Act

The ___ allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies.

Family Educational Rights and Privacy Act

The ___ presumes that a student's records are private and not available to the public without the consent of the student.

Truth

___ is an absolute defense against a charge of defamation.

Remailers

Which of the following can provide a virtually untraceable level of anonymity to email messages?

Communications Decency Act

Section 230 of the ___ provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider.

Internet filters

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify ___.

defamation

Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of ___.

defamation

The Supreme Court has held that obscene speech and ___ are not protected by the First Amendment and may be forbidden by the government.

Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?

anonymity

Despite the importance of ____ in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights.

A John Doe lawsuit

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

The problem with the CDA was its broad language and vague definition of "indecency", a standard that was left to individual communities to determine.

Which of the following statements is true of Communications Decency Act (CDA)?

subpoenas requesting the identity of anonymous Web posters

The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to ___.

public schools and universities

Although they may implement a speech code, ___ are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint.

extradited

U.S. laws do not allow a person to be ___ for engaging in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country.

created a hostile work environment

If an employee sees a coworker viewing porn on a workplace computer, that employee may be able to claim that the company has __.

Internet censorship

___ is the control or suppression of the publishing or accessing of information on the Internet.

First

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under the __ Amendment.

Internet filter

A(n) ___ is software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material.

Anonymous expression

___ allows people to state their opinions without revealing their identity.

Doxing

___ involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster.

slander

An oral defamatory statement is called ___.

inventions

Patent law protects

Reverse engineering

____ is the process of taking something apart in order to understand it, build a copy of it, or improve it.

Prior art

___ is the existing body of knowledge available to a person of ordinary skill in the art.

Three

The U.S. Supreme Court has ruled that there are ___ classes of items that cannot be patented.

The US Constitution

Copyright and patent protection was established through ___.

USPTO

A patent is a grant of a property right issued by the ___ to an inventor.

expression

The concept that an idea cannot be copyrighted but the ___ of an idea can be is key to understanding copyright protection.

decompiler

A(n) ___ can read the machine language of a software program and produce the source code.

non-compete agreement

A(n) ___ prohibits a departing employee from working for any competitors for a period of time.

Digital Millennium Copyright Act (DMCA)

Unlike traditional copyright law, the ___ does not govern copying; instead, it focuses on the distribution of tools and software that can be used for copyright infringement as well as for legitimate non-infringing use.

Fair use doctrine

___ allows portions of copyrighted materials to be used without permission under certain circumstances.

be obvious to a person having ordinary skill in the same field

One of the tests that an invention must pass to be eligible for a patent is that it must ___.

software patent

A ___ claims as its invention some feature or process embodied in instructions executed by a computer.

open source license

The redistribution of a program code with no copyright as a proprietary software can be avoided by using a(n) _____.

there is no need to file an application or disclose a trade secret to gain protection

One key advantage that trade secret law has over the use of patents and copyrights in protecting companies from losing control of their intellectual property is ___ .

trademark

A(n) ___ is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company's products from another's.

register domain names for famous trademarks or company names to which they have no connection

Cybersquatters ___.

enable interoperability

The courts have ruled in favor of using reverse engineering to ___.

competitive intelligence

Legally obtained information that is gathered to help a company gain an advantage over its rivals is called ___.

Plagiarism

___ is the act of stealing someone's ideas or words and passing them off as one's own.