Chap027 - Chapter 027 : Computer Privacy Chapter 027 :...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 027 : Computer Privacy and Speech Chapter 027 : Computer Privacy and Speech Student: ___________________________________________________________________________ 1. While there are currently no federal laws prohibiting the use of cookies when gathering information regarding adults, the Children's Online Privacy Protection Act prohibits this practice when minors are involved, unless there is parental consent. BT: Knowledge PO: 1 True False 2. The Electronic Communications Privacy Act (ECPA) makes it a federal crime to monitor e-mail during real time, that is, when it is being sent or received. BT: Knowledge PO: 1 True False 3. Even if an employer promises not to read the employee's e-mail messages, courts in some states have still ruled that the promise does not create a reasonable expectation of privacy. BT: Knowledge PO: 1 True False 4. Transferring funds from one bank account to another, changing students' grades in college computer files, and crediting accounts for purchases made are not instances of unauthorized use of computers. BT: Knowledge PO: 2 True False 5. It is not a crime under the ECPA to disclose to a third party the contents of stored computer information that has been obtained without permission. BT: Knowledge PO: 3 True False
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6. Under the ECPA there must be intent to exceed authorization for a crime to be committed; the Computer Fraud and Abuse Act (CFAA) also requires such intent if the intrusion onto another person's computer stored information causes damage. BT: Knowledge PO: 3 True False 7. Federal criminal statutes are not used to prosecute computer crime. BT: Knowledge PO: 3 True False 8. The laws governing online gambling vary from state to state, and most states have pending regulations that would severely restrict how and when such gambling may take place. BT: Knowledge PO: 3 True False 9. The rules relating to legal purpose and competent parties in contract law do not apply to agreements made in the form of wagers placed online. BT: Knowledge PO: 3 True False 10. Defamatory statements would include slander but not libel. BT: Knowledge PO: 4 True False 11. The rules of defamation vary depending on whether one is or is not a public figure. BT: Knowledge PO: 4 True False
Background image of page 2
12. When individuals learn that someone has posted an untruth about them, especially when such untruth harms them professionally, they often attempt to hold their ISP liable. BT: Knowledge PO: 4 True False 13. Spam is undesirable because it can drain an ISP's resources, strain network bandwidth, and clog a user's e- mail folders. BT: Knowledge PO: 4 True False 14. Sometimes pictures that are contained on Web sites are alleged to be defamatory.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/25/2011 for the course GENB 4350 taught by Professor Louis during the Spring '11 term at Houston Baptist.

Page1 / 17

Chap027 - Chapter 027 : Computer Privacy Chapter 027 :...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online