Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
98 Cards in this Set
- Front
- Back
Tort law
|
designed to compensate those who have suffered a loss or injury due to another person's wrongful act
|
|
Compensatory Damages
|
intended to compensate or reimburse a plaintiff for actual losses—that is, to make the plaintiff whole and put her or him in the same position that she or he would have been in had the tort not occurred. Compensatory damages awards are often broken down into special damages and general damages.
|
|
Punitive Damages
|
in tort cases to punish the wrongdoer and deter others from similar wrongdoing. Punitive damages are appropriate only when the defendant's conduct was particularly egregious or reprehensible
|
|
Intentional tort
|
A tort that requires intent
|
|
Tortfeasor
|
The person that commits the tort
|
|
Assault
|
any intentional and unexcused threat of immediate harmful or offensive contact, including words or acts that create in another person a reasonable apprehension of harmful contact.
|
|
Battery
|
an unexcused and harmful or offensive physical contact intentionally performed
|
|
Actionable
|
capable of serving as the ground for a lawsuit
|
|
Defamation
|
Wrongfully hurting a person's good reputation. The law imposes a general duty on all persons to refrain from making false, defamatory statements of fact about others
|
|
Libel
|
general duty on all persons to refrain from making false, defamatory statements of fact about others in writing or any other permanent form
|
|
Slander
|
general duty on all persons to refrain from making false, defamatory statements of fact about others orally
|
|
Priviledge
|
Qualified or conditional; gives the person making the statement immunity from possible consequences of such speech
|
|
Public figures
|
Public officials who exercise substantial governmental power and any persons in the public limelight
|
|
Actual malice
|
a statement must be made with either knowledge of its falsity or a reckless disregard of the truth
|
|
Invasion of privacy (4)
|
1) Appropriation of identity
2) Intrusion into an individual's affairs or seclusion 3) False light 4) Public disclosure of private facts |
|
Appropriation
|
The use of another person's name, likeness, or other identifying characteristic, without permission and for the benefit of the user
|
|
Fraudulent misrepresentation (5)
|
1) A misrepresentation of material facts or conditions with knowledge that they are false or with reckless disregard for the truth.
2) An intent to induce another party to rely on the misrepresentation. 3) A justifiable reliance on the misrepresentation by the deceived party. 4) Damages suffered as a result of that reliance. A causal connection between the misrepresentation and the injury suffered. |
|
Puffery
|
seller's talk
|
|
Business torts
|
Apply only to wrongful interferences with the business rights of others. Business torts generally fall into two categories—interference with a contractual relationship and interference with a business relationship.
|
|
Trespasses to land
|
occurs any time a person, without permission, enters onto, above, or below the surface of land that is owned by another; causes anything to enter onto the land; or remains on the land or permits anything to remain on it.
|
|
Trespasses to personal property
|
Whenever any individual wrongfully takes or harms the personal property of another or otherwise interferes with the lawful owner's possession and enjoyment of personal property
|
|
Conversion
|
Whenever a person wrongfully possesses or uses the personal property of another without permission
|
|
Disparagement of property
|
Disparagement of property occurs when economically injurious falsehoods are made about another's product or property rather than about another's reputation. General term for torts that can be more specifically referred to as slander of quality or slander of title.
|
|
Slander of quality/trade libel
|
publication caused a third person to refrain from dealing with the plaintiff and that the plaintiff sustained economic damages (such as lost profits) as a result.
|
|
Slander of title
|
When a publication falsely denies or casts doubt on another's legal ownership of property, resulting in financial loss to the property's owner
|
|
Cyber torts
|
Torts committed via the Internet
|
|
Spam
|
unsolicited "junk e-mails" that flood virtual mailboxes with advertisements, solicitations, and other messages
|
|
Negligence (& 4)
|
When someone suffers an injury because of another's failure to live up to a required duty of care
1. Duty 2. Breach 3. Causation 4. Damages |
|
Duty of care
|
People are free to act as they do as long as their actions do not infringe on the interests of others
|
|
Reasonable personal standard
|
How a reasonable person would have acted under the circumstances in question
|
|
Business invitees
|
Explicitly or implicitly invited persons to a business's premises
|
|
Malpractice
|
Professional negligence
|
|
Causation in fact
|
Did the injury occur because of a defendant's action?
Use the "but for" test |
|
Proximate cause
|
Legal cause, when the connection between an act and an injury is strong enough to justify imposing liability
|
|
Assumption of risk (2)
|
1. Knowledge of risk
2. Voluntary assumption of risk |
|
Superseding cause
|
An unforeseeable intervening event that breaks the casual connection between a wrongful act and an injury
|
|
Contributory negligence
|
A plaintiff who is also negligent cannot recover anything from the defendant
|
|
Comparative negligence
|
Enables both the plaintiff and the defendant's negligence to be computed and the liability for damages distributed accordingly
|
|
Res Ipsa Loquitor
|
"the facts speak for themselves"
|
|
Negligence per se
|
if an individual violates a statute or an ordinance providing for a criminal penalty and that violation causes another to be injured
|
|
Good Samaritan statutes
|
Someone who is aided voluntarily by another person cannot turn around and sue the "good samaritan" for negligence
|
|
Dram shop acts
|
Bar owners or bartenders can be held liable for injuries caused by a person that became intoxicated while being served at that establishment
|
|
Strict liability
|
A person who engages in certain activities can be held responsible for any harm that results to others even if the person used the utmost care
|
|
Intellectual property
|
any property that results from intellectual, creative processes
|
|
Trademark
|
a distinctive mark, motto, device, or implement that a manufacturer stamps, prints, or otherwise affixes to the goods it produces so that they can be identified on the market and their origins made known
|
|
Dilution
|
Using a mark too similar to one already existing reduces its impact and completion of its purpose
|
|
Service mark
|
a trademark that is used to distinguish the services (rather than the products) of one person or company from those of another
|
|
Certification mark
|
Used by one or more persons, other than the owner, to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services
|
|
Collective mark
|
used by members of a cooperative, association, or other organization
|
|
Trade Dress
|
the image and overall appearance of a product
|
|
Trade name
|
indicate part or all of a business's name, whether the business is a sole proprietorship, a partnership, or a corporation
|
|
Cyber marks
|
Trademarks on the internet
|
|
Domain name
|
part of an Internet address—for example, "westlaw.com."
|
|
Cybersquatting
|
when a person registers a domain name that is the same as, or confusingly similar to, the trademark of another and then offers to sell the domain name back to the trademark owner
|
|
Meta tags
|
key words
|
|
License
|
essentially an agreement, or contract, permitting the use of a trademark, copyright, patent, or trade secret for certain purposes
|
|
Patent
|
a grant from the government that gives an inventor the right to exclude others from making, using, or selling his or her invention for a period of twenty years from the date of filing the application for a patent. Patents for designs, as opposed to those for inventions, are given for a fourteen-year period
|
|
Copyright
|
an intangible property right granted by federal statute to the author or originator of a literary or artistic production of a specified type
|
|
Peer-to-peer networking
|
Rather than going through a central Web server, P2P networking uses numerous personal computers (PCs) that are connected to the Internet. Individuals on the same network can access files stored on one another's PCs
|
|
Distribute Network
|
Parts of the network may be distributed all over the country or the world, which offers an unlimited number of uses. Persons scattered throughout the country or the world can work together on the same project by using file-sharing programs
|
|
Cloud computing
|
a subscription-based or pay-per-use service that extends a computer's software or storage capabilities. Cloud computing can deliver a single application through a browser to multiple users, or it might be a utility program to pool resources and provide data storage and virtual servers that can be accessed on demand
|
|
Trade secret
|
information of commercial value. Trade secrets may include customer lists, plans, research and development, pricing information, marketing methods, production techniques, and generally anything that makes an individual company unique and that would have value to a competitor
|
|
Cyber crime
|
the way in which particular crimes are committed (over the internet)
|
|
Crime
|
a wrong against society. proclaimed in a statute and punishable by a fine and/or imprisonment—or, in some cases, death
|
|
Beyond a reasonable doubt
|
If the jury views the evidence in the case as reasonably permitting either a guilty or a not guilty verdict, then the jury's verdict must be not guilty
|
|
Felonies
|
serious crimes punishable by death or by imprisonment for more than one year
|
|
Misdemeanors
|
less serious crimes, punishable by a fine or by confinement for up to a year
|
|
Petty offenses
|
a subset of misdemeanors. Petty offenses are minor violations, such as jaywalking or violations of building codes
|
|
Mens Rea
|
The required mental state, or intent, is indicated in the applicable statute or law
|
|
Robbery
|
The taking of money, personal property, or any other article of value from a person by means of force or fear-is a violent crime
|
|
Burglary
|
breaking and entering into the dwelling of another at night with the intent to commit a felony
|
|
Larceny
|
the unlawful taking and carrying away of someone else's personal property with the intent to permanently deprive the owner of possession
|
|
Arson
|
The willful and malicious burning of a building (and, in some states, personal property) owned by another
|
|
Forgery
|
The fraudulent making or altering of any writing (including electronic records) in a way that changes the legal rights and liabilities of another
|
|
Embezzlement
|
When a person entrusted with another person's property or funds fraudulently appropriates that property or those funds
|
|
Bribery (&3)
|
offering to give something of value to a person in an attempt to influence that person, who usually is (but not always) a public official, to act in a way that serves a private interest. Three types of bribery are considered crimes: bribery of public officials, commercial bribery, and bribery of foreign officials
|
|
Insider trading
|
securities law prohibits a person who possesses inside information and has a duty not to disclose it to outsiders from trading on that information
|
|
Money laundering
|
an alternative to storing cash from illegal transactions in a safe-deposit box, wrongdoers and racketeers have invented ways to launder "dirty" money to make it "clean."
|
|
Self-Defense
|
Defending oneself against an attacker using either deadly or nondeadly force
|
|
Necessity
|
a criminal act was necessary to prevent an even greater harm
|
|
Duress
|
when the wrongful threat of one person induces another person to perform an act that he or she would not otherwise have performed
|
|
Entrapment
|
a defense designed to prevent police officers or other government agents from enticing persons to commit crimes in order to later prosecute them for those crimes
|
|
Immunity
|
A person will not be charged with a crime in exchange for information at the discretion of the prosecutor
|
|
Plea bargaining
|
The prosecution drops the charges down to a lesser infraction in order to obtain information about accomplices or another crime
|
|
Double Jeopardy
|
trying someone twice for the same criminal offense
|
|
Exclusionary rule
|
any evidence obtained in violation of the constitutional rights spelled out in the Fourth, Fifth, and Sixth Amendments generally is not admissible at trial
|
|
Indictment
|
Individuals must be formally charged with having committed specific crimes before they can be brought to trial. If issued by a grand jury, such a charge is called an indictment
|
|
Information
|
criminal complaint
|
|
Computer crime
|
any violation of criminal law that involves knowledge of computer technology for its perpetration, investigation, or prosecution
|
|
Cyber fraud
|
fraud committed over the Internet
|
|
Identity theft
|
when the wrongdoer steals a form of identification—such as a name, date of birth, or Social Security number—and uses the information to access the victim's financial resources
|
|
Phishing
|
the perpetrator "fishes" for financial data and passwords from consumers by posing as a legitimate business, such as a bank or credit-card company. The "phisher" sends an e-mail asking the recipient to update or confirm vital information, often with the threat that an account or some other service will be discontinued if the information is not provided. Once the unsuspecting individual enters the information, the phisher can use it to masquerade as that person or to drain his or her bank or credit account
|
|
Vishing
|
When phishing involves some form of voice communication
|
|
Hacker
|
someone who uses one computer to break into another
|
|
Botnets
|
networks of computers that have been appropriated by hackers without the knowledge of their owners
|
|
Worm
|
a software program that is capable of reproducing itself as it spreads from one computer to the next
|
|
Virus
|
malware, is also able to reproduce itself, but must be attached to an "infested" host file to travel from one computer network to another
|
|
Cyberterrorists
|
hackers who, rather than trying to gain attention, strive to remain undetected so that they can exploit computers for a serious impact
|