• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/98

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

98 Cards in this Set

  • Front
  • Back
Tort law
designed to compensate those who have suffered a loss or injury due to another person's wrongful act
Compensatory Damages
intended to compensate or reimburse a plaintiff for actual losses—that is, to make the plaintiff whole and put her or him in the same position that she or he would have been in had the tort not occurred. Compensatory damages awards are often broken down into special damages and general damages.
Punitive Damages
in tort cases to punish the wrongdoer and deter others from similar wrongdoing. Punitive damages are appropriate only when the defendant's conduct was particularly egregious or reprehensible
Intentional tort
A tort that requires intent
Tortfeasor
The person that commits the tort
Assault
any intentional and unexcused threat of immediate harmful or offensive contact, including words or acts that create in another person a reasonable apprehension of harmful contact.
Battery
an unexcused and harmful or offensive physical contact intentionally performed
Actionable
capable of serving as the ground for a lawsuit
Defamation
Wrongfully hurting a person's good reputation. The law imposes a general duty on all persons to refrain from making false, defamatory statements of fact about others
Libel
general duty on all persons to refrain from making false, defamatory statements of fact about others in writing or any other permanent form
Slander
general duty on all persons to refrain from making false, defamatory statements of fact about others orally
Priviledge
Qualified or conditional; gives the person making the statement immunity from possible consequences of such speech
Public figures
Public officials who exercise substantial governmental power and any persons in the public limelight
Actual malice
a statement must be made with either knowledge of its falsity or a reckless disregard of the truth
Invasion of privacy (4)
1) Appropriation of identity
2) Intrusion into an individual's affairs or seclusion
3) False light
4) Public disclosure of private facts
Appropriation
The use of another person's name, likeness, or other identifying characteristic, without permission and for the benefit of the user
Fraudulent misrepresentation (5)
1) A misrepresentation of material facts or conditions with knowledge that they are false or with reckless disregard for the truth.

2) An intent to induce another party to rely on the misrepresentation.

3) A justifiable reliance on the misrepresentation by the deceived party.

4) Damages suffered as a result of that reliance.
A causal connection between the misrepresentation and the injury suffered.
Puffery
seller's talk
Business torts
Apply only to wrongful interferences with the business rights of others. Business torts generally fall into two categories—interference with a contractual relationship and interference with a business relationship.
Trespasses to land
occurs any time a person, without permission, enters onto, above, or below the surface of land that is owned by another; causes anything to enter onto the land; or remains on the land or permits anything to remain on it.
Trespasses to personal property
Whenever any individual wrongfully takes or harms the personal property of another or otherwise interferes with the lawful owner's possession and enjoyment of personal property
Conversion
Whenever a person wrongfully possesses or uses the personal property of another without permission
Disparagement of property
Disparagement of property occurs when economically injurious falsehoods are made about another's product or property rather than about another's reputation. General term for torts that can be more specifically referred to as slander of quality or slander of title.
Slander of quality/trade libel
publication caused a third person to refrain from dealing with the plaintiff and that the plaintiff sustained economic damages (such as lost profits) as a result.
Slander of title
When a publication falsely denies or casts doubt on another's legal ownership of property, resulting in financial loss to the property's owner
Cyber torts
Torts committed via the Internet
Spam
unsolicited "junk e-mails" that flood virtual mailboxes with advertisements, solicitations, and other messages
Negligence (& 4)
When someone suffers an injury because of another's failure to live up to a required duty of care

1. Duty
2. Breach
3. Causation
4. Damages
Duty of care
People are free to act as they do as long as their actions do not infringe on the interests of others
Reasonable personal standard
How a reasonable person would have acted under the circumstances in question
Business invitees
Explicitly or implicitly invited persons to a business's premises
Malpractice
Professional negligence
Causation in fact
Did the injury occur because of a defendant's action?

Use the "but for" test
Proximate cause
Legal cause, when the connection between an act and an injury is strong enough to justify imposing liability
Assumption of risk (2)
1. Knowledge of risk
2. Voluntary assumption of risk
Superseding cause
An unforeseeable intervening event that breaks the casual connection between a wrongful act and an injury
Contributory negligence
A plaintiff who is also negligent cannot recover anything from the defendant
Comparative negligence
Enables both the plaintiff and the defendant's negligence to be computed and the liability for damages distributed accordingly
Res Ipsa Loquitor
"the facts speak for themselves"
Negligence per se
if an individual violates a statute or an ordinance providing for a criminal penalty and that violation causes another to be injured
Good Samaritan statutes
Someone who is aided voluntarily by another person cannot turn around and sue the "good samaritan" for negligence
Dram shop acts
Bar owners or bartenders can be held liable for injuries caused by a person that became intoxicated while being served at that establishment
Strict liability
A person who engages in certain activities can be held responsible for any harm that results to others even if the person used the utmost care
Intellectual property
any property that results from intellectual, creative processes
Trademark
a distinctive mark, motto, device, or implement that a manufacturer stamps, prints, or otherwise affixes to the goods it produces so that they can be identified on the market and their origins made known
Dilution
Using a mark too similar to one already existing reduces its impact and completion of its purpose
Service mark
a trademark that is used to distinguish the services (rather than the products) of one person or company from those of another
Certification mark
Used by one or more persons, other than the owner, to certify the region, materials, mode of manufacture, quality, or other characteristic of specific goods or services
Collective mark
used by members of a cooperative, association, or other organization
Trade Dress
the image and overall appearance of a product
Trade name
indicate part or all of a business's name, whether the business is a sole proprietorship, a partnership, or a corporation
Cyber marks
Trademarks on the internet
Domain name
part of an Internet address—for example, "westlaw.com."
Cybersquatting
when a person registers a domain name that is the same as, or confusingly similar to, the trademark of another and then offers to sell the domain name back to the trademark owner
Meta tags
key words
License
essentially an agreement, or contract, permitting the use of a trademark, copyright, patent, or trade secret for certain purposes
Patent
a grant from the government that gives an inventor the right to exclude others from making, using, or selling his or her invention for a period of twenty years from the date of filing the application for a patent. Patents for designs, as opposed to those for inventions, are given for a fourteen-year period
Copyright
an intangible property right granted by federal statute to the author or originator of a literary or artistic production of a specified type
Peer-to-peer networking
Rather than going through a central Web server, P2P networking uses numerous personal computers (PCs) that are connected to the Internet. Individuals on the same network can access files stored on one another's PCs
Distribute Network
Parts of the network may be distributed all over the country or the world, which offers an unlimited number of uses. Persons scattered throughout the country or the world can work together on the same project by using file-sharing programs
Cloud computing
a subscription-based or pay-per-use service that extends a computer's software or storage capabilities. Cloud computing can deliver a single application through a browser to multiple users, or it might be a utility program to pool resources and provide data storage and virtual servers that can be accessed on demand
Trade secret
information of commercial value. Trade secrets may include customer lists, plans, research and development, pricing information, marketing methods, production techniques, and generally anything that makes an individual company unique and that would have value to a competitor
Cyber crime
the way in which particular crimes are committed (over the internet)
Crime
a wrong against society. proclaimed in a statute and punishable by a fine and/or imprisonment—or, in some cases, death
Beyond a reasonable doubt
If the jury views the evidence in the case as reasonably permitting either a guilty or a not guilty verdict, then the jury's verdict must be not guilty
Felonies
serious crimes punishable by death or by imprisonment for more than one year
Misdemeanors
less serious crimes, punishable by a fine or by confinement for up to a year
Petty offenses
a subset of misdemeanors. Petty offenses are minor violations, such as jaywalking or violations of building codes
Mens Rea
The required mental state, or intent, is indicated in the applicable statute or law
Robbery
The taking of money, personal property, or any other article of value from a person by means of force or fear-is a violent crime
Burglary
breaking and entering into the dwelling of another at night with the intent to commit a felony
Larceny
the unlawful taking and carrying away of someone else's personal property with the intent to permanently deprive the owner of possession
Arson
The willful and malicious burning of a building (and, in some states, personal property) owned by another
Forgery
The fraudulent making or altering of any writing (including electronic records) in a way that changes the legal rights and liabilities of another
Embezzlement
When a person entrusted with another person's property or funds fraudulently appropriates that property or those funds
Bribery (&3)
offering to give something of value to a person in an attempt to influence that person, who usually is (but not always) a public official, to act in a way that serves a private interest. Three types of bribery are considered crimes: bribery of public officials, commercial bribery, and bribery of foreign officials
Insider trading
securities law prohibits a person who possesses inside information and has a duty not to disclose it to outsiders from trading on that information
Money laundering
an alternative to storing cash from illegal transactions in a safe-deposit box, wrongdoers and racketeers have invented ways to launder "dirty" money to make it "clean."
Self-Defense
Defending oneself against an attacker using either deadly or nondeadly force
Necessity
a criminal act was necessary to prevent an even greater harm
Duress
when the wrongful threat of one person induces another person to perform an act that he or she would not otherwise have performed
Entrapment
a defense designed to prevent police officers or other government agents from enticing persons to commit crimes in order to later prosecute them for those crimes
Immunity
A person will not be charged with a crime in exchange for information at the discretion of the prosecutor
Plea bargaining
The prosecution drops the charges down to a lesser infraction in order to obtain information about accomplices or another crime
Double Jeopardy
trying someone twice for the same criminal offense
Exclusionary rule
any evidence obtained in violation of the constitutional rights spelled out in the Fourth, Fifth, and Sixth Amendments generally is not admissible at trial
Indictment
Individuals must be formally charged with having committed specific crimes before they can be brought to trial. If issued by a grand jury, such a charge is called an indictment
Information
criminal complaint
Computer crime
any violation of criminal law that involves knowledge of computer technology for its perpetration, investigation, or prosecution
Cyber fraud
fraud committed over the Internet
Identity theft
when the wrongdoer steals a form of identification—such as a name, date of birth, or Social Security number—and uses the information to access the victim's financial resources
Phishing
the perpetrator "fishes" for financial data and passwords from consumers by posing as a legitimate business, such as a bank or credit-card company. The "phisher" sends an e-mail asking the recipient to update or confirm vital information, often with the threat that an account or some other service will be discontinued if the information is not provided. Once the unsuspecting individual enters the information, the phisher can use it to masquerade as that person or to drain his or her bank or credit account
Vishing
When phishing involves some form of voice communication
Hacker
someone who uses one computer to break into another
Botnets
networks of computers that have been appropriated by hackers without the knowledge of their owners
Worm
a software program that is capable of reproducing itself as it spreads from one computer to the next
Virus
malware, is also able to reproduce itself, but must be attached to an "infested" host file to travel from one computer network to another
Cyberterrorists
hackers who, rather than trying to gain attention, strive to remain undetected so that they can exploit computers for a serious impact