• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Are domain names on the Internet protected by trademark laws?
seeing as the law is inadequate when dealing issues regarding new technologies.
When can I not use a trademark?
you cannot use another person's trademark if that use would confuse the reasonable consumer about the identity of goods or services associated with that trademark.
What is a trademark?
It has to be in some way distinctive, not what courts call "ordinary" or "merely descriptive" or "generic": you can't use trademark to protect the common name of your product - say, the name "Modems" for the modems you are selling (because that is a generic term) nor the phrase "Tasty donuts" (which merely describes the donuts).
What can the US Government do or cannot do when it comes to anonymity?
This cannot totally ban anonymity because of the freedom of free speech although it can enact measures to enable traceability of messages in order to pinpoint the person or machine who sent them.
What is encryption?
a technique for turning your message into gibberish, readable only by the person intended to read the message -- someone else who has the proper key. The most powerful forms of encryption have two keys: one public, the other private.
What is 1 of the exceptions to the ECPA?
intercept messages when necessary to assure the continuation of service or to protect the rights of the service provider.
What is the main problem concerning the protection of privacy provided by the US Constitution?
based on practices and technology that have long been obsolete. Current practices and technologies are, therefore, not accounted for.
What is the limitation of the US Constitution when it comes to protecting citizens from invasions from the government?
protects the citizens from physical invasions, which requires a warrant. Other types of invasions, such as wire-tapping, do not require a warrant.
How much control do people have over other people's access to their personal-activity-related information?
American law does not generally cover "data protection" as is with European democracies.
When can a service provider be held liable for copyright infringement done by someone else who posted copyrighted material via their service?
if someone complains about an infringing post, the service provider must take reasonable steps to determine whether the post is actually an infringement - whether it actually copies someone else's work, whether it's a fair use
How do you test if noncommercial copying is unfair?
this noncommercial copying became WIDESPREAD, would it *displace some sales
Are domain names on the Internet protected by trademark laws?
seeing as the law is inadequate when dealing issues regarding new technologies.
When can I not use a trademark?
you cannot use another person's trademark if that use would confuse the reasonable consumer about the identity of goods or services associated with that trademark.
What is a trademark?
It has to be in some way distinctive, not what courts call "ordinary" or "merely descriptive" or "generic": you can't use trademark to protect the common name of your product - say, the name "Modems" for the modems you are selling
What can the US Government do or cannot do when it comes to anonymity?
This cannot totally ban anonymity because of the freedom of free speech although it can enact measures to enable traceability of messages in order to pinpoint the person or machine who sent them.
What is encryption?
a technique for turning your message into gibberish, readable only by the person intended to read the message -- someone else who has the proper key. The most powerful forms of encryption have two keys: one public, the other private.
What is one of the exceptions to the ECPA?
intercept messages when necessary to assure the continuation of service or to protect the rights of the service provider.
What is the main problem concerning the protection of privacy provided by the US Constitution?
based on practices and technology that have long been obsolete. Current practices and technologies are, therefore, not accounted for.
What is the limitation of the US Constitution when it comes to protecting citizens from invasions from the government?
This only protects the citizens from physical invasions, which requires a warrant. Other types of invasions, such as wire-tapping, do not require a warrant.
How much control do people have over other people's access to their personal-activity-related information?
American law does not generally cover "data protection" as is with European democracies.
When can a service provider be held liable for copyright infringement done by someone else who posted copyrighted material via their service?
someone complains about an infringing post, the service provider must take reasonable steps to determine whether the post is actually an infringement - whether it actually copies someone else's work
How do you test if noncommercial copying is unfair?
this noncommercial copying became WIDESPREAD, would it *displace some sales* (or some advertising revenues)? If it will, it's unfair.
How does the "Fair Use Doctrine" work?
Has the original work been published
When does copying not infringe copyrights?
Copying an IDEA from someone else's work isn't considered copying for copyright purposes (though in some situations it might violate rights under the *patent* laws).
When can copying content online be legal?
Fair use