• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Are domain names on the Internet protected by trademark laws?
seeing as the law is inadequate when dealing issues regarding new technologies.
When can I not use a trademark?
you cannot use another person's trademark if that use would confuse the reasonable consumer about the identity of goods or services associated with that trademark.
What is a trademark?
It has to be in some way distinctive, not what courts call "ordinary" or "merely descriptive" or "generic": you can't use trademark to protect the common name of your product - say, the name "Modems" for the modems you are selling (because that is a generic term) nor the phrase "Tasty donuts" (which merely describes the donuts).
What can the US Government do or cannot do when it comes to anonymity?
This cannot totally ban anonymity because of the freedom of free speech although it can enact measures to enable traceability of messages in order to pinpoint the person or machine who sent them.
What is encryption?
a technique for turning your message into gibberish, readable only by the person intended to read the message -- someone else who has the proper key. The most powerful forms of encryption have two keys: one public, the other private.
What is 1 of the exceptions to the ECPA?
intercept messages when necessary to assure the continuation of service or to protect the rights of the service provider.
What is the main problem concerning the protection of privacy provided by the US Constitution?
based on practices and technology that have long been obsolete. Current practices and technologies are, therefore, not accounted for.
What is the limitation of the US Constitution when it comes to protecting citizens from invasions from the government?
protects the citizens from physical invasions, which requires a warrant. Other types of invasions, such as wire-tapping, do not require a warrant.
How much control do people have over other people's access to their personal-activity-related information?
American law does not generally cover "data protection" as is with European democracies.
When can a service provider be held liable for copyright infringement done by someone else who posted copyrighted material via their service?
if someone complains about an infringing post, the service provider must take reasonable steps to determine whether the post is actually an infringement - whether it actually copies someone else's work, whether it's a fair use
How do you test if noncommercial copying is unfair?
this noncommercial copying became WIDESPREAD, would it *displace some sales
Are domain names on the Internet protected by trademark laws?
seeing as the law is inadequate when dealing issues regarding new technologies.
When can I not use a trademark?
you cannot use another person's trademark if that use would confuse the reasonable consumer about the identity of goods or services associated with that trademark.
What is a trademark?
It has to be in some way distinctive, not what courts call "ordinary" or "merely descriptive" or "generic": you can't use trademark to protect the common name of your product - say, the name "Modems" for the modems you are selling
What can the US Government do or cannot do when it comes to anonymity?
This cannot totally ban anonymity because of the freedom of free speech although it can enact measures to enable traceability of messages in order to pinpoint the person or machine who sent them.
What is encryption?
a technique for turning your message into gibberish, readable only by the person intended to read the message -- someone else who has the proper key. The most powerful forms of encryption have two keys: one public, the other private.
What is one of the exceptions to the ECPA?
intercept messages when necessary to assure the continuation of service or to protect the rights of the service provider.
What is the main problem concerning the protection of privacy provided by the US Constitution?
based on practices and technology that have long been obsolete. Current practices and technologies are, therefore, not accounted for.
What is the limitation of the US Constitution when it comes to protecting citizens from invasions from the government?
This only protects the citizens from physical invasions, which requires a warrant. Other types of invasions, such as wire-tapping, do not require a warrant.
How much control do people have over other people's access to their personal-activity-related information?
American law does not generally cover "data protection" as is with European democracies.
When can a service provider be held liable for copyright infringement done by someone else who posted copyrighted material via their service?
someone complains about an infringing post, the service provider must take reasonable steps to determine whether the post is actually an infringement - whether it actually copies someone else's work
How do you test if noncommercial copying is unfair?
this noncommercial copying became WIDESPREAD, would it *displace some sales* (or some advertising revenues)? If it will, it's unfair.
How does the "Fair Use Doctrine" work?
Has the original work been published
When does copying not infringe copyrights?
Copying an IDEA from someone else's work isn't considered copying for copyright purposes (though in some situations it might violate rights under the *patent* laws).
When can copying content online be legal?
Fair use
What is 1 of the elements that constitute copyright law?
gives a copyright owner the exclusive right to control copying
What does the law say about offering products on the Internet using a trademark that is similar to another person's trademark although that other person is located in another locality and is catering to a wholly different market?
this hasn't been resolved yet seeing as the law is still not adequate in dealing with issues regarding new technologies.
What's the difference between the ™ and ® symbols?
Anyone who uses a trademark may affix the ™ symbol to it to show ownership of said trademark while the ® symbol is reserved for those who have had their trademarks registered with the concerned government agencies.
If I use a logo that is unique and is already identifiable with my brand, do I already have a trademark?
certain registrations are only a formality but exist to make claims easier to verify.
Are emails included in the premise of "Private spaces"?
seeing as the law is inadequate to deal with privacy issues regarding new technologies. Private spaces only generally include homes, postal mail, and others.
How does cyberspace differ from the physical world when it comes to anonymity?
people choose what parts of themselves they should hide while on cyberspace, people can choose what they can show.
What constitutes "unauthorized access" according to the ECPA?
to exceed the authorization you have under any permission you have been granted.
What statute provides for the protection of privacy regarding digital content?
The Electronic Communications Privacy Act which makes it illegal (with important exceptions we discuss below) for an individual or the government to intercept or disclose private electronic communications. To enforce this right, it gives victims the right to sue for damages.
What was the deciding premise that forced lawmakers to rethink how the Fourth Amendment to the US Constitution was supposed to be interpreted?
It was the statement, "the constitution protects people, not places."
What is the main problem concerning informational privacy on the internet?
American law does not expressly protect people from having websites gather information about them while they are accessed.
What is one kinds of truths that the law might protect?
truths about you that you have kept private.
What are some examples of fair use?
You key in an article from a paper magazine that doesn't have a Web site and post it to a news group.
PROBABLY UNFAIR, if the magazine is available on some online service (such as DIALOG or NEXIS), or if the magazine is still on the newsstands for people to buy.
What are a few basic rules to determine whether a use is fair?
If you're copying more than a little bit, but you're doing it for (a) SYSTEMATIC NEWS REPORTING, (b) CRITICAL COMMENTARY (whether positive or negative), or (c) PARODY, your use is probably FAIR.
Note that it's not enough just to say "I'm reporting the news to the list" or "I'm commenting on this article just by quoting it." A little test: If pretty much any copier can make the same claim of "news reporting" or "commentary" that you're making, your claim is probably too ambitious.
What is an implied license?
a copyright owner acts in such a way that "reasonable people would assume that he's allowing them to make copies", the law interprets his conduct as creating an "implied license."
What does "copying" in copyright law mean?
It covers MANUAL copies as well as mechanical copies: It doesn't matter whether you make an electronic copy of an electronic document, scan in a print document, or hand-enter a document into the computer. All of this is copying.
What is the basic limitations of the "whatever is written down is copyrighted" premise?
If you simply copy what someone else has done, without adding anything new of your own, your copy is generally not copyrighted.
What is "Cyberspace Law for Non-Lawyers" about?
a new and exciting frontier, and presents a host of new and difficult legal questions in many areas. The development of legal rules that will govern activity in this new environment is likely to be a complex, and at times a controversial, process. We hope to give you a basic framework that will help you think about some of the questions that have arisen in six areas of the law: copyright, privacy, trademark, libel, free expression, and contracting.