Chapter 10  Which act did federal prosecutors use for acts

subject Type Homework Help
subject Pages 9
subject Words 2100
subject Authors Marianne M. Jennings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
a. True
b. False
1. The Computer Fraud and Abuse Act (CFA) applies only to federal employees.
a. True
b. False
2. Under the Computer Fraud and Abuse Act (CFA), access to institutional financial information is not a violation.
a. True
b. False
3. The Economic Espionage Act makes it a crime to take trade secrets by computer.
a. True
b. False
4. The Economic Espionage Act only applies in international transactions.
page-pf2
a. True
b. False
6. There are state laws, but no federal laws, concerning cyberbullying.
a. True
b. False
7. The Anti-Spam Technical Alliance is an industry group working to fight spam.
a. True
b. False
8. State anti-spamming statutes are tied to the volume of messages.
page-pf3
a. True
b. False
9. Tapping into federal income tax returns to get information is a violation of the Computer Fraud and Abuse Act.
a. True
b. False
10. Under the Federal Computer Fraud and Abuse Act, unauthorized access to government computers is a felony.
a. True
b. False
11. Warrants are not required in cyberspace.
a. True
b. False
12. Fourth Amendment rights still apply on the Internet.
page-pf4
13. Servers are always required to reveal the identity of their customers and users.
a. True
b. False
14. Which of the following is not a computer crime?
a. unauthorized use of computer equipment
b. alteration or destruction of computer files
c. entering fraudulent data
d. using computers to convert data
e. All of the above are computer crimes.
15. Which is not covered under the Computer Fraud and Abuse Act (CFA)?
a. unauthorized use of federal computers
b. typewriters
c. use in excess of authority by a federal employee
d. consumer financial records
e. All of the above are covered.
page-pf5
16. The Economic Espionage Act covers:
a. only international commercial transactions.
b. the copying, downloading or electronic transfer of trade secrets.
c. bribes to obtain government contracts.
d. only national stock exchange companies.
17. The No Electronic Theft Act:
a. prohibits the use of the Internet for personal e-mail on company time.
b. prohibits the transfer of copyrighted material worth over $1,000 over the Internet.
c. prohibits economic espionage.
d. resulted from the Volkswagen/GM espionage case.
18. Which of the following would be a federal crime?
a. copying FDIC data without authorization
b. changing figures on military invoices without authorization
c. placing a virus on a federal computer system
d. All of the above are federal crimes.
page-pf6
19. The No Electronic Theft Act:
20. Which act did federal prosecutors use for acts of cyberbullying?
a. Anti-Cyberbullying Act of 2009
b. Computer Fraud and Abuse Act
c. Computer Fraud and Bullying Act
d. Computer Stalking and Bullying Act of 2008
21. The CAN-SPAM Act:
a. is part of Sarbanes-Oxley.
b. allows companies to bring suit against spammers for their unauthorized use of their servers.
c. has been declared unconstitutional.
d. none of the above
page-pf7
22. Which of the following is a violation of the Economic Espionage Act?
a. Downloading your employer’s website program to take to your new job.
b. Sketching your employers new trademark to register first.
c. Photographing customer lists of a competitor.
d. All of the above are EEA violations.
23. The FBI wants to conduct a search of your work computer. To do so:
a. the FBI needs your permission.
b. the FBI needs a warrant.
c. either a or b
d. both a and b
24. Which act makes it a crime to willfully infringe copyrighted materials via electronic means that worth more than
$1,000?
a. The Digital Millennium Copyright Act
b. The No Electronic Theft Act
c. The Economic Espionage Act
d. There is no criminal statute for electronic infringement; it is a civil matter only.
page-pf8
25. Answer the following:
Bruce King is a computer whiz who works at the county complex where all records for criminal
a. cases are kept. He has developed a means for deleting criminal records from the files and has
contacted defendants to offer them the deletion in exchange for a substantial fee. Has King
committed any crimes with his actions?
b. What if King worked for a credit reporting firm and offered the deletion service to folks with bad
credit ratings? Would the result be the same?
26. Janet Walker is a computer information systems major who has been able to tap into an ice cream manufacturer's
computer system. As a practical joke, Walker changes the manufacturer's ice cream formula so that an entire day's
production has a bitter taste to it. Has Walker committed any crime?
27. Jan Lesh was able to gain access to the federal government's records on student loans and loan repayments. Lesh
changed his loan balance from $8200.00 to $2800.00. Lesh then repaid the $2800.00 and received his notice of
payment in full. Has Lesh committed any crimes?
page-pf9
28. Bradley Harrison was hired by Billiards, Inc. Before leaving his current employer, Pool Party, Inc., he downloaded
Pool Party's contract forms and customer lists to take with him to his new job. Has Bradley broken any laws?
29. Evaluate the following statement: "Warrants are not required for searches in cyberspace."
30. Cyberspace companies are exempt from the consumer privacy rules on use of consumer information and sale of
consumer lists.
a. True
b. False
page-pfa
31. E-merchants need not follow the same FTC rules that apply to catalog merchants.
a. True
b. False
32. Which agency is responsible for consumer complaints about e-merchants?
a. The Federal Trade Commission.
b. There is no federal agency responsible because the federal government has no jurisdiction in cyberspace.
c. The Social Security Administration.
d. none of the above
33. Employers are responsible for the content of employee e-mails.
a. True
b. False
page-pfb
34. Employers are responsible when employees use their computers to infringe on others intellectual property rights.
a. True
b. False
35. Employee e-mails cannot be obtained through discovery processes in litigation against the company because of Fifth
Amendment protections.
a. True
b. False
36. The Electronic Communications Privacy Act applies to all forms of electronic communication.
a. True
b. False

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.