Essentials of Business Law Chapter 29

Card Set Information

Essentials of Business Law Chapter 29
2014-06-10 16:53:27
Business Law

Chapter 29
Show Answers:

  1. Cookie
    A file that is embedded on the hard drive of a computer, often without a person's knowledge, that collects and stores information about the user and his or her online behavior, including websites that have been visited.
  2. Spyware
    Software that can change a computer's security settings or steal a victim's personal information, such as e-mail addresses, bank account numbers, and credit card numbers.
  3. Phishing
    The practice of tricking individuals into disclosing personal information via e-mail.
  4. Spoofing
    A practice in which a legitimate website is reproduced to fool users into thinking that they are connected to a trusted site.
  5. Hacker
    A person who gains unauthorized access to computers either for mischief or with criminal intent.
  6. Virus
    Instructions hidden in software with the potential to cause significant damage to both hardware and software.
  7. Electronic Communications Privacy Act (ECPA)
    A federal statute that addresses hacking and other forms of illegal conduct by making it a crime to gain unauthorized access to any communication that is stored on a computer system.
  8. USA Patriot Act
    A federal statute that lowers the standards required for law enforcement officials and government agents to monitor e-mail and personal electronic information, allows increased government cybersurveillance, and makes it easier to charge persons with serious computer-related crimes.
  9. Computer Fraud and Abuse Act (CFAA)
    A federal statute that prohibits unlawful access to computers used in national defense, by financial institutions, or by governments.
  10. Worm
    A type of virus that replicates itself and uses memory but cannot attach itself to other programs.
  11. Electronic Funds Transfer Act (EFTA) of 1979
    A federal statute that makes it an offense to use any device that is part of an electronic transfer mechanism to steal money, goods, or services or to alter data, interrupt wire transmissions, or use stolen codes or passwords, when the purpose of such activity is to obtain something of value unlawfully.
  12. Public figure
    A well-known person who implicitly allows others to write about him or her in newspapers and magazines and discuss his or her conduct on television and radio.
  13. Spam
    Unsolicited e-mails sent for commercial purposes.
  14. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
    A federal statute that limits the circumstances under which commercial e-mail may be utilized.