True/False Indicate whether the
statement is true or false.
|
|
1.
|
Computer programs cannot be registered with the
Copyright Office because they are useful articles.
|
|
2.
|
When computer programs are submitted to the
Copyright Office for registration, the entire program must be submitted as a deposit, even though it
may include trade secrets material.
|
|
3.
|
A copyright notice for a video game may appear
on the box or “jewel case” for it.
|
|
4.
|
A buyer of a computer program such as Microsoft
Office may make as many copies of it as he or she wishes.
|
|
5.
|
You are entitled to make a backup copy of Turbo
Tax, the computer program that helps you calculate your taxes.
|
|
6.
|
LexisNexis’s collection of federal cases
in its database is not copyrightable because these cases are in the public domain.
|
|
7.
|
If you find an article of interest on the
Internet, you may make as many copies of it as you like because once something is posted on the
Internet, it is free for all to use.
|
|
8.
|
It is unlawful for you to attempt to circumvent
a measure that is intended to protect a digital work. For example, if Madonna’s latest CD is
encrypted so that it cannot be copied, it is wrong for you to attempt to circumvent that protection
device.
|
|
9.
|
Online service providers such as eBay can never
be held liable for copyright infringement, generally because it is their users or customers who might
violate another’s copyright, not the online service provider.
|
|
10.
|
It is acceptable for you to circumvent a
computer program that is encrypted if your purpose is to study it, test it, or locate flaws in
it.
|
|
11.
|
The problem of illegal downloading of songs from
the Internet has largely been solved.
|
|
12.
|
Online song distribution companies (such as
Apple’s iTunes) must obtain copyright permission before allowing customers to download songs
from their sites.
|
|
13.
|
It is a copyright violation for you to edit a
copyrighted movie to remove offending profanity before showing it to your children.
|
|
14.
|
Copyright infringement might subject an
infringer to criminal penalties as well as civil penalties.
|
|
15.
|
The ringtone on your cell phone may be protected
by copyright.
|
|
16.
|
Vessel hulls are protectable and their designs
may be registered with the Copyright Office.
|
|
17.
|
The length of protection for a mask work is the
same as that for any copyrighted work.
|
Essay
|
|
18.
|
The name of the statute or act that protects
digital works and imposes penalties on those who circumvent technological protection measures is the
___________.
|
|
19.
|
Computer programs are registered as copyrights
using form TX because they are viewed as _________ works by the Copyright Office.
|
|
20.
|
ABC Inc. wishes to file a copyright registration
for the computer program it has developed; however, ABC is concerned that others might see the
computer program’s features if ABC deposits it with the Copyright Office. The program is
critically important to ABC’s business; if it is discovered by a competitor, ABC will likely be
forced out of business. What should ABC do?
|
|
21.
|
Sam, a video gamer, purchased a copyrighted
video game. He would like to change the game to speed it up to make it more challenging for him. Is
such permissible or is it an unlawful derivative work? Discuss.
|
|
22.
|
Why are experts often used in infringement cases
relating to computer programs when other infringement cases rely on the “ordinary
observer” test?
|
|
23.
|
Disassembling a computer program to understand
its functional elements is called _____________.
|
|
24.
|
When you “buy” a copy of Turbo Tax,
a well-known software program, you have actually only licensed the program rather than purchased it
outright? Why? Why does the maker license it to you rather than sell it to you? What type of license
is this called?
|
|
25.
|
When you “buy” a software program
from Microsoft online, and you click the “I agree” button, a _________ license has
been created.
|
|
26.
|
How does the U.S. Trade Representative work to
protect against piracy of copyrighted works in foreign countries?
|
|
27.
|
Westlaw can obtain a copyright license for its
database of federal court cases because although these cases are in the public domain,
Westlaw’s unique arrangement of the cases qualifies for protection as a ___________ or
___________.
|
|
28.
|
What is the danger of allowing weather
forecasters to claim copyright protection for their databases of weather
statistics?
|
|
29.
|
What does the term “digital rights
management” refer to?
|
|
30.
|
What does it mean to say that Internet service
providers (such as Google or eBay) have a “safe harbor” under the DMCA?
|
|
31.
|
Why were the music file-sharing services
Grokster and StreamCast held liable for copyright infringement in 2005 when they were not actually
downloading songs illegally?
|
|
32.
|
Identify at least two ways that record labels,
movie companies, and other owners of content attempt to reduce piracy:
|
|
33.
|
Beth Anderson has purchased a movie in DVD form.
She is concerned about profanity and violence in the movie. May she filter out this material?
Discuss.
|
|
34.
|
The ____________ enhances criminal penalties for
copyright infringement even if the infringer does not profit from the transaction.
|
|
35.
|
A copyright work for which no owner can be found
is referred to as a[n] ____________.
|
|
36.
|
What does it mean to say that protection of the
designs of vessel hulls is “sui generis”?
|
|
37.
|
The ________________________ protects mask works
from infringement.
|