CTE Resource Center - Verso - Business Law Task 1988004050
Identify improper use of business technology and property (e.g., computers, personal digital assistants, cell phones, telephones).
Identification should include
- cyber bullying
- child pornography
- invasion of privacy
- Internet censorship
- violation of intellectual property rights, patents, and copyrights through illegal downloading (Digital Millennium Copyright Act and fair use).
Other Related Standards
FBLA Competitive Events and Activities Areas
NBEA Achievement Standards for Business Law
Analyze the effect of technology on litigation and related business practices.
Define the following computer-related crimes: cyberstalking, cyberspoofing, cyberextortion, phishing, cyberpiracy, identity theft, cyberterrorism, cybervandalism, and cybergerm warfare.