# CTE Resource Center - Verso - Business Law Task 1988004050

CTE Resource Center - Verso

Virginia’s CTE Resource Center

Identify improper use of business technology and property (e.g., computers, personal digital assistants, cell phones, telephones).


Identification should include
  • improper use of cookies
  • cyber bullying
  • child pornography
  • invasion of privacy
  • hacking
  • viruses
  • plagiarism
  • Internet censorship
  • violation of intellectual property rights, patents, and copyrights through illegal downloading (Digital Millennium Copyright Act and fair use).

Other Related Standards

FBLA Competitive Events and Activities Areas

Business Law


Business Procedures


Networking Concepts


NBEA Achievement Standards for Business Law

Analyze the effect of technology on litigation and related business practices.


Define the following computer-related crimes: cyberstalking, cyberspoofing, cyberextortion, phishing, cyberpiracy, identity theft, cyberterrorism, cybervandalism, and cybergerm warfare.