The Legal Environment of Business: Text and Cases (MindTap Course List)
The Legal Environment of Business: Text and Cases (MindTap Course List)
10th Edition
ISBN: 9781305967304
Author: Frank B. Cross, Roger LeRoy Miller
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 3RE
Summary Introduction

Case summary:The person G downloaded movies and songs from an unauthorized site and used segments of some copyrighted songs while recording for his band, and posted the videos on his social media account. The person G applied to B University, where the admission office asked for his social media account password.

To find:The legality of the individuals to post copyrighted content on their social media pages.

Blurred answer
Students have asked these similar questions
While he was in high school, Joel Gibb downloaded numerous songs to his smartphone from an unlicensed file-sharingservice. He used portions of the copyrighted songs when he recorded his own band and posted videos on YouTube andFacebook. Gibb also used BitTorrent to download several movies from the Internet. Now he has applied to BostonUniversity. The admissions office has requested access to his Facebook password, and he has complied. Using the information presented in the chapter, answer the following questions.1. What laws, if any, did Gibb violate by downloading the music and videos from the Internet?
Transferring copyrighted music recordings to others, without the copyright owners’authorization, is:a) goodwill.b) a fair use.c) illegal.d) a license
An email is sent annually to employees at a University describing the sexual harassment policy. A department head tells a new hire to send out the email with the file titled "Harassment policy.docx" In that file, the effective date on the policy is from 2009, and many of the contact persons listed no longer work for the university. The supervisor in the department notices the mistake, and tells the new hire to send a correction email with an updated version. The new hire hastily updates the file to have the correct date and contact information. After sending it out, she closes the file and drags it into the trash bin. What type of reuse did the employee engage in when sending the revised version of the memo? A. systemic, locked B. opportunistic, nested C. opportunistic, derivative
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Text book image
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Text book image
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
Text book image
Introduction to Business
Business
ISBN:9781947172548
Author:OpenStax
Publisher:OpenStax College
Text book image
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Text book image
Bcom
Business
ISBN:9780357026595
Author:LEHMAN, Carol M.
Publisher:Cengage Learning,