To test computer security and conduct encryption research, Tech SolutionsInc circumvents the encryption software and other technological antipiracy protection of United Business Corporation's software. Under the Digital Millennium Copyright Act, this is
A) a violation of copyright law

B) prohibited but not a violation of copyright law.
C) a "fair use" exception to the provisions of the act.
D) permitted for reconsideration every three years.


C

Business

You might also like to view...

How is the societal marketing concept related to marketing ethics?

What will be an ideal response?

Business

The federal agency charged with the responsibility for conducting an integrated, coordinated attack on all forms of pollution of the environment is the ________

A) Environmental Protection Agency (EPA) B) Global Environment Facility (GEF) C) Department of Environmental Management (DEM) D) Center for International Environmental Law (CIEL)

Business

The ________ states that once a copy of a copyrighted work is in circulation, the author has no further right to control its distribution

A. common origin doctrine B. exhaustion of rights doctrine C. rule of reason D. first sale doctrine

Business

Preparing a bank reconciliation on a monthly basis is an example of:

A. Establishing responsibility. B. Protecting assets by proving the accuracy of cash records. C. A technological control. D. Separation of duties. E. Poor internal control.

Business