quiz 4 chapters 10 11 12 13 in cipp us

Your quiz has been submitted successfully.

Which of these laws sets standards for collective bargaining?

Question options:

View Feedback

Defamation can be claimed if an employer

Question options:

Reading a private email sent by an employee to an outside individual.

Discloses correct and relevant information about an employee while giving a reference.

Conducts surveillance in employee restrooms and break rooms to track abuse of the facilities.

Discloses factually incorrect information when providing a reference for an employee.

View Feedback

The employer-employee relationship is governed primarily by what type of law?

Question options:

Contract Law

Criminal Law

Administrative Law

Common Law

View Feedback

Which federal organizations oversee telemarketing?

Question options:

View Feedback

Which of the following is an example of the FTC’s Telemarketing Sales Rule (TSR)?

Question options:

View Feedback

What entity primarily enforces the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003?

Question options:

View Feedback

Which of the following are examples of IoT devices?

Question options:

View Feedback

What technology principle, commonly referred to as a “law” is understood to say that computing power doubles every 18 months?

Question options:

Asimov’s Law of Robotics

View Feedback

Which of the following CISA provisions state “Sharing information with federal government does not waive privilege”?

Question options:

A company is authorized to monitor and operate defensive measures on its own information system or, with written authorization, another party’s system for cybersecurity purposes.

A company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and that the company is aware at the time relates to a specific individual.

A company is authorized to share with the federal government, state and local governments, and other companies and private entities cyber threat indicators and defensive measures for a cybersecurity purpose or to receive such information from these entities.

View Feedback

What privacy related information is OSHA required by law to disclose?

Question options:

View Feedback

Which law has been important to the last century of Fourth Amendment jurisprudence?

Question options:

View Feedback

There are three emerging areas associated with technologies to monitor employees. Which of the following is one of those emerging areas?

Question options:

View Feedback

HIPAA, COBRA, ERISA, and FLMA are examples of what?

Question options:

View Feedback

These two statements are reasons for what? 1) Limit liability for unlicensed transmission of copyrighted material and other confidential company information and 2) Protect trade secrets

Question options:

View Feedback

E-discovery implicates both domestic privacy concerns and issues arising in transborder data flows. Electronically stored information (ESI) takes not only obvious forms such as email or word processing documents, but can also manifest itself as databases, web pages, server logs, instant messaging transcripts, voicemail systems, social networking records, thumb drives or even the microSD cards found in smartphones. Managing e-discovery and privacy begins with a well-managed what?

Question options:

View Feedback

The Cybersecurity Information Sharing Act (CISA) became law in 2015. The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out. Which CISA provisions is this statement? “For sharing to qualify for protections under CISA, the company’s actions must be done in accordance with certain requirements. For example, a company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and relates to a specific individual.”

Question options:

Authorization for a company to share or receive cyber threat indicators or defensive measures.

View Feedback

Which of the following provides an extra layer of protection for members of the media and media organizations from government searches or seizures in the course of a criminal investigation?

Question options:

View Feedback

The threat from IoT is not so much that an individual device will be compromised, but that IoT will allow an avenue for attack of a network. IoT devices should follow security and encryption best practices and IoT devices should communicate with restrictive rather than permissive protocols best practices recommended by what organization?

Question options:

View Feedback

In the early 1980s, individuals dealt with desktop computers. Later, people adapted to laptops and eventually smartphones. What represents a new development in the ways that individuals interact with computing devices?

Question options:

View Feedback

There are many challenges related to wearable’s data that focus on users’ privacy concerns. One concern is lack of control of the data collected by wearables. Which of the following best describes this concern?

Question options:

View Feedback

Which of the following applies to anyone who advertises products or services by electronic mail directed to or originating from the United States. It also covers the transmission of commercial email messages whose primary purpose is advertising or promoting a product or service.

Question options:

View Feedback

The Video Privacy Protection Act of 1988 (VPPA) was passed in response to the disclosure and publication of then-Supreme Court nominee Robert Bork’s video rental records. The act applies to video tape service providers. Videotape service providers are prohibited from disclosing customer PII unless an enumerated exception applies. Which of the following is an enumerated exception?

Question options:

View Feedback

This statement is an example of what rule governing telemarketing calls? “If a consumer tells one division of a company not to call again, a distinct corporate division of the same company may still make calls to that consumer. If the divisions are not distinct, however, the seller may not call the consumer even to offer different goods or services.”

Question options:

View Feedback

When Red Clay performs renovations because of a medical condition or disability, the company works with health insurance companies, Medicare/Medicaid, and medical doctors to plan appropriate modifications to the home and to obtain reimbursement from insurers. This sometimes requires Red Clay to receive, process, store, and transmit Protected Health Information (PHI) generated by medical practitioners or as provided by the customer. Red Clay received a request to share the collect PHI as part of a state-wide research project into smart homes? Why can Red Clay not release this information?

Question options:

View Feedback

Red Clay’s Customer relations and Marketing departments use big data analytics applications when analyzing company data for decision making. The employees doing data analytics often have no need to see the customers’ names and full account numbers. Identifiers are not needed for many Big Data applications, so the benefits of analytics can be achieved while reducing the privacy and security risks. This is an example of which Fair Information Privacy Practice?

Question options:

View Feedback

Red Clay Renovations ha

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.