quiz 4 chapters 10 11 12 13 in cipp us
Your quiz has been submitted successfully.
Which of these laws sets standards for collective bargaining?
Defamation can be claimed if an employer
The employer-employee relationship is governed primarily by what type of law?
Which federal organizations oversee telemarketing?
Which of the following is an example of the FTC’s Telemarketing Sales Rule (TSR)?
What entity primarily enforces the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003?
Which of the following are examples of IoT devices?
What technology principle, commonly referred to as a “law†is understood to say that computing power doubles every 18 months?
Which of the following CISA provisions state “Sharing information with federal government does not waive privilege”?
What privacy related information is OSHA required by law to disclose?
Which law has been important to the last century of Fourth Amendment jurisprudence?
There are three emerging areas associated with technologies to monitor employees. Which of the following is one of those emerging areas?
HIPAA, COBRA, ERISA, and FLMA are examples of what?
These two statements are reasons for what? 1) Limit liability for unlicensed transmission of copyrighted material and other confidential company information and 2) Protect trade secrets
E-discovery implicates both domestic privacy concerns and issues arising in transborder data flows. Electronically stored information (ESI) takes not only obvious forms such as email or word processing documents, but can also manifest itself as databases, web pages, server logs, instant messaging transcripts, voicemail systems, social networking records, thumb drives or even the microSD cards found in smartphones. Managing e-discovery and privacy begins with a well-managed what?
The Cybersecurity Information Sharing Act (CISA) became law in 2015. The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out. Which CISA provisions is this statement? “For sharing to qualify for protections under CISA, the company’s actions must be done in accordance with certain requirements. For example, a company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and relates to a specific individual.”
Which of the following provides an extra layer of protection for members of the media and media organizations from government searches or seizures in the course of a criminal investigation?
The threat from IoT is not so much that an individual device will be compromised, but that IoT will allow an avenue for attack of a network. IoT devices should follow security and encryption best practices and IoT devices should communicate with restrictive rather than permissive protocols best practices recommended by what organization?
In the early 1980s, individuals dealt with desktop computers. Later, people adapted to laptops and eventually smartphones. What represents a new development in the ways that individuals interact with computing devices?
There are many challenges related to wearable’s data that focus on users’ privacy concerns. One concern is lack of control of the data collected by wearables. Which of the following best describes this concern?
Which of the following applies to anyone who advertises products or services by electronic mail directed to or originating from the United States. It also covers the transmission of commercial email messages whose primary purpose is advertising or promoting a product or service.
The Video Privacy Protection Act of 1988 (VPPA) was passed in response to the disclosure and publication of then-Supreme Court nominee Robert Bork’s video rental records. The act applies to video tape service providers. Videotape service providers are prohibited from disclosing customer PII unless an enumerated exception applies. Which of the following is an enumerated exception?
This statement is an example of what rule governing telemarketing calls? “If a consumer tells one division of a company not to call again, a distinct corporate division of the same company may still make calls to that consumer. If the divisions are not distinct, however, the seller may not call the consumer even to offer different goods or services.”
When Red Clay performs renovations because of a medical condition or disability, the company works with health insurance companies, Medicare/Medicaid, and medical doctors to plan appropriate modifications to the home and to obtain reimbursement from insurers. This sometimes requires Red Clay to receive, process, store, and transmit Protected Health Information (PHI) generated by medical practitioners or as provided by the customer. Red Clay received a request to share the collect PHI as part of a state-wide research project into smart homes? Why can Red Clay not release this information?
Red Clay’s Customer relations and Marketing departments use big data analytics applications when analyzing company data for decision making. The employees doing data analytics often have no need to see the customers’ names and full account numbers. Identifiers are not needed for many Big Data applications, so the benefits of analytics can be achieved while reducing the privacy and security risks. This is an example of which Fair Information Privacy Practice?
Red Clay Renovations ha
Leave a Reply
Want to join the discussion?Feel free to contribute!