quizes cyber -Science
Your quiz has been submitted successfully.Question 10 / 2 pointsConsumers have a right to exercise control over what personal data companies collect from them and how they use it. This defines which right from the Consumer Privacy Bill of Rights?Question options:Respect for ContextAccess and AccuracyIndividual ControlAccountabilityView FeedbackQuestion 20 / 2 pointsThe Equal Employment Opportunity Commission, for the Americans with Disabilities Act, oversees which type of privacy?Question options:Medical PrivacyFinancial PrivacyWorkplace PrivacyTelemarketing and Marketing PrivacyView FeedbackQuestion 30 / 2 pointsEach state has a law roughly similar to Section 5 of the FTC Act. These laws are commonly known as what?Question options:CAN-SPAM ActDeceptive Trade PracticesUnfair and Deceptive Acts and Practices (UDAP)TransparencyView FeedbackQuestion 42 / 2 pointsIn what type of Federal Trade Commission (FTC) enforcement does the respondent not admit fault, but promises to change its practices and avoids further litigation on the issue?Question options:Magnuson-Moss AuthorityDeceptive Trade PracticesConsent DecreesUnfair Trade PracticesView FeedbackQuestion 50 / 2 pointsWhich type of law does the following statement refer to: “Legal principles that have developed over time in judicial decisions, often drawing on social customs and expectations”?Question options:Tort LawContract LawCommon LawCase LawView FeedbackQuestion 60 / 2 pointsWhich agency has general authority to enforce against unfair and deceptive trade practices, notably including the power to bring deception enforcement actions where a company has broken a privacy promise?Question options:DOTFTCFCCHHSView FeedbackQuestion 72 / 2 pointsWhich branch of government duties include enforcing and administering the law?Question options:Judicial BranchExecutive BranchCongressional BranchLegislative BranchView FeedbackQuestion 80 / 2 pointsWhich of the following best describes consent decree?Question options:Both the federal Congress and the state legislatures have enacted a variety of privacy and security laws. These regulate many different matters, including certain applications of information (such as use of information for marketing or preemployment screening), certain industries (such as financial institutions or healthcare providers), certain data elements (such as Social Security numbers or driver’s license information) or specific harms (such as identity theft or children’s online privacy).Civil wrongs are recognized by law as the grounds for lawsuits. These wrongs result in an injury or harm that constitutes the basis for a claim by the injured party. Primary goals of are to provide relief for damages incurred and deter others from committing the same wrongs.A judgment entered by agreement of the parties whereby the defendant agrees to stop alleged illegal activity, typically without admitting guilt or wrongdoing. In the privacy enforcement sphere, for example, the FTC has entered into numerousagreements with companies as a result of alleged violations of privacy laws, such as the Children’s Online Privacy Protection Act (COPPA).Some laws require regulatory agencies such as the Federal Trade Commission or the Federal Communications Commission to issue regulations and rules. These place specific compliance expectations on the marketplace.View FeedbackQuestion 92 / 2 pointsMarkets, Technology, Law, and Self-/Co-Regulation are examples of what?Question options:Sources of Personal InformationProcessing of Personal InformationModels of Data ProtectionSources of Privacy ProtectionView FeedbackQuestion 100 / 2 pointsFinancial data, Operational data, and Intellectual property are examples of what?Question options:Information Assets of an OrganizationData SubjectPublicly Available InformationPublic recordsView FeedbackQuestion 110 / 2 pointsWhich of the following best describes processing personal information?Question options:Controls the use of personal information by determining the purposes for its use and the manner in which the information will be processed.Typically occurs through the privacy policy of a company or other entity, or by an industry association.Non-public information that not generally available or easily accessed due to law or custom. Examples include medical records, financial information and adoption records.The collection, recording, organization, storage, updating or modification, retrieval, consultation and use of personal information.View FeedbackQuestion 122 / 2 pointsPublic Records, Publicly Available Information, and Non-Public Information are examples of what?Question options:Models of Data ProtectionSources of Privacy ProtectionSources of Personal InformationProcessing of Personal InformationView FeedbackQuestion 130 / 4 pointsFair Information Practices (FIPs) are principles for handling, storing, and managing data with privacy, security, and fairness in an information society that is rapidly evolving. These principles can be conceived in four categories. Which FIP principle does the following statement belong? “Notice: Organizations should provide notice about their privacy policies and procedures, and should identify the purpose for which personal information is collected, used, retained, and disclosed.”Question options:Controls on the InformationRights of IndividualsManagementInformation LifecycleView FeedbackQuestion 144 / 4 pointsThe Organisation for Economic Co-operation and Development (OECD) Guidelines, updated in 2013, are perhaps the most widely recognized framework for FIPs and have been endorsed by the U.S. Federal Trade Commission (FTC) and many other government organizations. Which of the following best defines the Use Limitation Principle?Question options:Personal data should not be disclosed, made available or otherwise used for purposes other than those specified.The purposes for which personal data are collected should be specified not later than at the time of data collection.Personal data should be relevant to the purposes for which they are to be used.Personal data should be protected by reasonable security.View FeedbackQuestion 154 / 4 pointsWhich type of privacy is concerned with placing limits on the ability to intrude into another individual’s environment?Question options:Communications privacyTerritorial privacyInformation privacyBodily privacyView FeedbackQuestion 160 / 4 pointsIn which type of tort law does the subject often use the defense that the speaker is exercising free speech rights under the First Amendment?Question options:Liability TortsPrivacy TortsNegligent TortsIntentional TortsView FeedbackQuestion 174 / 4 pointsEven in the absence of statutes protecting confidentiality, common law has long upheld which of the following in relation to privacy?Question options:Doctor-Patient ConfidentialityCongressional ConfidentialitiesJournalists Naming SourcesReligious ConfidentialitiesView FeedbackQuestion 184 / 4 pointsWhich of the following is the ability to specify whether personal information will be collected and/or how it will be used or disclosed?Question options:AcceptanceAccessNoticeChoiceView FeedbackQuestion 194 / 4 pointsSmart-TVs, Drones, and Ransomware are examples of what?Question options:New technologies that have varied state laws to follow.New technologies that have varied self-regulating requirements.New technologies that have cross-border enforcement issues.New technologies that raise important consumer protection issues.View FeedbackQuestion 204 / 4 pointsAs the volume of cross-border data transfers increases, privacy enforcement increasingly involves companies and government agencies in more than one jurisdiction. Which of the following is not a key issues of cross-border enforcement?Question options:Self-Regulation and EnforcementCross-Border EnforcementCooperation Between Enforcement AgenciesConflicts Between Privacy and Disclosure LawsView FeedbackQuestion 210 / 4 pointsFTC categorizes the Privacy Bill of Rights into three themes. Which theme is described here: “Privacy notices should be clearer, shorter and more standardized to enable better comprehension and comparison of privacy practices.”Question options:TransparencyPrivacy by DesignSimplified Consumer ChoiceBrokering DataView FeedbackQuestion 224 / 4 pointsWhich of the following was emphasized in both the White House consumer bill of rights and the 2012 FTC report?Question options:TransparencyIndividual ControlAccountabilitySecurityView FeedbackQuestion 230 / 6 pointsRed Clay is licensed to do business as a general contractor for residential buildings in three states (DE, MD, PA). The company’s architects maintain professional licensure in their state of residence. The company’s general counsel is licensed to practice law in Delaware and Maryland. The Chief Financial Officer is a Certified Public Accountant (CPA) and licensed to practice in all three states. In terms of privacy law, which of the best defines jurisdiction?Question options:Specific authority is targeted at singular activities that are outlined by legislation.A superior government’s ability to have its laws supersede those of an inferior government.The authority of a court to hear a particular case.A superior government’s ability to have its laws supersede those of an inferior government.View FeedbackQuestion 246 / 6 pointsRed Clay respects their customer’s right to privacy. Their websites and other public-facing content inform individuals about what information is collected, how the information is used and disclosed, how to exercise any choices about uses or disclosures, and whether the individual can access or update the information. This action supports two purposes of US Privacy Laws: (1) consumer education and (2) corporate accountability. What are these external communications referred to?Question options:ChoiceJurisdictionAccessNoticesView FeedbackQuestion 256 / 6 pointsRed Clay chooses to promote consumer privacy throughout its organizations and at every stage in the development of its products and services. Red Clay also chooses to incorporate substantive privacy protections into their practices, such as data security, reasonable collection limits, sound retention and disposal practices, and data accuracy. These actions describe which of the FTC privacy enforcement areas?Question options:TransparencyPrivacy by designDo Not TrackSimplified consumer choiceView FeedbackQuestion 266 / 6 pointsThe Consumer Privacy Bill of Rights is based on traditional fair information practices. The bill of rights states that these rights should apply to commercial uses of personal data. As such, Red Clay must collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. Which right is this?Question options:TransparencyFocused collectionIndividual controlRespect for contextView FeedbackQuestion 270 / 6 pointsWhen examining data protection and privacy laws and practices, it can be helpful to focus on four categories or classes of privacy. Which two of the four categories of privacy apply to Red Clay?Question options:Territorial privacy and Bodily PrivacyInformation privacy and Communications privacyInformation privacy and Bodily PrivacyCommunications privacy and Bodily PrivacyView FeedbackQuestion 286 / 6 pointsRed Clay strives to ensure they comply with all privacy laws, regulations, standards, guidelines, etc. Fair Information Practices (FIPs) are guidelines for handling, storing, and managing data with privacy, security, and fairness in an information society that is rapidly evolving. Notice, Choice and Consent, and Data Subject Access are associated with which of the following FIPs principle?Question options:Controls on the InformationRights of IndividualsManagementInformation Lifecycle