Exam 16: Information Security and Privacy in Human Resource Information Systems
While they are relatively uncommon, security breaches can be costly for the organization.
False
Privacy is a human value consisting of four elements that refer to human rights, namely, solitude, anonymity, intimacy and reserve.
True
Governments, at various levels, in most of the developed countries have enacted several laws and regulations to safeguard information security and data protection.Please list and briefly describe 3 such laws discussed in chapter 16 of the textbook.
-Personal Information Protection and Electronics Document Act: The act was enacted in Canada to support and promote electronic business by protecting personal information that is collected, used, or disclosed in certain circumstances. -California Security Breach Information Act, SB 1386: This law in the state of California requires organizations to notify customers or employees when unencrypted personal information has been compromised, stolen, or lost -Computer Misuse Act, 1990: The act was proposed to make computer crime (e.g., hacking or cyber-terrorism)a type of criminal offence in the United Kingdom. -The European Union Data Protection Directive (EUDPD): This directive requires that all EU members must adopt national regulations to standardize the protection of data privacy for citizens throughout the European Union. -Health Insurance Portability and Accountability Act: This act requires health care providers, insurance companies, and employers to safeguard the security of health information.It sets national standards for electronic health care transactions.
Cybercrime and security breaches cost firms an average of $ _______ annually.
Three main goals of information security are to achieve confidentiality, integrity and availability within a HRIS.
Which of the following is not considered a "best practice" that HR managers should consider to secure information security and privacy?
According to Kovach and Tansey (2000)________ is one of the four elements of privacy that is defined as "the right to not be monitored".
Which U.S.state enacted the Security Breach Notification Law? The law requires organizations to notify customers or employees when unencrypted personal information may be compromised, stolen or lost
According to Austin and Darby (2003)it is estimated that security breaches (internal and external)affect _____ of all businesses every year.
The ISO/IEC 27002 security management process does NOT consist of
There are many threats to information security.Please describe five information security threats.
ISO/IEC 27002 (ISO, 2000), is a security management process which focus of technological control of information.
Information security breaches cost approximately ________ annually.
Privacy is a universal concept that is viewed similarly in different cultures.
Information security issues are solely the responsibility of the IT Department and IT managers.
Viruses, worms and trojans are common external security threats organization and often come in email attachments.
The value of information is rarely higher than the price of hardware and/or software being used to store that information.
According to the text, approximately what percentage of employers monitor what employees are posting to external blogs and social networking sites?
Confidential information must only be accessed, used, or disclosed by authorized users.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)