Deck 37: Application and Ethics: The Biggest Data Breach of All Time
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/4
Play
Full screen (f)
Deck 37: Application and Ethics: The Biggest Data Breach of All Time
1
Hackers infiltrate the computer system of ChemCo Inc.and steal the company's trade secrets.If the hackers can be identified,they can be
A)charged with unauthorized access of protected computers.
B)subject to civil sanctions,but no criminal penalties.
C)subject to a suit by the Federal Trade Commission.
D)included on a "watch list" but no other sanctions are currently possible.
A)charged with unauthorized access of protected computers.
B)subject to civil sanctions,but no criminal penalties.
C)subject to a suit by the Federal Trade Commission.
D)included on a "watch list" but no other sanctions are currently possible.
A
2
The existence of an ethical duty on the part of Commerce & Trade Company,and other businesses,to prevent an attack by hackers on business computer systems,and consequent theft of customers' and employees' personal data,is evidenced by
A)a business's offer of credit monitoring in the event of a breach.
B)a business's cyber security insurance.
C)the individuals' trust in the business to protect their data.
D)a business's stated "Privacy Policy."
A)a business's offer of credit monitoring in the event of a breach.
B)a business's cyber security insurance.
C)the individuals' trust in the business to protect their data.
D)a business's stated "Privacy Policy."
A
3
Hackers infiltrate the computer system of Metro Bank and steal the personal information of Metro's customers and employees.Individuals whose personal information is involved in the breach should be notified,as required by law in
A)all states.
B)forty-seven states.
C)no state.
D)one state-California.
A)all states.
B)forty-seven states.
C)no state.
D)one state-California.
B
4
USA Sales Company publishes a "Privacy Policy" to attract customers,but fails to invest adequate resources in cyber security.A lack of security that allows hackers to steal customers' personal data from a business's computer system can be
A)the hackers' defense to criminal charges.
B)the ground for a suit by the Federal Trade Commission.
C)the basis for USA's recovery under a traditional insurance policy.
D)a source of bad publicity,but there are no other consequences.
A)the hackers' defense to criminal charges.
B)the ground for a suit by the Federal Trade Commission.
C)the basis for USA's recovery under a traditional insurance policy.
D)a source of bad publicity,but there are no other consequences.
Unlock Deck
Unlock for access to all 4 flashcards in this deck.
Unlock Deck
k this deck