Deck 10: Legal, Regulations, Investigations, and Compliance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 10: Legal, Regulations, Investigations, and Compliance
1
When criminals use computers to help them steal confidential organizational data, a computer-assisted crime has occurred.
True
2
Software piracy is an example of computer prevalence crime.
True
3
Civil/tort law is a group of laws that recognizes exclusive rights for creations of the mind.
False
4
Most organizations that have trademarks attempt to protect these secrets using nondisclosure agreements (NDAs).
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
PII is any piece of data that can be used alone or with other information to identify a single person.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
The Electronic Communications Privacy Act (ECPA) of 1986 affects law enforcement and intelligence agencies.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
The purpose of the USA PATRIOT Act of 2001 is to enhance the investigatory tools that law enforcement can use, including e-mail communications, telephone records, Internet communications, medical records, and financial records.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
A safe harbor is a country that fails to legally protect personal data with the main aim being to attract companies engaged in the collection of the data.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Due care and due diligence are independent of each other.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
When investigating a computer crime, evidentiary rules do not need to be addressed.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker?
A) Computer prevalence crime
B) Computer targeted crime
C) Computer-assisted crime
D) Incidental computer crime
A) Computer prevalence crime
B) Computer targeted crime
C) Computer-assisted crime
D) Incidental computer crime
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which type of law reflects on the morals of the people and relies heavily on precedence?
A) Civil/tort law
B) Criminal law
C) Common law
D) Civil code law
A) Civil/tort law
B) Criminal law
C) Common law
D) Civil code law
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which intellectual property right is granted to an individual or company to cover an invention C described in the application?
A) Copyright
B) Patent
C) Trademark
D) Trade secret
A) Copyright
B) Patent
C) Trademark
D) Trade secret
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
What is another word for shareware?
A) Trialware
B) Freeware
C) Commercial software
D) Software piracy
A) Trialware
B) Freeware
C) Commercial software
D) Software piracy
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which law affects any organization that is publicly traded in the United States?
A) Computer Fraud and Abuse Act (CFAA) of 1986
B) Gramm-Leach-Bliley Act (GLBA) of 1999
C) Health Insurance Portability and Accountability Act (HIPAA)
D) Sarbanes-Oxley (SOX) Act
A) Computer Fraud and Abuse Act (CFAA) of 1986
B) Gramm-Leach-Bliley Act (GLBA) of 1999
C) Health Insurance Portability and Accountability Act (HIPAA)
D) Sarbanes-Oxley (SOX) Act
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which act affects how private sector organizations collect, use, and disclose personal information in the course of commercial business in Canada?
A) Electronic Communications Privacy Act (ECPA) of 1986
B) Payment Card Industry Data Security Standard (PCI DSS)
C) Personal Information Protection and Electronic Documents Act (PIPEDA)
D) Basel II
A) Electronic Communications Privacy Act (ECPA) of 1986
B) Payment Card Industry Data Security Standard (PCI DSS)
C) Personal Information Protection and Electronic Documents Act (PIPEDA)
D) Basel II
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT part of the EU Principles on Privacy?
A) Data should be collected in accordance with the law.
B) Data should be used for any purpose for which it is needed.
C) Data should be used only for a reasonable period of time.
D) Information transferred to other organizations can be transferred only if the sharing organization has adequate security in place.
A) Data should be collected in accordance with the law.
B) Data should be used for any purpose for which it is needed.
C) Data should be used only for a reasonable period of time.
D) Information transferred to other organizations can be transferred only if the sharing organization has adequate security in place.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Which term is all about gathering information?
A) Due diligence
B) Due care
C) Negligence
D) Liability
A) Due diligence
B) Due care
C) Negligence
D) Liability
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
What is the second step of the incident response procedure?
A) Detect the incident.
B) Report the incident.
C) Recover from the incident.
D) Respond to the incident.
A) Detect the incident.
B) Report the incident.
C) Recover from the incident.
D) Respond to the incident.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
What is the first step in the order of volatility?
A) System processes
B) Network processes
C) Memory
D) Swap files
A) System processes
B) Network processes
C) Memory
D) Swap files
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck