Deck 4: Privacy

Full screen (f)
exit full mode
Question
The Foreign Intelligence Surveillance Act allows the surveillance and collection of information about foreign governments or agents of foreign governments or organizations, only if a warrant is obtained from the FISA court within 72 hours after surveillance begins.
Use Space or
up arrow
down arrow
to flip the card.
Question
A pen register is a device that records the originating number of incoming calls for a particular phone number.
Question
Title III of the Omnibus Crime Control and Safe Streets Act is also know as the Wiretap Act and authorizes wiretapping and electronic eavesdropping without the requirement of first obtaining a warrant from a judge.
Question
The Children's Online Privacy Protection Act requires a Web site that caters to children to offer comprehensive privacy policies and to receive parental consent before collecting any personal information from children under 18 years of age.
Question
The Electronic Communications Privacy Act of 1986 required the communications industry to build tools into its products that federal investigators could use-after obtaining a court order-to eavesdrop on conversations and intercept electronic communications.
Question
A sunset provision extends a law beyond a specific date unless further legislative action is taken to repeal the law.
Question
One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in online privacy.
Question
The European Union Data Protection Directive requires member countries to ensure that data transferred is protected. It has no impact on non-European Union countries.
Question
Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order but only if the FBI believed the individual to be a foreign spy.
Question
HIPPA requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
Question
Incidents of identity theft exceeded 4% of the overall U.S. adult population in 2008 resulting in losses of some $48 billion.
Question
Roger Clark, director of the ACLU, first coined the term information privacy which is the combination of communications privacy and data privacy.
Question
The Freedom of Information Act prohibits the government from concealing the existence of any personal data record-keeping systems.
Question
The Gramm-Leach-Bliley Act repealed the prohibition of any one institution from offering investment, commercial banking, and insurance services. It also included three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.
Question
The right to personal privacy is explicitly spelled out in the Constitution.
Question
The right to privacy is closely associated with the Second Amendment to the Constitution.
Question
The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used.
Question
The cost of a data breach can be quite expensive, by some estimates nearly $500 for each record lost. Nearly half the cost is due to lost business opportunity associated with customers who've been lost due to the incident.
Question
A Freedom of Information Act request prevents disclosure of records if it would invade someone's privacy. A balancing test must be applied to evaluate whether the privacy interests at stake are outweighed by competing public interests.
Question
The U.S. approach to data privacy involves strict government regulation while the European approach relies on self-regulation.
Question
There is virtually no way to limit the deposit of cookies on your hard drive.
Question
Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place.
Question
Companies that can't protect or don't respect customer information often lose business and some become defendants in class action lawsuits stemming from privacy violations.
Question
There is no federal law requiring that organizations reveal a data breach, however, more than half the states have implemented such legislation.
Question
The Foreign Intelligence Surveillance Act ____.

A) describes procedures for the electronic surveillance and collection of competitive intelligence about foreign organizations
B) created the FISA court which rules over the admissibility in court of information obtained from foreign wiretaps
C) Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party
D) requires that each application for a surveillance warrant be made before the attorney general
Question
The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.
Question
Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.
Question
Spyware frequently employs sophisticated methods to avoid detection by popular software packages that are specifically designed to combat it.
Question
Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

A) Fair Credit Reporting Act
B) HIPAA
C) Gramm-Leach-Bliley Act
D) USA PATRIOT Act
Question
The Children's Online Privacy Protection Act ____.

A) was found to be unconstitutional
B) is meant to give Web masters control over the collection, use, and disclosure of children's personal information
C) does not cover the dissemination of information to children
D) requires the installation of Internet filters in public libraries
Question
The Supreme Court has ruled that ____.

A) without a reasonable expectation of privacy, there is no privacy right
B) Federal agents can listen to phone conversations of U.S. citizens without a warrant
C) recordings by the FBI of various telephone calls made by a U.S. citizen from a public phone booth do not violate an individual's privacy
D) the Fourth Amendment is no longer valid
Question
Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records.

A) payment for all services rendered
B) a social security number
C) a second opinion
D) written consent
Question
The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace.

A) Foreign Intelligence Surveillance Act
B) Electronic Communications Privacy Act
C) Communications Assistance for Law Enforcement Act
D) USA PATRIOT Act
Question
The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions.

A) Fair Credit Reporting Act
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Electronic Communications Privacy Act
Question
The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public.

A) Foreign Intelligence Surveillance Act
B) Electronic Communications Privacy Act
C) USA PATRIOT Act
D) Communications Assistance for Law Enforcement Act
Question
Online marketers use personalization software to optimize the number, frequency, and mixture of their ad placements, and to evaluate how visitors react to new ads.
Question
Cookies allow marketers to collect click-stream data-information gathered by monitoring a consumer's online activity.
Question
The concept of privacy is ____.

A) protected by the U.S. constitution
B) protected by a number of amendments in the Bill of Rights
C) protected by only the Fourth Amendment
D) protected only by Federal statutes implemented in the late 19th century
Question
Demographic filtering augments click-stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions.
Question
The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) HIPAA
D) Electronic Communications Privacy Act
Question
____ is information gathered by monitoring a consumer's online activity.

A) Affiliate data
B) Breach data
C) Click-stream data
D) Identity data
Question
In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____.

A) the Fair Information Practices Act
B) USA PATRIOT Act
C) First Amendment
D) sunset provision
Question
____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion.

A) E-mail spam
B) Phishing
C) Identity theft
D) Cybercrime
Question
The ____ seal program identifies online businesses that honor their own stated privacy protection policies.

A) TRUSTe
B) Fair Information Practices
C) BBBOnLine
D) Business Software Alliance
Question
The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

A) USA PATRIOT Act
B) First Amendment
C) Fourth Amendment
D) Freedom of Information Act
Question
The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt.

A) European Union Data Protection Directives
B) Fair Information Practices
C) transborder data flow principles
D) BBB Online data protection guidelines
Question
The ____ enables the public to gain access to certain government records.

A) Fair Information Practices Act
B) USA PATRIOT Act
C) Privacy Act
D) Freedom of Information Act
Question
The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's.

A) Fair Information Protection Act
B) Fair Credit Reporting Act
C) Freedom of Information Act
D) European Union Data Protection Directive
Question
Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation.

A) warrant
B) National Security Letter
C) roving wiretap
D) trap and trace order
Question
Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.

A) USA PATRIOT Act
B) Communications Assistance for Law Enforcement Act
C) Electronic Communications Privacy Act
D) Foreign Intelligence Surveillance Act
Question
The ____ prohibits the government from concealing the existence of any personal data record-keeping systems.

A) Fair Information Practices Act
B) USA PATRIOT Act
C) Privacy Act
D) Freedom of Information Act
Question
A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire.

A) Internet filters
B) contextual commerce software
C) Platform for Privacy Preferences
D) cookies
Question
A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored.

A) pen-register
B) trap-and-trace
C) roving wiretap
D) search and seizure warrant
Question
The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records.

A) HIPAA
B) Communications Assistance for Law Enforcement Act
C) USA PATRIOT Act
D) Foreign Intelligence Surveillance Act
Question
A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law.

A) sunset provision
B) gag rule
C) amendment
D) Sunday law
Question
The institution and communication of an ____ establishes boundaries of acceptable behavior and enables managers to take action against violators.

A) IT code of ethics
B) IT usage policy
C) IT service level agreement
D) IT support guidelines
Question
____ is keystroke-logging software downloaded to users' computers without the knowledge or consent of the user.

A) A cookie
B) Spyware
C) Spear-phishing
D) A virus
Question
For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization's oversight and consumer resolution process, and pay an annual fee.

A) TRUSTe
B) Fair Information Practices
C) BBBOnLine
D) Business Software Alliance
Question
____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site.

A) Click-stream data
B) Spyware
C) Rules-based personalized software
D) Contextual commerce software
Question
In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____.

A) simply cannot be trusted
B) have no legitimate expectation of privacy in public
C) must avoid public places
D) should forego the right to assemble in large groups in public
Question
The three primary credit-reporting companies include Experian, Equifax, and ____________________.
Question
The ___________________________________ is a powerful tool for journalists and the public to acquire information that the government is reluctant to release.
or
or
or
Question
Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for a(n) _________________________.
Question
According to Benjamin Franklin, "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor ____________________.
Question
The ______________________________ established the Federal Communications Commission and gave it responsibility for regulating all non-federal-government use of radio and television broadcasting and all interstate telecommunications-including wire, satellite, and cable-as well as all international communications that originate or terminate in the United States.
Question
The __________________________________________________ required the telecommunications industry to build tools into its products that federal investigators could use to eavesdrop on conversations and intercept electronic communications.
or
or
or
Question
The U.S. Department of Commerce worked out an agreement with the European Union that would allow American companies that could certify adherence to certain ____________________ to import and export personal data.
Question
Under Title III of the Omnibus Crime Control and Safe Street Act, a warrant must be obtained from a judge to conduct a(n) ____________________.
Question
Title II of the Electronic Communications Privacy Act of 1986 prohibits unauthorized access to stored ___________________________________.
or
or
or
Question
The ____________________ meets in secret to hear applications for and grant or deny orders approving electronic surveillance anywhere within the United States.
Question
The set of privacy guidelines set by the Organisation for Economic Co-operation and Development (OECD) and consisting of eight principles is commonly known as the _________________________.
Question
Under the Health Insurance Portability and Accountability Act, healthcare companies must appoint a(n) ____________________ to develop privacy policies and procedures as well as train employees on how to handle sensitive patient data.
Question
The ________________________________________ bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's.
Question
Recognizing that the PATRIOT Act was both quickly written and very broad in scope, Congress wisely designated several ____________________ provisions that were written to terminate on December 31, 2005.
Question
Under the Gramm-Leach-Bliley Act, customers who take no action on the privacy notice, automatically ____________________ and give financial institutions the right to share personal data with other financial institutions.
Question
The ____________________ provided law enforcement authorities more power to track down terrorists and prevent future attacks.
or
Question
A Web site operator can apply for a BBBOnLine reliability seal or a TRUSTe data privacy seal to demonstrate that his or her site adheres to a high level of ____________________.
Question
One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in ______________________________.
Question
A device that records electronic impulses to identify the numbers dialed for outgoing calls is called a(n) ____________________.
Question
Identify thieves may install ____________________ to capture the keystrokes of victims.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/95
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Privacy
1
The Foreign Intelligence Surveillance Act allows the surveillance and collection of information about foreign governments or agents of foreign governments or organizations, only if a warrant is obtained from the FISA court within 72 hours after surveillance begins.
False
2
A pen register is a device that records the originating number of incoming calls for a particular phone number.
False
3
Title III of the Omnibus Crime Control and Safe Streets Act is also know as the Wiretap Act and authorizes wiretapping and electronic eavesdropping without the requirement of first obtaining a warrant from a judge.
False
4
The Children's Online Privacy Protection Act requires a Web site that caters to children to offer comprehensive privacy policies and to receive parental consent before collecting any personal information from children under 18 years of age.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
5
The Electronic Communications Privacy Act of 1986 required the communications industry to build tools into its products that federal investigators could use-after obtaining a court order-to eavesdrop on conversations and intercept electronic communications.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
6
A sunset provision extends a law beyond a specific date unless further legislative action is taken to repeal the law.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
7
One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in online privacy.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
8
The European Union Data Protection Directive requires member countries to ensure that data transferred is protected. It has no impact on non-European Union countries.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
9
Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order but only if the FBI believed the individual to be a foreign spy.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
10
HIPPA requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
11
Incidents of identity theft exceeded 4% of the overall U.S. adult population in 2008 resulting in losses of some $48 billion.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
12
Roger Clark, director of the ACLU, first coined the term information privacy which is the combination of communications privacy and data privacy.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
13
The Freedom of Information Act prohibits the government from concealing the existence of any personal data record-keeping systems.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
14
The Gramm-Leach-Bliley Act repealed the prohibition of any one institution from offering investment, commercial banking, and insurance services. It also included three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
15
The right to personal privacy is explicitly spelled out in the Constitution.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
16
The right to privacy is closely associated with the Second Amendment to the Constitution.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
17
The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
18
The cost of a data breach can be quite expensive, by some estimates nearly $500 for each record lost. Nearly half the cost is due to lost business opportunity associated with customers who've been lost due to the incident.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
19
A Freedom of Information Act request prevents disclosure of records if it would invade someone's privacy. A balancing test must be applied to evaluate whether the privacy interests at stake are outweighed by competing public interests.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
20
The U.S. approach to data privacy involves strict government regulation while the European approach relies on self-regulation.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
21
There is virtually no way to limit the deposit of cookies on your hard drive.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
22
Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
23
Companies that can't protect or don't respect customer information often lose business and some become defendants in class action lawsuits stemming from privacy violations.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
24
There is no federal law requiring that organizations reveal a data breach, however, more than half the states have implemented such legislation.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
25
The Foreign Intelligence Surveillance Act ____.

A) describes procedures for the electronic surveillance and collection of competitive intelligence about foreign organizations
B) created the FISA court which rules over the admissibility in court of information obtained from foreign wiretaps
C) Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party
D) requires that each application for a surveillance warrant be made before the attorney general
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
26
The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
27
Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
28
Spyware frequently employs sophisticated methods to avoid detection by popular software packages that are specifically designed to combat it.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
29
Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

A) Fair Credit Reporting Act
B) HIPAA
C) Gramm-Leach-Bliley Act
D) USA PATRIOT Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
30
The Children's Online Privacy Protection Act ____.

A) was found to be unconstitutional
B) is meant to give Web masters control over the collection, use, and disclosure of children's personal information
C) does not cover the dissemination of information to children
D) requires the installation of Internet filters in public libraries
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
31
The Supreme Court has ruled that ____.

A) without a reasonable expectation of privacy, there is no privacy right
B) Federal agents can listen to phone conversations of U.S. citizens without a warrant
C) recordings by the FBI of various telephone calls made by a U.S. citizen from a public phone booth do not violate an individual's privacy
D) the Fourth Amendment is no longer valid
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
32
Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records.

A) payment for all services rendered
B) a social security number
C) a second opinion
D) written consent
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
33
The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace.

A) Foreign Intelligence Surveillance Act
B) Electronic Communications Privacy Act
C) Communications Assistance for Law Enforcement Act
D) USA PATRIOT Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
34
The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions.

A) Fair Credit Reporting Act
B) HIPAA
C) Gramm-Leach-Bliley Act
D) Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public.

A) Foreign Intelligence Surveillance Act
B) Electronic Communications Privacy Act
C) USA PATRIOT Act
D) Communications Assistance for Law Enforcement Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
36
Online marketers use personalization software to optimize the number, frequency, and mixture of their ad placements, and to evaluate how visitors react to new ads.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
37
Cookies allow marketers to collect click-stream data-information gathered by monitoring a consumer's online activity.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
38
The concept of privacy is ____.

A) protected by the U.S. constitution
B) protected by a number of amendments in the Bill of Rights
C) protected by only the Fourth Amendment
D) protected only by Federal statutes implemented in the late 19th century
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
39
Demographic filtering augments click-stream data and user-supplied data with demographic information associated with user zip codes to make product suggestions.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained.

A) Gramm-Leach-Bliley Act
B) Fair Credit Reporting Act
C) HIPAA
D) Electronic Communications Privacy Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
41
____ is information gathered by monitoring a consumer's online activity.

A) Affiliate data
B) Breach data
C) Click-stream data
D) Identity data
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
42
In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____.

A) the Fair Information Practices Act
B) USA PATRIOT Act
C) First Amendment
D) sunset provision
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
43
____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion.

A) E-mail spam
B) Phishing
C) Identity theft
D) Cybercrime
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
44
The ____ seal program identifies online businesses that honor their own stated privacy protection policies.

A) TRUSTe
B) Fair Information Practices
C) BBBOnLine
D) Business Software Alliance
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
45
The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

A) USA PATRIOT Act
B) First Amendment
C) Fourth Amendment
D) Freedom of Information Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
46
The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt.

A) European Union Data Protection Directives
B) Fair Information Practices
C) transborder data flow principles
D) BBB Online data protection guidelines
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
47
The ____ enables the public to gain access to certain government records.

A) Fair Information Practices Act
B) USA PATRIOT Act
C) Privacy Act
D) Freedom of Information Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
48
The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's.

A) Fair Information Protection Act
B) Fair Credit Reporting Act
C) Freedom of Information Act
D) European Union Data Protection Directive
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
49
Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation.

A) warrant
B) National Security Letter
C) roving wiretap
D) trap and trace order
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
50
Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.

A) USA PATRIOT Act
B) Communications Assistance for Law Enforcement Act
C) Electronic Communications Privacy Act
D) Foreign Intelligence Surveillance Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
51
The ____ prohibits the government from concealing the existence of any personal data record-keeping systems.

A) Fair Information Practices Act
B) USA PATRIOT Act
C) Privacy Act
D) Freedom of Information Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
52
A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire.

A) Internet filters
B) contextual commerce software
C) Platform for Privacy Preferences
D) cookies
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
53
A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored.

A) pen-register
B) trap-and-trace
C) roving wiretap
D) search and seizure warrant
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
54
The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records.

A) HIPAA
B) Communications Assistance for Law Enforcement Act
C) USA PATRIOT Act
D) Foreign Intelligence Surveillance Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
55
A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law.

A) sunset provision
B) gag rule
C) amendment
D) Sunday law
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
56
The institution and communication of an ____ establishes boundaries of acceptable behavior and enables managers to take action against violators.

A) IT code of ethics
B) IT usage policy
C) IT service level agreement
D) IT support guidelines
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
57
____ is keystroke-logging software downloaded to users' computers without the knowledge or consent of the user.

A) A cookie
B) Spyware
C) Spear-phishing
D) A virus
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
58
For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization's oversight and consumer resolution process, and pay an annual fee.

A) TRUSTe
B) Fair Information Practices
C) BBBOnLine
D) Business Software Alliance
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
59
____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site.

A) Click-stream data
B) Spyware
C) Rules-based personalized software
D) Contextual commerce software
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
60
In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____.

A) simply cannot be trusted
B) have no legitimate expectation of privacy in public
C) must avoid public places
D) should forego the right to assemble in large groups in public
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
61
The three primary credit-reporting companies include Experian, Equifax, and ____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
62
The ___________________________________ is a powerful tool for journalists and the public to acquire information that the government is reluctant to release.
or
or
or
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
63
Under the PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for a(n) _________________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
64
According to Benjamin Franklin, "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor ____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
65
The ______________________________ established the Federal Communications Commission and gave it responsibility for regulating all non-federal-government use of radio and television broadcasting and all interstate telecommunications-including wire, satellite, and cable-as well as all international communications that originate or terminate in the United States.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
66
The __________________________________________________ required the telecommunications industry to build tools into its products that federal investigators could use to eavesdrop on conversations and intercept electronic communications.
or
or
or
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
67
The U.S. Department of Commerce worked out an agreement with the European Union that would allow American companies that could certify adherence to certain ____________________ to import and export personal data.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
68
Under Title III of the Omnibus Crime Control and Safe Street Act, a warrant must be obtained from a judge to conduct a(n) ____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
69
Title II of the Electronic Communications Privacy Act of 1986 prohibits unauthorized access to stored ___________________________________.
or
or
or
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
70
The ____________________ meets in secret to hear applications for and grant or deny orders approving electronic surveillance anywhere within the United States.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
71
The set of privacy guidelines set by the Organisation for Economic Co-operation and Development (OECD) and consisting of eight principles is commonly known as the _________________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
72
Under the Health Insurance Portability and Accountability Act, healthcare companies must appoint a(n) ____________________ to develop privacy policies and procedures as well as train employees on how to handle sensitive patient data.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
73
The ________________________________________ bars the export of data to countries that do not have data privacy protection standards comparable to the European Union's.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
74
Recognizing that the PATRIOT Act was both quickly written and very broad in scope, Congress wisely designated several ____________________ provisions that were written to terminate on December 31, 2005.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
75
Under the Gramm-Leach-Bliley Act, customers who take no action on the privacy notice, automatically ____________________ and give financial institutions the right to share personal data with other financial institutions.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
76
The ____________________ provided law enforcement authorities more power to track down terrorists and prevent future attacks.
or
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
77
A Web site operator can apply for a BBBOnLine reliability seal or a TRUSTe data privacy seal to demonstrate that his or her site adheres to a high level of ____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
78
One of the key factors affecting the growth of e-commerce is the lack of Internet users' confidence in ______________________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
79
A device that records electronic impulses to identify the numbers dialed for outgoing calls is called a(n) ____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
80
Identify thieves may install ____________________ to capture the keystrokes of victims.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 95 flashcards in this deck.