Matching
Match the U.S. government privacy law with its description below.
Premises:
Closes a narrow loophole in the law that allowed people to give away copyrighted material (such as software) on the Internet without legal repercussions
Regulates disclosure of cable television subscriber records
Protects children from obscene and pornographic materials by requiring libraries to install filtering software on their computers; upheld by the Supreme Court in July 2003
Establishes the Dot Kids domain that lists only Web sites that conform to policies to protect children under the age of 13; it functions similarly to the children's section of a library and was ruled unconstitutional in 2004
Restricts activities of telemarketers
Gives students and parents access to school records and limits disclosure of and records to unauthorized parties
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam
Amends 1984 and 1996 acts to outlaw transmission of harmful computer code such as viruses
Strictly outlines procedures federal agencies must follow when looking at customer records in banks
Forbids retailers from releasing or selling video-rental records without customer consent or a court order
Responses:
Children's Internet Protection Act (CIPA)
Telephone Consumer Protection Act
CAN-SPAM Act
Right to Financial Privacy Act
Family Educational Rights Privacy Act
Cable Communications Policy Act
No Electronic Theft (NET) Act
Video Privacy Protection Act
Dot Kids Implementation and Efficiency Act
Computer Abuse Amendments Act
Correct Answer:
Premises:
Responses:
Closes a narrow loophole in the law that allowed people to give away copyrighted material (such as software) on the Internet without legal repercussions
Regulates disclosure of cable television subscriber records
Protects children from obscene and pornographic materials by requiring libraries to install filtering software on their computers; upheld by the Supreme Court in July 2003
Establishes the Dot Kids domain that lists only Web sites that conform to policies to protect children under the age of 13; it functions similarly to the children's section of a library and was ruled unconstitutional in 2004
Restricts activities of telemarketers
Gives students and parents access to school records and limits disclosure of and records to unauthorized parties
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam
Amends 1984 and 1996 acts to outlaw transmission of harmful computer code such as viruses
Strictly outlines procedures federal agencies must follow when looking at customer records in banks
Forbids retailers from releasing or selling video-rental records without customer consent or a court order
Premises:
Closes a narrow loophole in the law that allowed people to give away copyrighted material (such as software) on the Internet without legal repercussions
Regulates disclosure of cable television subscriber records
Protects children from obscene and pornographic materials by requiring libraries to install filtering software on their computers; upheld by the Supreme Court in July 2003
Establishes the Dot Kids domain that lists only Web sites that conform to policies to protect children under the age of 13; it functions similarly to the children's section of a library and was ruled unconstitutional in 2004
Restricts activities of telemarketers
Gives students and parents access to school records and limits disclosure of and records to unauthorized parties
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam
Amends 1984 and 1996 acts to outlaw transmission of harmful computer code such as viruses
Strictly outlines procedures federal agencies must follow when looking at customer records in banks
Forbids retailers from releasing or selling video-rental records without customer consent or a court order
Responses:
Related Questions
Q3: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX9290/.jpg" alt=" An antipiracy technology
Q4: A _ virus inserts virus code into
Q29: Surge protectors _.<br>A) smooth out minor voltages<br>B)
Q42: A _ is a program that is
Q51: _ studies have shown that using the
Q59: A(n) _ is a complete power failure.<br>A)
Q73: Critical Thinking Case 8-1<br>Your computer is not
Q74: A(n) _ replaces the program used to
Q81: A proxy server screens all incoming and
Q103: A _ virus hides virus code within