cyberlaw quiz/exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Electronic Communications Privacy Act covers (select all that apply): A. unauthorized access or alternation of stored communications B. unauthorized disclosure of an electronic communication C. an exception for computer professionals who access computer systems for routine business of updating or maintaining them D. the same things as are in the Wiretap Act

all of the above

The EU's General Data Protection Regulation (select all that apply): a) includes the right to be forgotten, a right also present in US data laws. b) includes a data breach notification requirement. c) covers protection of personally identifiable information, which can include web search histories, racial or ethnic data, and tagged photos. d) includes a right to data portability.

b,c,d

In Carpenter v. the US, the US Supreme Court held the government's warrantless acquisition of Carpenter's cell-site records violated his against unreasonable searches and seizures. This right arises out of the following Amendment to the US Constitution: 1st Amendment 4th Amendment 8th Amendment 17th Amendment

4th Amendment

Select the most prevalent and important privacy based-torts outlined in the text and lecture (select as many as are correct): A. intrusion upon seclusion B. appropriation of name or likeness (right of publicity) C. private disclosure of public fact D. false light E. public disclosure of private fact F. COPPA action

A. intrusion upon seclusion B. appropriation of name or likeness (right of publicity) D. false light E. public disclosure of private fact

Law enforcement investigations of cybercrime are made difficult by (select all that apply): A. private companies who are reluctant to share data with investigators as it may show criminal behavior of company customers. B. the wording of the 4th Amendment which does not clarify what sort of technology-based searches are legal. C. wrongdoers who may be in other jurisdictions unreachable by law enforcement. D. none of the above

A. private companies who are reluctant to share data with investigators as it may show criminal behavior of company customers. B. the wording of the 4th Amendment which does not clarify what sort of technology-based searches are legal. C. wrongdoers who may be in other jurisdictions unreachable by law enforcement.

Technologies such as artificial intelligence and blockchain: A. will not affect cybersecurity operations in the future B. can make data security even more difficult C. should be adopted by all multi-national corporations D. will ensure hackers have fewer opportunities to disrupt business

B. can make data security even more difficult

In 2021, the US Supreme Court issued an opinion on the Computer Fraud and Abuse Act. The Court (select all that apply): A. expanded the number of actions considered crimes under the CFAA. B. held a person is not "exceeding authorized access" when they are misusing a database they already have access to as part of their job. C. increased the likelihood that someone could be charged with a CFAA crime for using their work computer to send a personal email, in violation of workplace policies limiting tech access to business use only. D. narrowed the number of actions considered crimes under the CFAA.

B. held a person is not "exceeding authorized access" when they are misusing a database they already have access to as part of their job. D. narrowed the number of actions considered crimes under the CFAA.

The Children's Online Privacy Protection Act: A. requires websites take extraordinary measures to protect confidentiality, security and integrity of information collected from children. B. applies to websites directed to anyone under the age of 18. C. includes protections for children's names, address, telephone information, geolocation, screen names, and other personal information. D. is enforced by the ATF.

C. includes protections for children's names, address, telephone information, geolocation, screen names, and other personal information.

The Electronic Espionage Act (EEA) makes it a crime to A. traffic in devices designed to defeat anti-piracy devices. B. collect and distribute passwords for commercial gain. C. intercept private financial communications. D. steal trade secrets by computer or other means.

D. steal trade secrets by computer or other means.

Data privacy and data security are the same thing under the law. True False

False

What are the four types of information technology contracts?

Sales, Leases, Licenses, and cloud computing contracts


Ensembles d'études connexes

HRM 300T Apply Week 2 Apply Assignment

View Set

Protection of Information Assets

View Set

United States Foreign Relations midterm

View Set