Info Systems Ch 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In the U.S., there is some debate over privacy between those who favor data collection as a means to increase national security and those who view such programs as a violation of rights guaranteed by the Constitution and the Bill of Rights.

T

Some organizations choose to practice a form of Internet censorship by installing Internet filters on their employees' computers to prevent them from viewing sites containing pornography or other objectionable material.

T

The GDPR obligates organizations that operate in the European Union to obtain the consent of the people they collect information about.

T

The pages on a university's website are maintained by individual departments and organizational units. It is a useful policy to require that every change a user makes to his department pages be reviewed and approved.

T

The term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do.

T

U.S. federal law permits employers to prevent viewing of pornography in the workplace by employees.

T

Amy is doing some online research for a term paper. She'd like to access some information on a particular Web site, but the Web site is asking her to put in her email address before allowing her to view the information. She wonders what the Web site owner will do with that information, but there is no way for her to know how data collected via a Web site will be used.

F

Anonymous remailers both help protect freedom of speech by keeping communications anonymous and prevent people from using email for illegal or unethical purposes.

F

If an activity is defined as legal then it is ethical.

F

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.

F

Never send sensitive personal data such as credit card numbers, bank account numbers, or passwords via text or IM; only send them through Web sites that don't begin with https or cause a padlock icon to appear in the Address bar or status bar.

F

Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.

F

The American Recovery and Reinvestment Act Title XIII helped establish the National Fraud Alert system to help prevent identity theft.

F

The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.

F

If you use Google, the NSA can access your search history data without obtaining a court order.

T


Ensembles d'études connexes

MGMT MCGRAW HILL 12th edition chapter 4-6 (SB + quiz)

View Set

Protein Synthesis, Processing, and Degradation

View Set

Unit 1 - Differentiated Instruction

View Set

Pharmacology Week 1 Chapter Questions

View Set