Chapter 4 - Privacy - IT Ethics

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The _________ included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients.

American Recovery and Reinvestment Act

The _____ restricted the government's ability to secretly intercept communications.

Communications Act of 1934

The required the telecommunications industry to build tools into its products that federal investigators could use to eavesdrop on conversations and intercept electronic communications.

Communications Assistance for Law Enforcement Act

Under the _________, the Federal Communications Commission responded to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.

Communications Assistance for Law Enforcement Act

Users of the Firefox, Explorer, or Safari Web browsers can select a(n) option so that the browser sends a message to each site visited that the users do not wish to have cookies deposited on their computer.

Do not track

A(n) uses sensors located around the vehicle to capture and record information about vehicle speed and acceleration.

EDR

The _______ prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites.

Electronic Communications Privacy Act

Title I of the _________ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.

Electronic Communications Privacy Act

____________ includes photographs, sound recordings, and databases stored on hard drives, CDs, and flash drives.

Electronically stored information

The _______ bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries.

European Union Data Protection Directive

The Fair Credit Reporting Act is enforced by the .

FTC (Federal Trade Commission)

The ________ outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained.

Fair Credit Reporting Act

The _______ allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies.

Fair and Accurate Credit Transactions Act

The __________ presumes that a student's records are private and not available to the public without the consent of the student.

Family Educational Rights and Privacy Act

The Communications Act of 1934 established the ________ .

Federal Communications Commission

Under the , once a case is filed, the involved parties are required to meet and discuss various e-discovery issues, such as how to preserve discoverable data, how the data will be produced, agreement on the format in which the data will be provided, and whether production of certain electronically stored information will lead to waiver of attorney-client privilege.

Federal Rules of Procedure

In Doe v. Holder, the courts ruled that the NSL gag provision violates the _______.

First Amendment

In 2008, the __________ granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities.

Foreign Intelligence Surveillance Act Amendments Act

The ________meets in secret to hear applications for and grant or deny orders approving electronic surveillance anywhere within the United States.

Foreign Intelligence Surveillance Act court

The ______ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.

Fourth Amendment

The ______ enables the public to gain access to certain government records.

Freedom of Information Act

The is a powerful tool for journalists and the public to acquire information that the government is reluctant to release.

Freedom of Information Act

The _______ is an act that repealed a depression-era law known as Glass-Steagall.

Gramm-Leach-Bliley Act

Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

Gramm-Leach-Bliley Act

Under the Act, healthcare companies must appoint a privacy officer to develop privacy policies and procedures as well as train employees on how to handle sensitive patient data.

HIPPA

The potential for decreased productivity and increased legal liabilities has led many employers to monitor workers to ensure that corporate are being followed.

IT usage policies

The Fair and Accurate Credit Transactions Act helped establish the to help prevent identity theft.

National Fraud Alert System

The fair information practices of the , established in 1980, are often held up as the model of ethical treatment of consumer data.

OECD

The ______ prohibits the government from concealing the existence of any personal data record-keeping systems.

Privacy act

The _________ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records.

USA PATRIOT Act

The of 2001 was passed just after the terrorist attacks of September 11, 2001.

USA Patriot Act

The Foreign Intelligence Surveillance Act:

allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

After have been stored on a computer, they make it possible for a Web site to tailor the ads and promotions presented on it.

cookies

In the context of tenets of the The European Union Data Protection Directive, __________ refers to an individual's right to challenge the accuracy of the data and provide the corrected data.

correction

In the context of the Organisation for Economic Co-operation and Development (OECD) privacy guidelines, refers to the fact that personal data should be accurate, complete, current, and relevant to the purpose for which it is used .

data quality

The Organisation for Economic Co-operation and Development's requirement that personal data collected should be accurate, complete, current, and relevant to the purpose for which it is used is based on the principle of ________ .

data quality

The Children's Online Privacy Protection Act _______.

does not cover the dissemination of information to children

In the context of tenets of The European Union Data Protection Directive, _________ refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights.

enforcement

One purpose of a(n) _______ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.

event data recorder

Discovery is part of the pretrial phase of a lawsuit in which each party can obtain ________ from the other party by various means.

evidence

A private organization can defeat a privacy claim simply by proving that an employee had been given that email, Internet use, and files on company computers were not private and that their use might be monitored.

explicit notice

is a term for a set of guidelines that govern the collection and use of personal data.

fair information practice

The Organisation for Economic Cooperation and Development's _________, established in 1980, are often held up as the model of ethical treatment of consumer data.

fair information practices

T or F : A National Security Letter is subject to judicial review and oversight.

false

T or F : A pen register is a device that records the originating number of incoming calls for a particular phone number.

false

T or F : American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy.

false

T or F : Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.

false

T or F : The Glass-Steagall Act allows consumers to obtain a free credit report once each year from each of the three primary consumer credit reporting companies.

false

T or F : The Privacy Act of 1974 extends to the actions of the CIA, U.S. law enforcement agencies, and the private industry.

false

T or F : The U.S. has a single, overarching national data privacy policy.

false

T or F : The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request.

false

T or F : The rights assigned to parents by the Family Educational Rights and Privacy Act transfer to the student once the student reaches the age of 21.

false

T or F : There is virtually no way to limit the deposit of cookies on a user's hard drive.

false

T or F : Title III of the Wiretap Act allows state and federal law enforcement officials to use wiretapping without requiring them to obtain warrants.

false

T or F : Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.

false

is information relating to the capabilities, intentions, or activities of foreign governments or agents of foreign governments or foreign organizations.

foregin intelligence

Financial institutions must inform consumers of their right to , that is, to refuse to give the institution the right to collect and share personal data with unaffiliated parties.

opt out

A(n) is a device that records electronic impulses to identify the numbers dialed for outgoing calls

pen register

The concept of privacy is _______.

protected by the Bill of Rights

The requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data.

safeguards rule

A(n) __________ can be loaded onto someone's cell phone or smartphone within minutes, making it possible for the user to perform location tracking, record calls, view every text message or picture sent or received, and record the URLs of any Web site visited on the phone.

stalking app

A(n) _________ is a device that records the originating number of incoming calls for a particular phone number.

trap and trace

T or F : A vehicle event data recorder (EDR) is a device that records vehicle and occupant data for a few seconds before, during, and after any vehicle crash that is severe enough to deploy the vehicle's air bags.

true

T or F : Electronic discovery is the collection, preparation, review, and production of electronically stored information for use in criminal and civil actions and proceedings.

true

T or F : Electronically stored information includes any form of digital information stored on any form of electronic storage device.

true

T or F : Exemptions to the Freedom of Information Act bar disclosure of information that could compromise national security or interfere with an active law enforcement investigation.

true

T or F : Information privacy is the combination of communications privacy and data privacy.

true

T or F : Public sector employees have far greater privacy rights than those in private industry because the Fourth Amendment does not limit how a private employer treats its employees.

true

T or F : The Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights.

true

T or F : The European Union Data Protection Directive requires member countries to ensure that data transferred to non- European Union countries is protected.

true

T or F : The Foreign Intelligence Surveillance Act describes procedures for the electronic surveillance of communications between foreign powers and the agents of foreign powers.

true

T or F : The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.

true

T or F : The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.

true

T or F : The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.

true

T or F : The pretexting rule addresses attempts by people to access personal information without proper authority by such means as impersonating an account holder or phishing.

true

T or F : The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.

true

T or F : The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used.

true

T or F : Through the use of cookies, a Web site is able to identify visitors on subsequent visits.

true

T or F : Under the USA PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply of the basis that the information is needed for an ongoing investigation.

true

T or F :Advocates of advanced surveillance technology argue that people have no legitimate expectation of privacy in a public place, and thus Fourth Amendment privacy rights do not apply.

true

The Fourth Amendment of the Constitution protects right of the people to be secure in their persons, houses, papers, and effects, against .

unreasonable searches and seizures

Title II of the Electronic Communications Privacy Act of 1986 prohibits unauthorized access to stored

wire and electronic communications

Under Title III of the Omnibus Crime Control and Safe Street Act, a warrant must be obtained from a judge to conduct a(n) .

wiretap

In the context of the Fourth Amendment, the courts have ruled that ______.

without a reasonable expectation of privacy, there is no privacy right

The Health Insurance Portability and Accountability Act requires healthcare providers to obtain ______ from patients prior to disclosing any information in their medical records.

written consent


संबंधित स्टडी सेट्स

Cognitive Psych Quiz 2: Chapter 5

View Set

ACC 630 - Audit Practice Questions

View Set

Chapter 22: Pneumothorax, Hemothorax, and Flail Chest

View Set

Module 2: Connecting and Communicating Online

View Set

Pharmacology Chapter 57 Diabetes

View Set