INFO 323 - Comprehensive Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

FERPA mandates that the educational institution must provide access to a studen'ts request for access within _____ days.

45

If a company located in Massachusetts maintains all of its employees' personal information in a hosted online database inf Florida, what must the third-party service provider agree to?

A confidentiality provision.

Premise 1: Every A is a B; Premise 2: Every C is a A; Conclusion: C is a B. This is an example of a(n): A. Valid logic form B. Invalid logic form C. Logically inconsistent form D. Inconsistent argument

A. Valid logic form

What is scienter? A. knowledge that a representation is false B. damages given to a victim of fraud C. undue influence used on a party to a contract D. another term for duress

A. knowledge that a representation is false

Which of the following is not an example of cyberethics perspectives?

Absolute Truth

An invitation to make an offer or an actual offer is referred to as a(n) ________. A. Bid B. Advertisement C. Reward D. Proposal

B. Advertisement

Which of the following requires libraries and schools receiving Federal funds to regulate access by minors (under 17) to "harmful" speech on the Internet? A. COPPA B. CIPA C. Gramm-Leach-Bliley Act D. CAN-SPAM

B. CIPA

The ________ establishes a uniform and comprehensive set of rules that govern the creation, performance, and enforcement for computer information transactions. A. ECPA B. UCITA C. CAN-SPAM Act D. ACPA

B. UCITA

A person found speeding is considered to have committed a(n) ________. A. misdemeanor B. violation C. indictable offence D. felony

B. violation

Which of the following is (are) the standard(s) for IS security and controls? (Check all that apply) A. FTC B. FBI C. ISO 27001 D. NIST

C. ISO 27001 D. NIST

What is an example of passive data collection on a website? A. Drop-down list. B. Single sign-on service. C. Web beacon. D. De-selected check box.

C. Web beacon.

Under which of the following conditions is a contract said to have legal value? A. the promisor suffers a legal detriment B. both promisor and promisee receives a legal benefit C. the promisor receives a legal benefit D. both promisor and promisee suffers a legal detriment

C. the promisor receives a legal benefit

Parol evidence refers to _______ evidence. A. hearsay B. visual C. verbal D. eye-witness

C. verbal

An internal statement for users of personal information that defines the handling practices of the personal information is known as: A. Privacy notice B. Work rules C. Informated consent D. Privacy policy

D. Privacy policy

The obligation people owe each other not to cause any unreasonable harm or risk of harm is termed as ________. A. libel B. res ipsa loquitur C. Good Samaritan law D. duty of care

D. duty of care

All 50 states have data breach disclosure laws except California.

FALSE

Which statement is true about the requirements under the U.S. Gramm-Leach-Bliley Act (GLBA)?

Financial institutions can share customer information with non-affiliated third-party companies without obtaining an opt-in from the customer.

The "exclusionary rule" prevents evident from illegal seraches and seizures to be used in court. What Constitutional amendement did this rule derive from?

Fourth.

The Children's Online Privacy Protection Act of 1998 applies to all of the following entities except:

Operators of commercial websites directed to children under the age of 14.

The loss of names and what other data point would require an employer to notify affected individuals?

Social Security Numbers

What is the basis of common law?

Social customs and expectations.

FERPA applies to all educational institutions that receive federal funding.

TRUE

The tort of "intrusion upon or on seclusion" is a clause of action that arises out of sector?

Telemarketing.

What is the correct process for building an information management privacy program?

Whether counsel for both parties are based in the U.S.

What are the Consumer/User preferences for privacy used in the U.S.? a. double opt-in b. opt-in. c. opt-out. d. no option. e. all of the above.

e. all of the above

Parties to a contract agree in advance to pay ________ damages if the contract is breached.

liquidated

Bank Security Act 1970 requires financial institutions to file reports of cash purchases of negotiable instruments of more than?

$10,000 US dollars.

The National Do Not Call Registry violations have civil penalties up to what amount per violation?

$16,000

Professional codes of conduct have been criticized, but Gotterbarn suggests that some of this criticism might be eliminated if these codes are thought of as serving which of the following functions: (Select all that apply.) -Codes of expertise -Codes of ethics -Codes of practice -Codes of professionalism -Codes of conduct

-Codes of ethics -Codes of practice -Codes of conduct

At the heart of a moral system are rules for guiding behavior. Which of the following is not a source of these rules? (Select all that apply.) -Cognitive System -Religious System -Philosophical System -Logic System -Legal System

-Cognitive System -Logic System

Hinman argues that search engine companies have a special obligation to society because search engines: (Select all that apply.) -Are subject to government regulation -Provide access to information that is crucial for responsible citizenship -Are owned by private corporations -Play an absolute crucial role in the access of information -Are now central to education

-Provide access to information that is crucial for responsible citizenship -Play an absolute crucial role in the access of information -Are now central to education -Are owned by private corporations

The "reasonable expectation of privacy" test is

1) the person has an actual expectations of privacy and 2) the expectation is one that society is prepared to recognize as reasonable.

Under the Fair Credit Reporting Act, Consumer Reporting Agencies cannot retain negative information for previous bankruptcies beyond:

10 years.

As explained in the Telemarking Sales Rule, a telemarketer is limited to caling between the hours of:

8am and 9pm, local time.

The average breach by malware has a "dwell time" on the system of:

>200 days.

Some states have security breach notificaiton requirements. For those that do, what general information must the breach-of-personally-identifiable-information notificaiton letter to those individulas include?

A brief description of the incident, the type of information involved, and a toll-free number for answers to questions.

An employer can discrimiate in their hiring if it is not discriminating against a protected class of citizen. Which person is protected?

A disabled, gay, Latino, Christian, female veteran.

Which investigative tactic requires a probable cause and other requirements, such as that alternative means of acquiring the evident have been exhausted?

A telephone wiretap.

Which of the following does the one-year rule state? A. A contract that cannot be performed on its own terms within a year should be in writing. B. The terms of a written contract can be modified within a year of its formation. C. Valid contracts cannot be rescinded by either party until a year after their formation. D. Every contract in writing is subject to yearly renewal.

A. A contract that cannot be performed on its own terms within a year should be in writing.

What is a first-party cookie? A. A cookie that is set and read by the web server hosting the website the user is visiting. B. A cookie that operates as a tag and records an end users visit to a particular webpages. C. A cookie that only uses a persistent variation when justified. D. A cookie that is set to expire at some point in the future.

A. A cookie that is set and read by the web server hosting the website the user is visiting.

Which of the following is true of misrepresentation? A. A misrepresentation is not actionable unless the innocent party relied on the misrepresentation and acted on it. B. An innocent party who acts in reliance on a misrepresentation need not justify his or her reliance. C. An innocent party must prove that the wrongdoer's misrepresentation was the sole reason he or she entered into the contract. D. An innocent party need not prove economic injury to recover damages for fraud.

A. A misrepresentation is not actionable unless the innocent party relied on the misrepresentation and acted on it.

Reversibility is a principle of Kantian ethics which says that ________. A. A person must abide by the rule he or she uses to judge the morality of someone else's conduct B. A person must be allowed to reverse his moral judgement to better suit his needs C. A person must Treat all moral circumstances as one D. A person must be allowed to selectively choose moral judgements based on the circumstances

A. A person must abide by the rule he or she uses to judge the morality of someone else's conduct

According to the ACM Code of Ethics and Professional Conduct, which of the following is not listed as general moral imperatives? A. Always do the right thing! B. Given proper credit for intellectual property. C. Be honest and trustworthy. D. Avoid harm to others. E. Contribute to society and human well being.

A. Always do the right thing!

What is the correct definition of a privacy policy? A. An internal statement that governs an organization's handling practices of personal information. B. An internal statement that details an organization's penalties for employee's who leak personal information. C. An internal statement that summarizes an organization's goals for its privacy program. D. An internal statement that summarizes the compliance challenges an organizations faces.

A. An internal statement that governs an organization's handling practices of personal information.

________ is a crime in which one person gives another person money, property, favors, or anything else of value for a favor in return. A. Bribery B. Battery C. Larceny D. Embezzlement

A. Bribery

Under the US Children's Online Privacy Protection Act (COPPA), which of the following is FALSE? A. COPPA provides complete preventive measures against the potential abuse of children's personal information online. B. COPPA requires website operators to provide clear and conspicuous notice of the data collection methods employed by the website. C. COPPA mandates strict requirements on parental oversight and consent on behalf of children. D. COPPA was passed with the express purpose of protecting children's use of the internt--particularly websites and services targeted toward children.

A. COPPA provides complete preventive measures against the potential abuse of children's personal information online.

What types of laws are designed to restrict access to financial information? A. Credit monitoring laws. B. Money laundering laws. C. Antiterrorism laws. D. Tax enforcement laws.

A. Credit monitoring laws.

Which threat to online privacy includes malicious code that is unwittingly incorprated into a website's own source code A. Cross-site scripting. B. Denial of service attack. C. Pharming. D. Phishing.

A. Cross-site scripting.

Data confidentiality, Data Availability, and what other attribute comprise the three key attributes of information auditing and monitoring? A. Data integrity. B. Data security. C. Data consistency. D. Data retention.

A. Data integrity.

________ is a situation in which one party threatens to do a wrongful act unless the other party enters into a contract. A. Duress B. Scienter C. Assault D. Battery

A. Duress

Which is NOT a method used for combating spam? A. Encryption. B. Firewall. C. Network protection software. D. Anti-virus software.

A. Encryption.

________ is a moral theory which holds that individuals must decide what is ethical based on their own feelings about what is right and wrong. A. Ethical relativism B. Rawls's social justice theory C. Kantian ethics D. Utilitarianism

A. Ethical relativism

Which of the following accurately describes the fair use doctrine with reference to copyrighted material? A. It permits certain limited use of a copyright by someone other than the copyright holder without the permission of the copyright holder. B. It guides the U.S. Copyright Office in determining what works require copyrights based on the works' validity. C. It stipulates the time period for which a copyright holder can retain his copyright. D. It permits use of copyright material by someone other than the copyright holder at a fixed fee.

A. It permits certain limited use of a copyright by someone other than the copyright holder without the permission of the copyright holder.

Which of the following moral theories would closely follow the categorical imperative "Do unto others as you would have them do unto you?" A. Kantian ethics B. Rawls's social justice theory C. utilitarianism D. moral relativism

A. Kantian ethics

________ is a moral theory which says that people owe moral duties that are based on universal rules. A. Kantian ethics B. Utilitarianism C. Moral Relativism D. Rawls's social justice theory

A. Kantian ethics

Which of the following is true for legally claiming a reward? A. Knowledge of the reward before completing the requested act is necessary to claim the reward. B. The offeror cannot withdraw the reward once the offer has been placed in the public domain. C. A promise of completing the requested act is sufficient for a claimant to claim the reward. D. The claimant can claim the reward even if he or she came to know of the reward subsequent to completing the act

A. Knowledge of the reward before completing the requested act is necessary to claim the reward.

Which new data element with new privacy-related issues has emerged in the telecommunications sector? A. Location. B. Registers. C. Burst transmissions. D. Ghosting.

A. Location.

What safeguards should be implemented under the Gramm-Leach-Billey Act (GLBA) to protect data? A. Monitor and implement test controls internally and with third parties. B. Annually communicate the safeguards to the relevant workforce. C. Allow individuals to securely obtain access to all information. D. Only protect information that is covered under the GLBA rules

A. Monitor and implement test controls internally and with third parties.

What is an XML document-formatted, machine-readable method for producing online privacy policies? A. P3P. B. PKI. C. SSL. D. HTTP.

A. P3P.

How is a copyright different from a patent? A. Patents have a limited term period, while copyrights carry lifelong terms. B. Copyrights are applied for inventions, while a patent is applied for tangible writings. C. Copyrights should be novel, and useful, while patents need not be so. D. Patents fall under the federal law, while copyrights fall under state law.

A. Patents have a limited term period, while copyrights carry lifelong terms.

Which of the following is not one of what Tavani identifies as a "discussion stopper" as it relates to discourse on ethics and morality? A. People fail to distinguish between moralists and ethicists B. Ethics is simply a private matter. C. Who am I to judge? D. Morality is simply a matter for individual cultures to decide. E. People disagree on solutions to moral issues

A. People fail to distinguish between moralists and ethicists

________ is defined as the substantial likelihood that a person either committed or is about to commit a crime. A. Probable cause B. Reasonable suspicion C. Preponderance of evidence D. Reasonable doubt

A. Probable cause

Which measures have been adopted by major search engine firms to address privacy concerns specific to search technologies A. Searches are anonymized after a defined period of time. B. Searches are deleted after a defined period of time. C. Searches are archived after a defined period of time. D. Searches are encrypted after a defined period of time.

A. Searches are anonymized after a defined period of time.

Which standard web protocol allows for a peer's identity to be authenticated prior to a connection being made? A. Secure Sockets Layer. B. Transmission Control Protocol. C. Internal Protocol. D. Transport Layer Security.

A. Secure Sockets Layer.

A detailed review of corporate behavior that includes how well employees adhered to the company's code of ethics and how well the company met its community responsibilities is called a: A. Social Audit B. Social Entrepreneurship C. Social Assessment D. Social Responsibility Audit

A. Social Audit

Which of the following moral theories matches the dictum "I will keep the rules if everyone else does?" A. Social Contract B. Perspectivism C. Utilitarianism D. Moral Relativism

A. Social Contract

Two of the four categories of data protection and privacy law and practices are informational privacy and A. Territorial privacy B. Financial privacy C. Health privacy D. Electronic privacy

A. Territorial privacy

Santos told his friend Ernesto that he would sell Ernesto his car for $5,000. However, on the day of the sale, Santos refused to sell the car for the agreed-upon price and demanded more money. Which of the following statements is true in this context? A. The oral contract to trade a car for $5,000 is not binding, according to the UCC. B. Santos has violated Section 2A-201(1) of the UCC C. Ernesto can sue Santos as their oral sales contract was binding. D. Santos has violated Section 2-201(1) of the UCC.

A. The oral contract to trade a car for $5,000 is not binding, according to the UCC.

What is provided in Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms? A. The right to respect for an individual's privacy and family life. B. The right of public authorities to collect certain necessary personal data. C. The right of every individual to vote in his or her own country. D. The right of consumers to freely choose their service provider.

A. The right to respect for an individual's privacy and family life.

Which of the following is true for an auction with reserve? A. The seller retains the right to refuse the highest bidder. B. Goods cannot be withdrawn from sale after the offer has been made. C. Invitations to make an offer are not allowed. D. A bid once made cannot be withdrawn and is legally binding.

A. The seller retains the right to refuse the highest bidder.

Which is a concept provided for in the 1973 Code of Fair Information Practices? A. There must be a way for a person access to correct or amend a record of identifiable information. B. There must be a way for a person access to make a record anonymous. C. There must be a way to allow a person access to a record of identifiable information. D. There must be a way for a person access to delete a record of identifiable information.

A. There must be a way for a person access to correct or amend a record of identifiable information.

Use of a smart card would be identified as what type of safeguard? A. Two-factor authentication. B. Perimeter control. C. Intrusion prevention systems. D. Public key infrastructure.

A. Two-factor authentication.

What is meant by "causation in fact"? A. a defendant's negligent act that caused the plaintiff's injuries B. the facts stated by a plaintiff during trial C. a defendant's defense against a case of negligence D. a defendant's plea of guilt due to negligence

A. a defendant's negligent act that caused the plaintiff's injuries

Toughones, a car part manufacturer, entered into a contract to license computer software from a Vizera Inc. for $250,000. This software is to be used to keep track of inventory, accounts receivable, and other financial data. After the software was installed, the computer system worked but it had a few glitches. Toughones refused to pay the full amount in the contract. To settle the dispute, the parties agree that $180,000 is to be paid as full and final payment for the software. Toughones paid the $180,000 as agreed. What kind of agreement did Toughones and Vizera reach in the end? A. accord and satisfaction B. preexisting duty C. counteroffer D. mirror image acceptance

A. accord and satisfaction

Preprinted forms whose terms the consumer cannot negotiate, and must sign in order to obtain a product or service are referred to as ________. A. contracts of adhesion B. voilable contracts C. quasi-contracts D. contracts in restraint of trade

A. contracts of adhesion

According to the ________, evidence obtained from an unreasonable search and seizure can generally be prohibited from introduction at a trial or an administrative proceeding against the person searched. A. exclusionary rule B. Miranda rights C. presumption of innocence doctrine D. double jeopardy rule

A. exclusionary rule

A real estate developer sells a house without informing the buyer that the lot where the house is located had contained an old cemetery. The gravesites were in a portion of the lot designated "no build," but the headstones were removed and references to the graves were deleted from the plats all in an obvious effort to make the land seem less spooky and more desirable and thus more valuable. This is an example of: A. fraud by concealment B. fraud by inducement C. fraud by omission D. fraud by misrepresentation

A. fraud by concealment

A(n) ________ is a charge of having committed a crime, usually a felony, based on the judgment of a grand jury. A. indictment B. arraignment C. information statement D. plea

A. indictment

Which of the following constitutes material breach? A. inferior performance B. approximate performance C. rescission without notification D. anticipatory repudiation

A. inferior performance

Alan is a subject matter expert for First University, with an employment contract of three years. Two years into the contract, Second University—fully aware of Alan's contract—offers him twice the money he currently makes for a similar post. Alan takes the job. First University can recover damages from Second University for which of the following torts? A. intentional interference with contractual relations B. malicious inducement of contractual breach C. malicious breach of contractual relations D. breach of the covenant of good faith and fair dealing

A. intentional interference with contractual relations

When a party commits an anticipatory breach, the nonbreaching party ________. A. is immediately discharged from his or her own duties B. cannot seek damages because he or she received advance notice of the breach C. loses his or her right to sue after the due-date for performance is reached D. must wait until the performance was due before suing

A. is immediately discharged from his or her own duties

The ________ states that an acceptance is effective when it is dispatched, even if it is lost in transmission. A. mailbox rule B. rule of silence as acceptance C. mutual assent rule D. mirror image rule

A. mailbox rule

Which of the following terms refers to a nonbreaching party's legal duty to avoid or reduce damages caused by a breach of contract? A. mitigation of damages B. seceding of damages C. tender of performance D. disclaimer of consequential damages

A. mitigation of damages

A social responsibility theory of business which says that a corporation's duty is to make a profit while avoiding causing harm to others is referred to as ________. A. moral minimum B. stakeholder interest C. corporate citizenship D. maximizing profits

A. moral minimum

According to Reynolds, _______ are one's belief about right and wrong; the term ______ describes standards or codes of behavior expected of an individual by a group to which the individual belongs; ... and ______ are a system of rules that tell use what we can and cannot do. A. morals, ethics, laws B. ethics, laws, morals C. laws, morals, ethics D. morals. laws, ethics E. ethics, morlas, laws

A. morals, ethics, laws

According to the objective theory of contracts, the intent to enter into an express or implied-in-fact contract is judged by the ________. A. reasonable person standard B. common law of contracts C. legality of the contract D. doctrine of equity

A. reasonable person standard

Which of the following theories of morality is Rawls's Social Justice Theory fundamentally derived from? A. the social contract theory B. the theory of utilitarianism C. the theory of ethical fundamentalism D. the theory of moral relativism

A. the social contract theory

A homebuilder builds a house on Alicia's property. However, the homebuilder signed a contract with Bobby, who claimed to be Alicia's agent but, in fact, was not. Although there is no binding contract between Alicia and the homebuilder, most courts would allow the homebuilder to recover the cost of the services and materials from Alicia to avoid an unjust result. A court would accomplish this by creating a fictitious agreement between the homebuilder and Alicia and holding Alicia responsible for the cost of the builder's services and materials. This fictitious agreement is called a: A.quasi-contract B. equity contract C. Fairness contract D. implied contract

A.quasi-contract

What types of educational records are not covered by FERPA?

Alumni.

Below is from a BBC online article written by Craig Jeffrey, 9 November 2014, titled, "The Students Who Feel They Have The Right To Cheat." "It is our democratic right!" a thin, addled-looking man named Pratap Singh once said to me as he stood, chai in hand, outside his university in the northern state of Uttar Pradesh. "Cheating is our birthright." Corruption in the university exam system is common in this part of India. The rich can bribe their way to examination success. There's even a whole subset of the youth population who are brokers between desperate students and avaricious administrators. Then there's another class of student altogether, who are so well known locally - so renowned for their political links - invigilators dare not touch them. I've heard that these local thugs sometimes leave daggers on their desk in the exam hall. It's a sign to invigilators: "Leave me alone... or else." So if those with money or political influence can cheat, poorer students ask, why shouldn't they? This is a fallacious arguement based on: (Enter your answer in the space provided)

Appeal to the people fallacy

What should a U.S.-based organization do before it shares personal information with a U.S.-based third party?

Assure appropriate privacy terms and conditions are included in a contract with the third party.

What phrase describes the ability for an employee from leaving their company at any time and a company from releasing an employee at any time (assuming no dsicrimination is evident)?

At will.

What is the key difference between an agreement and a contract? A. A contract required mutual assent from all parties, while an acceptance need only be accepted a majority of people involved. B. A contract is always enforceable in the court of law, while an acceptance may or may not be. C. A contract need not be legally binding, while an agreement must be legally binding. D. A contract can only be between two individuals, while an acceptance can have two or more people involved.

B. A contract is always enforceable in the court of law, while an acceptance may or may not be.

Role-based access controls are based on what basic security principle? A. Employees should not be able to access personal information unless it is from a public source. B. Access should be granted to employees on the basis of the lowest possible level. C. Employees shall not be granted access without management approval from CIO or CEO. D. Employees should be granted access if it is determined they are stakeholders.

B. Access should be granted to employees on the basis of the lowest possible level.

Which of the following statements is true of the tort of assault? A. An attack is considered an assault only if the defendant was provoked to attack a plaintiff. B. Actual physical contact between plaintiff and defendant is not necessary. C. An assault is considered an unintentional tort. D. An attack is not considered an assault if the defendant was provoked to attack a plaintiff.

B. Actual physical contact between plaintiff and defendant is not necessary.

In 1988, the USS Vincennes equipped with the then most sophisticated Aegus Radar System accediently shot down an Iranian Airbus killing all 290 passangers. Gottenbarn uses this tragedy to argue that software failures like this result from the following defect(s) in the current risk assessment of software development: (Select all that apply.) A. A failure to include chain-of-command Correct B. An overly narrow concept of risk Correct C. A limited notion of system stakeholders D. A failure to consider human factors E. Misspecifications of the software requirements

B. An overly narrow concept of risk Correct C. A limited notion of system stakeholders

________ place the nonbreaching party in the same position as if the contract had been fully performed A. Nominal damages B. Compensatory damages C. Tort damages D. Consequential damages

B. Compensatory damages

Which of the following is true of monetary damages? A. Nominal damages are paid once the nonbreaching party has suffered a financial loss. B. Consequential damages are considered as monetary damages. C. Liquidated damages are set by the court towards the breaching party. D. Anticipatory breaches cannot be awarded monetary damages.

B. Consequential damages are considered as monetary damages.

Developing a moral system of rules based on the notion that such a system is in the self interest of human beings is the hallmark of: A. Virtue Ethics B. Contract Theory C. Kant's deontology D. Utilitarianisn

B. Contract Theory

Which human resources data element is not generally considered personal data? A.Salary. B. Department assignment. C. Employee evaluation. D. Job title.

B. Department assignment.

The ________ recognizes electronic contracts as meeting the writing requirement of the Statute of Frauds for most contracts. A. Uniform Computer Information Transactions Act B. Electronic Signatures in Global and National Commerce Act (ESIGN Act) C. E-Commerce Act D. Uniform Commercial Code

B. Electronic Signatures in Global and National Commerce Act (ESIGN Act)

________ is the fraudulent conversion of property by a person to whom that property was entrusted. A. Forgery B. Embezzlement C. Bribery D. Extortion

B. Embezzlement

What is the purpose of Transmission Control Protocol? A. Counts the number of valid and invalid login attempts. B. Enables devices to establish a connection and exchange data. C. Encrypts and transmits data using proxy servers. D. Provides rules for using script languages such as HTML and Java.

B. Enables devices to establish a connection and exchange data.

What is NOT a privacy risk raised by the use of smart grid technology? A. Energy use data could be shared with law enforcement without disclosure. B. Energy use could increase due to continuous monitoring by energy companies. C. Energy use information obtained by a hacker could indicate when a residence is occupied or empty. D. Energy use for individual homes could be shared for behavioral marketing purposes without the consumer's permission.

B. Energy use could increase due to continuous monitoring by energy companies.

In "phishing" which practices are used to collect personal information? A. Fraudulent websites secretly install malware on site visitor's computers that automatically collect personal information. B. Fake e-mails contain links to websites that only appear to be genuine and request personal information. C. Malware attached to freely downloaded games and apps secretly install keylogging software that collects passwords and account numbers. D. Anonymous e-mails contain elaborate stories of available unclaimed funds with requests for participation in transfers.

B. Fake e-mails contain links to websites that only appear to be genuine and request personal information.

Which of the following can access Henry's stored electronic communications without violating the Electronic Communications Privacy Act? A.Henry's colleague at work, who is working on the same project as Henry and needs the information B. Henry's boss, who suspects him of leaking confidential information C. Henry's personal finance advisor, who wants to see if he has sufficient funds to make an investment D. Henry's wife, who suspects him of cheating on her

B. Henry's boss, who suspects him of leaking confidential information

Which of the following is (are) considered personal information in the EU? (Check all that apply) A. Race and ethnicity B. IP address C. Salary D. Criminal offense

B. IP address

According to Tavani, the basic components of a moral system include all of the following EXCEPT: (Select all that apply.) A. Microlevel rules of conduct that guide individual action B. Individual beliefs guiding individual behavior C. Macrolevel rules of conduct that guide social policy D. Principles of evaluation of standards used to justify conduct E. Religious upbringing that guide individual behavior

B. Individual beliefs guiding individual behavior E. Religious upbringing that guide individual behavior

Which of the following is a perceived disadvantage of Kantian ethics? A. It treats morality as if it were an impersonal mathematical calculation. B. It is based on universal rules that have no common consensus. C. It does not allow people to have subjective notions of right and wrong. D. It distinguishes between the morality one uses to judge others and the morality one uses on oneself.

B. It is based on universal rules that have no common consensus.

Luke offered to sell his farm to Kent at $75,000, an offer which Kent declined. A week later, Luke offered to sell the farm for $65,000, stating that it was the final offer, it was valid for one month, and that he would not alter it. Two days later, Kent replied by saying that he was willing to pay $60,000 for the farm. A week after Luke received Kent's offer, Luke declined it. Ten days after that, Kent agreed to buy the farm for $65,000, but Luke refused to sell the farm. Kent decided to sue Luke for a breach of contract. The judge ruled in favor of Luke. Which one of the following is the reason for the ruling in Luke's favor? A. Kent's acceptance was past the set time period in the offer. B. Kent's counteroffer of $60,000 had rendered the offer for $65,000 invalid. C. Kent acted in an incompetent manner with regards to the offer. D. Luke's original offer of $75,000 is still valid, even though rejected.

B. Kent's counteroffer of $60,000 had rendered the offer for $65,000 invalid.

Which of the following constitute a mutual mistake of a material fact? A. Graham buying a house from Martha without asking her details of damages B. Martha and Graham agreeing on the sale of a house, both referring to different houses C. Martha selling her house to Graham and hiding the fact that its first floor is damaged D. Martha selling Graham an old vase for $20, both of them unaware that it is a valuable antique collectible

B. Martha and Graham agreeing on the sale of a house, both referring to different houses

Which of the following is true of a minor's duty towards a contract for necessaries of life? A. Minors are exempt from paying for contracts of necessaries of life. B. Minors must pay the reasonable value of necessaries of life for which they contract. C. Parents are liable to provide necessaries of life to their minor children if they become emancipated. D. Minors need to reach the age of majority to enter into contracts for necessaries of life.

B. Minors must pay the reasonable value of necessaries of life for which they contract.

________ is an action to undo a contract. A.Nullification B. Rescission C. Retraction D. Voidance

B. Rescission

Under the Uniform Commercial Code, which of the following is (are) true? (Check all that are true.) A. All lease contracts must be in writing. B. Sales contracts involving payments of $500 or more must be in writing. C. Lease contracts involving payments of $1,000 or more must be in writing. D. All sales contracts must be in writing.

B. Sales contracts involving payments of $500 or more must be in writing. C. Lease contracts involving payments of $1,000 or more must be in writing.

________ is a social responsibility theory of business which says that a corporation must consider the effects its actions have on persons other than its shareholders. A. Moral minimum B. Stakeholder interest C. Corporate citizenship D. Maximizing profits

B. Stakeholder interest

Most security breeches occur during the ______ of the information life cycle. A. Collection B. Storage and distruction C. Use D. Disclosure

B. Storage and distruction

Which jurisdiction limits its privacy protections to those established only by sector-specfic statutes? A. European Union. B. United States. C. Asia-Pacfic Economic Cooperation. D. Canada

B. United States.

________ refers to a concept that requires lawsuits to be heard by the court with jurisdiction that is nearest the location in which the incident occurred or where the parties reside. A. Doctrine of stare decisis B. Venue C. Circuit D. Jurisdiction

B. Venue

Acquiring the "correct" moral habits is the hallmark of: A. Contract Theory B. Virtue Ethics C. Utilitarianism D. Kant's Deontology

B. Virtue Ethics

According to the Asia-Pacific Economic Cooperation privacy principles, individuals must be able to do all of the following except A. challenge the accuracy of the information related to them. B. access the personal information of the personal information controller. C. obtain confirmation whether the personal information controller hold personal information about them. D. have their personal information communicated to them within a reasonable time.

B. access the personal information of the personal information controller.

Windsor, the owner of Windsor's Sandwiches contacts a new supplier Gary. He tells Gary that he will pay him $375 if Gary delivers 20 pounds of cheese the following morning. Gary promises to make the delivery as requested by Windsor. This creates a ________ contract between them. A. executory B. bilateral C. unilateral D. implied-in-law

B. bilateral

Kantian ethics is also referred to as ________ ethics. A. nihilistic B. duty C. relativistic D. utilitarian

B. duty

Contracts that have been fully performed by one side but not by the other are classified as ________ contracts. A. void B. executory C. voidable D. executed

B. executory

A court order that prohibits a person from doing a certain act is termed as a(n) ________. A. reformation B. injunction C. rescission D. restitution

B. injunction

The purpose of this stipulation in a contract is to establish a predetermined sum that must be paid if a party fails to perform as promised. A. nominal damages B. liquidated damages C. compensatory damages D. consequential damages

B. liquidated damages

Ordinances are codified laws that are issued by ________. A. Supreme Court judges B. local government bodies C. the state legislature D. the President

B. local government bodies

The ECPA is a federal statute that ________. A. establishes that an e-signature is as effective as a pen-and-paper signature B. makes it a crime to intercept an electronic communication at the point of transmission C. establishes that businesses are allowed send spam e-mails, as long as they do not lie D.rules that ISPs are not liable for the content transmitted over their networks by e-mail users and websites

B. makes it a crime to intercept an electronic communication at the point of transmission

Under the theory of ________, if a business corrects the social injury it causes, it has met its duty of social responsibility. A. corporate citizenship B. moral minimum C. stakeholder interest D. maximizing profits

B. moral minimum

Of the following outcomes, which would be the one most perferred by someone applying utilitarianism? A. Twenty people each get 1 million dollars B. or one person get 21 million dollars and others get nothing C. or allocate the money in a way that makes the most people happy D. or give the money to charity

B. or one person get 21 million dollars and others get nothing

Which of the following is an example of an e-signature? A. ordering Chinese food over the phone and paying with a credit card B. paying the electric bill online using a smart card C. using a debit card to fill gas as the local gas station D. using a credit card at the supermarket to pay for groceries

B. paying the electric bill online using a smart card

A(n) ________ is an agreement in which the accused admits to a lesser crime than charged, and in return, the government agrees to impose a lesser sentence than might have been obtained had the case gone to trial. A. nolo contendere B. plea bargain C. indictment D. arraignment

B. plea bargain

A promise lacks consideration if a person promises to perform an act or do something he is already under an obligation to do. This is called a(n) ________. A. gift promise B. preexisting duty C. illusory promise D. preexisting obligation

B. preexisting duty

Which Fifth Amendment provision in the U.S. Constitution do the Miranda Rights refer to? A. Unreasonable searches and seizures B. privilege against self-incrimination C. parole eligibility D. double jeopardy

B. privilege against self-incrimination

Which of the following would be considered an offer to form a unilateral contract? A. advertisement B. reward offer C. auction without reserve D. auction with reserve

B. reward offer

The mirror image rule states that ________. A. the offeror can modify the terms of the offer even after the offeree has accepted it B. the offeree must accept the terms as stated in the offer C. the offeree is allowed to modify the terms of the offer D. the offeree's counteroffer should match the value of the offeror's offer

B. the offeree must accept the terms as stated in the offer

In which of the following cases is parol evidence admitted by a court? A. when the defendant takes the case to the appellate court B. when the evidence explains ambiguous language C. when the defendant does not wish to appeal D. when the plaintiff reduces the value of damages he expects

B. when the evidence explains ambiguous language

A ________ is an order of the court that orders that wages, bank accounts, or other property of the breaching party held by third persons be paid to the nonbreaching party to satisfy a judgment. A. liquidation of damages B. writ of garnishment C. writ of attachment D. specific performance

B. writ of garnishment

Which is NOT an example of privacy notice? A. The interactive Advertising Bureau's Advertising Option icon and accompanying language. B. Cardholder agreements or employment contracts. C. A spreadsheet containing specific product names and general descriptions. D. Terms governing a user's participation in an online service or social network.

C. A spreadsheet containing specific product names and general

What kind of information security control is an incident response procedure? A. Physical control. B. Data control. C. Administrative control. D. Technical control.

C. Administrative control.

What is the definition of a data controller? A. The individual who provides the personal data. b. A third-party service provider that maintains the platform on which personal data is stored. C. An enitity that holds personal data and determines the purpose of use. D. A supervisory authority empowered to enforce privacy regulation or law.

C. An enitity that holds personal data and determines the purpose of use.

Andrew is employed as a Chief Financial Officer of EasyMoney firm in New York City, for a salary of $200,000 per year on a three-year contract. His employer terminates Andrew with two years left on his contract. Andrew accepts employment as a financial analyst at a different firm that pays $150,000 per year. Which of the following hold true in this scenario? A. Andrew cannot take any legal action against his former employer after accepting another job. B. Andrew's former employer must pay Andrew two years worth of his former salary. C. Andrew can sue his prior employer and recover $100,000. D. Andrew can only sue to receive nominal damages.

C. Andrew can sue his prior employer and recover $100,000.

________ is a stipulation in an offer that says the acceptance must be by a specified means of communication. A. Option contract B. Implied authorization C. Express authorization D. Mirror image rule

C. Express authorization

16-year-old Frank bought a video game console from John for $150. Frank is a minor, while John is a competent adult. A month later, the console started malfunctioning on its own. Frank returned the console to John. If Frank disaffirms his contract with John for buying the console, which of the following will be considered true? A. Frank is legally obligated to fix the console before returning it to John. B. John is not bound by the contract any more as the exchange has been completed. C. Frank can reclaim full refund of the amount he paid. D. Frank can only ask for full refund once he has reached the age of majority.

C. Frank can reclaim full refund of the amount he paid.

Descartes' rule of change is: (Select all that apply.) A. If an action is most consistent with duty as seen by the actor, it is the correct action to take. B. If an action achieves the greatest good for all, it is the correct action to take. C. If an action cannot be taken repeatedly, it is not right to take it at all. D. Also know as the slippery-slop rule E. If an action results in a positive change, it is the correct action to take.

C. If an action cannot be taken repeatedly, it is not right to take it at all. D. Also know as the slippery-slop rule

Which of these elements may be considered personal information? A.Information relating to a company's primary competitors. B. Company's financial information disclosed on its website. C. Information about a company's leads or prospects. D. The physical location of a company's headquarters.

C. Information about a company's leads or prospects.

Which of the following is a necessary condition for a contract to be considered valid? A. It can be voided by one of the parties. B. It can be voided by both parties. C. It is enforceable by at least one of the parties. D. It is enforceable by both the parties.

C. It is enforceable by at least one of the parties.

Which of the following is an apparent disadvantage of utilitarianism? A. It does not allow people to have subjective notions of right and wrong B. It is based on moral duties derived from universal rules C. It treats orality as if it were an impersonal mathematical calculation D. It puts too much emphasis on one book or theory

C. It treats orality as if it were an impersonal mathematical calculation

Act always on that maxim or principle (or rule) that ensures that all individuals will be treated as ends-in-themselves and never merely as a means to an end. This is the principle tenet of: A. Virtue Ethics B. Utilitarianism C. Kant's deontology D. Contract Theory

C. Kant's deontology

Consistency is one of the two important principles of ________ upon which its universal laws are based. A. Rawls's social justice theory B. utilitarianism C. Kantian ethics D. moral relativism

C. Kantian ethics

Martha contacts a bakery to get a cake for her son's birthday party. She tells the baker that she will pay him $150 for the cake if he delivers the cake on Friday evening. If the baker does not deliver the cake on Friday evening, which of the following will hold true? A. The baker has to give $150 plus cost of the replacement cake to Martha as he entered into a verbal contract with her. B. Martha can sue the baker but cannot recover damages. C. Martha cannot sue the baker. D. Martha can sue the baker to recover $150 in damages.

C. Martha cannot sue the baker.

The use of personal information should follow what primary principle? A. Personal information usage should be determined by the data controller that collected the personal information. B. Organizations should use personal information for any and all business practices. C. Personal information should be limited to the purposes identified in the notice. D. Personal information usage should be determined by third-party contracts.

C. Personal information should be limited to the purposes identified in the notice.

Under Mexico's Federal Data Protection law, what is required for cross-border data transfers? A. Binding corporate rules. B. An adequate level of data encryption. C. Receiver assumes the same responsiblities as the transferring person. D. Registration with Mexico's data protection authority.

C. Receiver assumes the same responsiblities as the transferring person.

The ________ Act enacted by Congress in 2002, requires public companies to adopt codes of ethics, and establishes criminal penalties for companies that partake in violations. A. Business Norms B. Glass-Steagall C. Sarbanes-Oxley D. False Claims

C. Sarbanes-Oxley

Which statement is NOT true under Personal Information Protection and Electronic Documents Act (PIPEDA)? A. Compliants may come from any source, including an individual, a business competitor or an employee. B. Anyone who has experienced a privacy violation may lodge a compliant. C. The Canadian privacy commissioner only investigates compliants regarding public companies. D. The complianing party has the right to complian about any aspect of the organization's PIPEDA compliance.

C. The Canadian privacy commissioner only investigates compliants regarding public companies.

What must be included in a privacy impact assessment? A. The administrator passwords of the system being evaluated. B. A regulatory review of the assessment. C. The attributes of the data collected. D. The source code of the system processing the data.

C. The attributes of the data collected.

Jonas enters into an oral contract with Chelsea to lease his house to her for $1,000 a month. Chelsea pays him $1,000 and moves in. Later, Jonas learns that his state requires contracts for the lease of goods with payments of this amount or more be in writing. Which of the following options does either party have? A. Jonas can evict Chelsea as the contract does not comply with the Statute of Frauds and is hence void. B. Chelsea can rescind the contract on the grounds of noncompliance with the Statute of Frauds. C. The contract cannot be rescinded by either party as it has already been executed. D. Jonas can rescind the contract on the grounds of noncompliance with the Statute of Frauds.

C. The contract cannot be rescinded by either party as it has already been executed.

Which of the following is true of a contract, the object of which becomes unlawful after the creation of the contract? A. The contract is still legal as the object was legal at the time of creating that contract. B. Both parties are still obligated to complete their contractual agreements. C. The parties of the contract will be discharged from that contract. D. The contract is illegal even if the parties don't complete the contractual agreement.

C. The parties of the contract will be discharged from that contract.

According to ethical relativism, ________ A. People must choose an action or follow a rule that provides the greatest good to society B. Each person is presumed to have entered into a social contract with all others in society to obey moral rules C. There are no universal ethical rules to guide a person's conduct D. Ethics rely on duties based around universal rules which one is morally bound to follow

C. There are no universal ethical rules to guide a person's conduct

Which of the following statements is true of nominal damages? A. Most courts favor nominal damages lawsuits. B. Only damages above $1,000 can qualify as nominal damages. C. They are awarded even when a breach did not result in financial loss. D. They are also known as compensatory damages.

C. They are awarded even when a breach did not result in financial loss.

________ refers to an attempt by another person to take over a living person's name or identity for commercial purposes. A. Disparagement B. Invasion of the right to privacy C. Tort of appropriation D. Defamation of character

C. Tort of appropriation

Which statement is considered a best practice regarding information security governance? A. Ultimately, security is about information asset oversight. B. Ultimately, security is about well-written internal policies. C. Ultimately, security is about people. D. Ultimately, security is about technology.

C. Ultimately, security is about people

If a competitor reverse engineers a trade secret, then the competitor is ________. A. obliged to inform the original owner of the trade secret B. not allowed to gain commercially from the trade secret C. allowed to use the trade secret but not the original trademark D. rightfully allowed co-ownership to the trade secret and its original trade mark

C. allowed to use the trade secret but not the original trademark

Why does an illusory contract lack consideration? A. because the person promises to perform an act or do something he is already under an obligation to do B. because the compensation paid is for work done in the past C. because one or both parties can choose not to perform their contractual obligations D. because the consideration promised is unlawful and therefore void

C. because one or both parties can choose not to perform their contractual obligations

A ________ is a contract that provides that a seller of a business or an employee will not engage in a similar business or occupation within a specified geographical area for a specified time following the sale of the business or termination of employment. A. quasi-contract B. contract in restraint of trade C. covenant not to compete D. contract of adhesion

C. covenant not to compete

Scientists such as anthropologists and sociologists that write about what is, are ________ scientists, and scientists that write about what should be are ________ scientists. A. research / engineering B. design / behavior C. descriptive / normative D. normative / descriptive

C. descriptive / normative

Which of the following is an intentional tort? A. breach of duty of care B. negligence C. disparagement D. defect in product manufacture

C. disparagement

A right to use someone else's land without owning or leasing it is called ________. A. leasehold B. life estate C. easement D. mortgage

C. easement

Bobby voluntarily enrolls in a skydiving course at OpenSkies Pvt. Ltd., an adventure firm. He signs a contract that relieves OpenSkies of liability. After receiving proper instruction, he jumps from an airplane. Unfortunately, Bobby is injured when he could not steer his parachute toward the target area while landing. He sues the parachute center for damages. But the court found that the contract protected OpenSkies from damages, as Bobby had voluntarily joined the course knowing all the risks involved. What kind of contractual provision protected OpenSkies from having to pay Bobby damages? A. disaffirmance B. duty of restitution C. exculpatory clause D. noncompete clause

C. exculpatory clause

The crime of ________ involves the obtaining of property from another, with his or her consent, induced by wrongful use of actual or threatened force, violence, or fear. A. bribery B. embezzlement C. extortion D. money laundering

C. extortion

How are ethical rules established in Rawls's social justice theory? A. by the ruling class or people in advantageous positions B. by following what's best for the society as a whole C. from an original position of a veil of ignorance D. by a set of universal rules based on consistency and reversibility

C. from an original position of a veil of ignorance

Under which of the following circumstances is a warrantless search permitted? A. if there is no probable cause B. if the suspect has been previously convicted C. if evidence is likely to be destroyed D. if evidence is not in plain view

C. if evidence is likely to be destroyed

The ________ is a legal principle that allows minors to cancel most contracts they have entered into with adults. A. duty of restoration B. duty of restitution C. infancy doctrine D. contract of adhesion

C. infancy doctrine

The wrongful or fraudulent taking of another's personal intangible properties like trade secrets, computer programs, and other business property is considered: A. aggravated burglary B. robbery C. larceny D. aggravated robbery

C. larceny

Who is the plaintiff in a criminal lawsuit? A. the respondent B. a private party C. the government D. the victim

C. the government

A closely guarded formula for a recipe protected by a soft drink manufacturer would be considered as an example of a ________. A. patent B. copyright C. trade secret D. trademark

C. trade secret

A contract is ________ if the offeror's offer can be accepted only by the performance of an act by the offeree. A. executory B. implied-in-law C. unilateral D. bilateral

C. unilateral

At what stage of the criminal procedure is the accused asked to enter a plea? A. when the accused is being booked B. when the accused is being arrested C. when the accused is taken to an arraignment D. while an indictment or information statement is being issued

C. when the accused is taken to an arraignment

Under which of the following conditions does a promissory estoppel provide for the enforceability of an oral contract? A. when the oral promise provides for reduced damages to the defendant B. when the reliance on the oral promise was unforeseeable C. when the promise induces action or forbearance of action by another D. when enforcing the oral promise provides for faster resolution of the case

C. when the promise induces action or forbearance of action by another

Billions of dollars of office supplies are stolen each year. Many of those that take office supplies do not think of taking scotch tape or paper or paperclips for their private use as stealing. "They're only 'borrowing' these item, and there's plenty here in the office." However, according to the material presented in Candidate Ethical Principles, Kant would find that the above reasoning violated his: (Enter your answer in the space provided.)

Categorical Imperative

According to the EU Data Protection Dirctive, what three elements are essential chracteristics of consent? A. A freely-given, written and implied or expressed indication. B. A freely-given, specific and implied or expressed indication. C. A freely-given, informed and written indication. D. A freely-given, specific and informed indication.

D. A freely-given, specific and informed indication.

The ________ is a federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith. A. UCITA B. ECPA C. ICANN D. ACPA

D. ACPA

An ad hominem argument is: A. An argument that is inherently invalid B. An argument based on what's best for humanity C. An attack on the premises of the argument rather than the structure of the argument D. An attack directed at the person rather than the substance of the person's argument E. An argument invoking society's wishes as the justification

D. An attack directed at the person rather than the substance of the person's argument

The majority of Americans believe that it is perfectly acceptable to share copyrighted music over the Internet. So, despite the objections of greedy entrepreneurs in the recording industry, networks should be allowed to serve the wishes of the American people. This is an example of the: A. Ambiguity-Equivocation Fallacy B. Mob Fallacy C. Virtuality Fallacy D. Appeal to the People Fallacy E. Many-to-Any Fallacy

D. Appeal to the People Fallacy

Which was the first Latin American country to grant citizens the right to access their personal information? A. Argentina. B. Chile. C. Peru. D. Brazil.

D. Brazil.

What is "corporate citizenship" as a social responsibility theory in business? A. Businesses have a responsibility solely to its stakeholders, and should strive to maximize their well-being. B. Businesses are obliged to consider the effects its actions have on persons other than its shareholders. C. Businesses owe a duty to take actions that increase profits for shareholders. D. Businesses are responsible to help solve social problems, even those that they did not cause.

D. Businesses are responsible to help solve social problems, even those that they did not cause.

Which model is used for privacy protection in the European Union? A. Co-regulatory model. B. Principal model. C. Sectoral model. D. Comprehensive model.

D. Comprehensive model.

Conch Corporation, a global oil and gas company, has plans to open a subsidized postsecondary vocational school in the town of Cristen, where one of their offices is situated. The plan was put to vote and approved despite some objection from shareholders. The school is being opened in collaboration with the local government, and the objective is to help the youth of that neighborhood, especially dropouts, learn a vocational skill. What social responsibility theory describes Conch Corporation's move to open the school? A. Maximizing profits B. Moral Minimum C. Stakeholder interest D. Corporate Citizenship

D. Corporate Citizenship

________ are the most serious of crimes, and are considered to be inherently evil. A. Infractions B. Misdemeanors C. Summary offences D. Felonies

D. Felonies

A theory of cyberethics proposed by Moor that combines both considerations of consequences of actions and consideration of duty is: A. Outcome-action B. Outcome and duty C. Consequentialism-Just D. Just-Consequentialism

D. Just-Consequentialism

Portman, who runs a computer hardware store, had signed a contract with Stewie Inc. to deliver 125 computer monitors. He was to deliver it by the 5th of August, but by the 3rd of August, Portman could not arrange for the monitors, as his usual supplier was not available. Portman then decided to go to another supplier who had a higher selling price rather than cancel the contract with Stewie Inc. as he believed it was his duty to do so. What of the following moral theories matches Portman's behavior? A. moral relativism B. utilitarianism C. Rawls's social justice theory D. Kantian Ethics

D. Kantian Ethics

According to ________, keeping a promise to abide by a contract is a moral duty even if that contract turns out to be detrimental to the obligated party. A. moral relativism B. Rawls's social justice theory C. utilitarianism D. Kantian ethics

D. Kantian ethics

Which of the following moral theories lays emphasis on morality based on one's moral duties? A. utilitarianism B. ethical fundamentalism C. moral relativism D. Kantian ethics

D. Kantian ethics

A privacy notice does NOT relate to which principle of the information lifecycle? A. Use and retention. B. Disclosure. C. Collection. D. Monitoring and enforcement.

D. Monitoring and enforcement.

Which international organization published a set of privacy principles entitled "Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data"? A. Council of Europe Convention. B. Asia-Pacific Economic Cooperation. C. International Organization of Standards. D. Organisation for Economic Cooperation and Development.

D. Organisation for Economic Cooperation and Development.

Which of the following statements describes the moral theory of utilitarianism? A. People must follow actions that are in accordance with a specific moral rule or principle from a religious text. B. People must follow actions based on moral duties imparted from one's community. C. People must choose to follow actions of a virtuous person. D. People must choose the action or follow the rule that provides the greatest good to society.

D. People must choose the action or follow the rule that provides the greatest good to society.

What are the three main sources of personal information? A. Public and private sector financial records, medical records andmilitary service records. B. Birth records, national and foreign government records and state/provincial government information. C. National insurance information, employment records and law enforcement records. D. Public records, publicly available information and non-public information.

D. Public records, publicly available information and non-public information.

________ is a moral theory which asserts that fairness is the essence of justice. A. utilitarianism B. Kantian ethics C. moral relativism D. Rawls's social justice theory

D. Rawls's social justice theory

Which characteristic completes the following list of the five essential characteristics of cloud computing: on-demand self-service, broad network access, measured service, rapid elasticity and: A. Criticality testing. B. Dedicated hosting. C. Continuous monitoring. D. Resource pooling.

D. Resource pooling.

________ set an upper limit on the interest rate that can be charged on certain types of loans A. Chambers of commerce B. Federal banking reforms C. Congressional committees D. State usury laws

D. State usury laws

________ is a situation in which a contractor's performance is in some way deficient but is so nearly equivalent that it would be unreasonable to deny the contractor the agreed upon payment. A. Strict performance B. Approximate performance C. Equivalent performance D. Substantial performance

D. Substantial performance

What is NOT a best practice for organizations managing a social media page? A. Advise users to refrain from posting personal information on the public sections of the organization's social media page. B. Direct users to the social media website's privacy policy to clarify how posted information may be used by the social media company. C. Monitor activity on the organization's social media page and delete offensive material or information posted by users. D. Support anonymous positive posts by employees on the organization's social media page to help offset negative posts by customers.

D. Support anonymous positive posts by employees on the organization's social media page to help offset negative posts by customers.

Which country had opted NOT to join the European Economic Area but passed its own omnibus privacy legislation? A. Liechtenstein. B. Norway. C. Austria. D. Switzerland.

D. Switzerland.

Which of the following statements is true of discharge of contracts? A. Anticipatory breach discharges the breaching party's obligations to the contract. B. Tender is a conditional offer by contracting party to perform his or her obligations under the contract. C. Substantial performance is sufficient to discharge a contract. D. Tender of performance discharges a party's contractual obligations.

D. Tender of performance discharges a party's contractual obligations.

Safe Harbor violations are enforced by the Federal Trade Commission and what other government department? A. The U.S Department of Labor. B. The U.S Justice Department. C. The U.S Department of Commerce. D. The U.S Department of Transportation.

D. The U.S Department of Transportation

Effective security risk management balances the potential for loss with what cost? A. The cost of statuatory compliance and oversight. B. The cost of reduced efficiencies in operations. C. The cost of notifications related to a data loss. D. The cost of security protection and management.

D. The cost of security protection and management.

Which of the following is true about contracts? A. An offeree is the authority that supervises the signing of a contract. B. A contract is created when the offer is made and before it is accepted. C. The offeror is the party to whom an offer to enter into a contract is made. D. To have an enforceable contract, there must be mutual assent by the parties.

D. To have an enforceable contract, there must be mutual assent by the parties.

The ________ establishes uniform legal rules for the formation and enforcement of electronic contracts and licenses. A. Restatement of the Law of Contracts B. UCC C. common law of contracts D. UCITA

D. UCITA

An offer is terminated on the grounds of "supervening illegality" when ________. A. the offeror or offeree passes away prior to the offer being accepted B. the subject matter in the offer has been destroyed C. the set period in the offer has expired D. a statute or court decision deems an object of the offer unlawful

D. a statute or court decision deems an object of the offer unlawful

How are ethical rules established in Kantian ethics? A. by choosing the alternative that's best for society as a whole B. by following principles that have been derived from holy books C. by an individual's feelings on what is right and wrong D. by a set of universal rules that are based on consistency and reversibility

D. by a set of universal rules that are based on consistency and reversibility

Jeffrey became a victim of fraud when he unknowingly entered a pyramid scheme. In order to claim damages, Jeffrey has to prove which of the following? A. motive of the fraudster B. misrepresentation C. involvement in the pyramid scheme D. economic injury

D. economic injury

Intentional misrepresentation is commonly referred to as ________. A. duress B. erroneous misrepresentation C. undue influence D. fraud

D. fraud

In a(n) ________ contract, agreement between parties is inferred from their conduct. A. Implied-in-law B. express C. formal D. implied-in-fact

D. implied-in-fact

Intellectual property falls into a category of property known as ________. A. tangible property B. moveable property C. real property D. intangible property

D. intangible property

Which of the following is not actionable as fraud? A. silence as misrepresentation B. marriage to obtain rights of immigration C. identity theft D. misrepresentation of law

D. misrepresentation of law

Morality is a system of ________ rules and standards whose content is studied by ethicists. A. descriptive B. theological C. prescriptive D. normative

D. normative

An agreement that an offeror will not sell his property for a specified period subsequent to the offeree paying consideration to the offeror is referred to as a(n) ________. A. unequivocal acceptance B. contract of adhesion C. firm offer D. option contract

D. option contract

A ________ is a grant by the federal government upon the inventor of an invention for the exclusive right to use, sell, or license the invention for a limited amount of time. A. copyright B. trade secret C. trademark D. patent

D. patent

A(n) ________ is an equitable doctrine whereby a court may award monetary damages to a plaintiff for providing work or services to a defendant even though no actual contract existed. A. implied-in-fact contract B. common law of contracts C. bilateral contract D. quasi-contract

D. quasi-contract

Consistency and ________ are the two principles of Kantian ethics that states that a person must abide by the rule he or she uses to judge the morality of someone else's conduct A. perspectivism B. utilitarianism C. relativity D. reversibility

D. reversibility

Gary Govetty is a famous movie star. A tabloid published an interview with his ex-girlfriend in which she falsely claimed that Gary was completely bald and had been wearing a wig for several years. Gary can sue his ex-girlfriend for ________. A. negligent infliction of emotional distress B. tort of appropriation C. invasion of the right to privacy D. slander

D. slander

An award of ________ orders the breaching party to perform the acts promised in a contract. A. injunction B. reformation C. restitution D. specific performance

D. specific performance

The two sector-specific privacy regulations enforced in the United States are the Gramm-Leach-Billey Act and A. the National Privacy Principles. B. the Data Protection Act of 1998. C. the Personal Information Privacy Act. D. the Health Insurance Portability and Accountability Act.

D. the Health Insurance Portability and Accountability Act.

Which of the following best describes the tort of battery? A. intentional confinement or restraint of another person without that person's consent B. oral or written defamation of another person's character C. an action that arouses reasonable apprehension of imminent harm D. unauthorized and harmful or offensive physical contact with another person that causes injury

D. unauthorized and harmful or offensive physical contact with another person that causes injury

What is the role of a U.S.-based Software-as-a-Service provider that stores employee personal data for a global company headquartered in the U.S. with subsidiaries in the EU?

Data processor.

What agency oversees the welfare of job seekers, wage earners and retirees?

Department of Labor

In terms of data breaches, most problems occur at the:

Disposal Stage

Which of the following examples best illustrates the concept of "consumer report" for pre-employment screening as defined under the U.S. Fair Credit Reporting Act?

Driving history obtained from an information aggregator.

Under the Children's Online Privacy Protection Act, which is an accepted means for an organization to validate parental consent when it intends to disclose a child's information to a third party?

E-mail a consent form and the parent can provide consent by signing and mailing back the form.

According to Spinello, there are four constraints on cyberspace activities (behavior). Which of the following is not one of these constraints? A. Code B. Market C. Law D. Norm E. Standards

E. Standards

According to Hume's law of meta-ethics: A. If "A" imples "B" and "B" imples "C" then "A" imples "C". B. Math logic is not applicable in the study of ethics. C. You can derive an "ought" from an "is". D. Meta-ethics is a real science. E. You can't derive an "ought" from an "is".

E. You can't derive an "ought" from an "is".

An employer can ask and can recieve your password to your social media accounts.

FALSE

Cyber insurance is necessary for corporations to establish an incident response plan.

FALSE

Search warrants can be issued for both civil and criminal cases.

FALSE

The Federal Trade Commission can bring actions against "unfair and deceptive" acts and "abusive acts and practices."

FALSE

The Protection of Pupil Rights Amendment (PPRA) applies to elementary, secondary and postsecondary schools.

FALSE

There are Federal laws that protect employee's emails from being accessed by their employer, if they are stored on the company's server.

FALSE

Trap & trace devices record the phone numbers that you call, while pen registers record the numbers that call you.

FALSE

Per FERPA, even if the student gives consent, the parents cannot see the educational records of the studenet.

FALSE.

Which federal agency has specific statutory responsiblity for issues such as children's privacy online and commercial e-mail marketing and played a prominent role in the development of U.S. privacy standards?

Federal Trade Commission

All of the following are considered acceptable methods for U.S.-based multinational transportation companies to achieve compliance with the EU Data Protection Dirtective except:

Global consent.

In criminal cases, the plaintiff is the ______.

Government.

What does HIPPA stand for and who does ti apply to?

Health Insurance Portability Accountability Act, covered entities.

Most security issues on an end user's laptop or desktop are classified as what type of error?

Id10t (idiot)

An incident management system has what four elements?

Identify, analyze, correct, prevent.

What was the first case where the US Safe Harbor rules were enforced?

In the Matter of Google, Inc.

The ESPN broadcaster Erin Andres that won her case against the defendant that put a "peepling hole" into her hotel room is an example of what tort action:

Intrusion upon seclusion.

Section 2A-201(1) of the Uniform Commercial Code states which of the following?

Lease contracts involving payments of $1,000 or more must be in writing.

What US Federal Law prophibits a company from accessing its employees' email when it is stored on the company's server.

No such law exists.

The Do Not Call rules apply for all companies except:

Nonprofits calling on their own behalf.

Which two actions are required under the Fair Credit Reporting Act in order for an employee to obtain a consumer report on a job applicant?

Obtain applicant's written consent and provide applicant with a copy of the credit report before taking an adverse action.

What is the lowest legal standard to obtain private information?

Pen register.

The Family Education Rights and Privacy Act of 1974 (FERPA) gives students rights for all but the following:

Private right of action under FERPA

A QPO prevents certain PII from being disclosed to the public. What does QPO stand for?

Qualified protection order.

Disclosures by law are divided into required, permitted and forbidden. What is the best example of each?

Required: Discovery for litigation. Permitted: HIPPA PHI required by law. Forbidden: Attorney-client privilege.

Controlling the Assault of Non-solicited Pornography and Marketing Act of 2003, amended in 2008, has penalties that include all the following except:

Restraining order.

The Video Privacy Protection Act of 1998 was passed because of the publishing of what Supreme Court nominee's video rentals?

Robert Bork

The PATRIOT Act of 2001 passed by President bush had many provisions that were extended in 2011 by President Obama. What provisions were extended?

Roving wiretaps, searches of business records, and surveillance of "lone wolves."

A privacy professional for a company is responsible for assessing risks for all the following EXCEPT: Reputational. Legal. Investment. Operational. Safety.

Safety.

What are the key questions that would help determine privacy risk? (Select all that apply) a. Where, how and for what lengty of time is the data stored? b. How sensitive is the information? c. Should the information be encrypted? d. Will the information be transferred to or from other countries, and if so, how will it be transferred? e. Who determiens the rules that paply to the information? f. How is the information to be processed, and how iwll these processes be maintained? g. Is the use of such data dependent upon other systems?

Select all.

What does the U.S. legal concept of "preemption" mean?

States are prevented by federal law from enforcing laws that impose different or stricter laws in the same area.

The Children's Online Privacy Protection Act has no private right of action but states may bring civil action for COPPA violations.

TRUE

The Dodd-Frank Wall Street Reform and Consumer Protection Act established enforcement actions against "abusive acts and practices."

TRUE

The FCC in 2012 amended rules to allow health care related entities governed by HIPPA to use robocalling.

TRUE

The contents of your telephone conversation are protected, but not the dialing information.

TRUE

There are 9 exemptions to the PATRIOT Act.

TRUE

Robin Hood stole from the rich and gave to the poor. What form of ethics does this represent?

Teleological Utilitarianism

What does the "red flags rule" require of financial instituions?

That they develop and implement methods of detecting identity theft.

Under the USA PATRIOT Act and its amendements, which statement is not correct?

The Act was part of the Dodd-Frank Wall Street Reform and Consumer Protection Act.

The Federal law that forced telecommunications, wire carriers, broadband and voice over IP carriers to have built-in mechanisms for law enforcement to use for criminal cases is called what?

The Communications Assistance for Law Enforcement Act (CALEA)

In addition toe the Security Rule, what other rule was promulgated by Health and Human Services and mandated by the Health Insurance Portability and Accountability Act?

The Privacy Rule

The "Digital Telephony Bill" is another name for which legislation?

The U.S. Communications Assistance to Law Enforcement Act.

Which condition must be met to satisfy the Right to Financial Privacy Act requirements for disclosure of individual records by financial instituions?

The financial records are reasonably described.

which overarching law covers employment privacy in the U.S.?

There is no such law.

A U.S. citizen, Ima Degenerate, starts a company that produces and publishes child pornography on an internet website. The government obtains a subpoena and prior notice to intercept the systems' content. Mr. Degenerate argues that the government didn't obtain a search warrant. the government wins by what action?

Third Party Doctrine

What is one reason consent decress are posted publically on the FTC website?

To provide guidance about what practices the FTC finds inappropriate.

According to the Hague Evidence Convention, trans-border conflict of laws regarding privacy and evidentiary discover,

U.S. conflict of laws rule over foreign laws.

Which statement is true regarding transfers of personal information to locations outside of the U.S.?

U.S. laws generally do not restrict geographic transfers of personal information.

State breach notification laws are not applicable for all of the following situations except:

When required by a federal judge.

According to the HITECH Act of 2009, when does a company have to disclose a breach of PI to the Dept. of Health and Human Services?

When the breach is >500 people.

As it pertains to risk, where can the privacy vulnerabiliites be easily found?

When you create the data flows.

The White House Report published in 2012 defines the "Consumer Bill of Rights" to include what commercial uses of personal data (check all that apply): a. individual control. b. transparency. c. respect for context. d. security. e. access and accuracy. f. focused collection. g. accountability. h. privacy by design. i. simplified consumer choice. j. promoting enforceable self-regulatory codes.

a. individual control. b. transparency. c. respect for context. d. security. e. access and accuracy. f. focused collection. g. accountability.

For the FTC to consider a practice "unfair" it must meet which of the following criteria: (Mark all that are required) a. it must be a practice that consumers cannot reasonably avoid. b. it must involve residents from multiple states. c. it must be without offsetting benefits. d. the injury caused by must substantial

a. it must be a practice that consumers cannot reasonably avoid. c. it must be without offsetting benefits. d. the injury caused by must substantial

What three areas did the FTC emphasize in their 2012 report, "Protecting Consumer Privacy in an Era of Rapid Change?" (Select all that apply) a. transparency. b. self-regulation. c. privacy by design. d. data classification. e. simplified consumer choice.

a. transparency. c. privacy by design. e. simplified consumer choice.

FERPA allows disclosure of PII for the following: (Check all that apply) a. to determine financial aid eligibility. b. to another educational institution for enrollment. c. to comply with a judicial order. d. if disclosure is to the alleged victim of a forcible or nonforcible sex offense. e. to school officials who have a "legitimate and educational interest" in the records. f. to appropriate parties in connection with a "health or safety emergyecy" to protect the student or others.

all apply

The Privacy Rights Clearinghouse tracks all breaches and categorizes each into what 8 areas? (Check all that apply) a. physical loss b. insider. c. uninteded disclosure d. stationary devices. e. payment card fraud. f. portable devices. g. unkown. h. hacking or malware.

all apply.

The Fair and Accurate Credit Transactions Act (FACTA) gives consumers all of the following rights, EXCEPT: a. Free credit reports every year. b. Opt-in for CRAs use of data for their marketing purposes. c. Federal law preempt states' law. d. Truncated or redacted information on reports and receipts.

b. Opt-in for CRAs use of data for their markeitng purposes.

Carriers can only use Customer Proprietary Network Information (CPNI) if (check all that apply): a. the customer opts-out. b. as required by law. c. the customer opts-in. d. express customer approval.

b. as required by law. c. the customer opts-in. d. express customer approval.

An employer can do all but which of the following: a. require drug testing before and during your employment. b. access personal emails stored on company servers. c. record your movements with video and audio using closed circuit TVs. d. open personal mail delivered to the company.

c. record your movements with video and audio using closed circuit TVs.

According to the Right to Financial Privacy Act, the government cannot access a person's financial records unless the request is reasonably specific and what condition is met? a. the customer authorizes access. b. the records are subject to a subpoena or search warrant. c. there's an appropriate written request from an authorized government authority. d. a or b, above. e. none of the above. f. any of the above

f. any of the above.

The fraudlent making or alterantion of a written document that affects the lgal liability of another person is called _____.

forgery

Which of the following occurs whe one party intentionally hides a material fact from another party?

fraud in concealment

In order to use the defense of assumption of risk, the defendant has to prove that the plaintiff ________.

had knowledge of the specific risk and voluntarily assumed the risk.

Ordinances are codified laws that are issued by ________.

local government bodies.

the act of video monitoring of the workplace is likely to survive a legal challenge under U.S. law provided that

monitoring is limited to "non-private" areas of the workplace.

The equitable doctrine of _____________ obligates a minor to only pay reasonable value for goods or services received.

quasi-contract

Section 2-201(1) of the Uniform Commercial Code is the basic Statue of Frauds provision for ________.

sales contracts

In terms of U.S. employee's workplace privacy rights, all of the following are acceptable monitoring techniques available to eomployers except

secret surveillance

__________ is a situation in which a party to a contract renders performance exactly as requried by the contract.

strict performance

Security laws in the U.S. states often restrict

the display of Social Security numbers on identification cards.


संबंधित स्टडी सेट्स

AP Gov, 4th Quarter, Unit 1, Chapter 15 The Federal Courts, Woll: the Federal Judiciary

View Set

Modules 11 - 13: IP Addressing Exam

View Set

NCLEX -Silversteri -Psychosocial integrity

View Set

17. English Phrasal Verbs in Use Advanced, Unit 17, Time

View Set

Sample Behavioral Interview Questions

View Set

Fundamentals: Infection Prevention - Clinical Questions

View Set