Module 2: Privacy
The freedom to make your own decisions is known as . Select one: A. Decisional privacy B. Free-choice C. Independent selection D. Independent privacy
A. Decisional privacy
Which of the following is NOT an example of a violation of privacy? Select one: A. Leaving your cell phone on a bus B. Phishing C. Identity theft D. None of the above
A. Leaving your cell phone on a bus
A program that uses "trustmarks", or privacy seals, to assure website users that a website's practices match that of their privacy policies is known as . Select one: A. TRUSTe B. Validation Mark C. SealMarks D. Policy Match
A. TRUSTe
The privacy program which awards its privacy seal to businesses that have proven to meet the high standards set in the program requirements was created by Select one: A. The Better Business Bureau B. Privacy Act of 1974 C. The Electronic Frontier Foundation D. Bill Gates
A. The Better Business Bureau
The Platform for Privacy Preferences (P3P) for individual users to specify their own Internet privacy preferences was developed by the . Select one: A. WLAN Organization B. Internet Convention C. World Wide Web Consortium D. Technology Assurance Conference
C. World Wide Web Consortium
Invaded privacy is the same as ______________ privacy. Select one: A. Diminished B. Lost C. Violated D. Decisional
B. Lost
Which of the following statements is true pertaining to the concept of presumed consent? Select one: A. The consumer is fully aware of how his personal information will be used. B. The consumer may be unaware of what it really means when he sells his information to a company. C. It is generally fair to online consumers to receive emails from third parties with offers that the consumer never applied for. D. None of the above
B. The consumer may be unaware of what it really means when he sells his information to a company.
Which of the following statements is true? Select one: A. Both laws and self-regulation used together will make protection worse. B. The right combination of laws and regulations that do not create privacy concerns have yet to be discovered. C. Stronger laws that could help protect online users are not very promising. D. None of the above
B. The right combination of laws and regulations that do not create privacy concerns have yet to be discovered.
______________ is the use of unique information such as a username and password to identify an individual. Select one: A. Pseudonymity B. Anonymization C. Authentication D. None of the above
C. Authentication
________________ are files a website stores on an individual's computer that monitors their actions on their website. Select one: A. Bookmarks B. Tags C. Cookies D. Data keys
C. Cookies
Which of the following is NOT an example of phishing? Select one: A. Web pop-ups asking you to enter your social security number for a daily lotto drawing. B. Emails from a person claiming to be your bank representative asking for your account information. C. Postal mail from credit firms asking you to respond with your name and telephone number to discuss credit card opportunities. D. Spam asking you to register your credit card information for a credit history report.
C. Postal mail from credit firms asking you to respond with your name and telephone number to discuss credit card opportunities.
____________________ are software tools that are used to protect a person's identity or communications online, or to give people greater control of their information online. Select one: A. Privacy Monitoring Controls B. Protection Enabling Devices C. Privacy Enhancing Tools D. Identity Restricters
C. Privacy Enhancing Tools
_______________ regards the privacy of a person's information that can be easily discovered by anyone. Select one: A. Personal privacy B. Confidential privacy C. Public privacy D. None of the above
C. Public privacy
Strong industry control, or a standard ___________________ , could benefit users in protecting privacy. Select one: A. Awareness B. Politeness C. Regulation D. None of the above
C. Regulation
Which of the following is NOT an identity theft incident? Select one: A. Someone going in trash behind you, taking your credit card, and ordering items from eBay. B. A person picking up your wallet, taking your credit card, and making a charitable donation to Goodwill. C. A person taking your credit card without permission, making purchases with the card, and then giving you the card and money back to you. D. None of the above
D. None of the above
What effect do online public records have on privacy? Select one: A. Online public records are difficult for many people to access, and therefore strengthen privacy on the Internet. B. Online public records allow others to find detailed information on a person, and therefore create a threat only to the person's decisional privacy since he can no longer decide how his information is kept. C. Online public records allow others to find only a person's physical location, therefore creating a threat to the person's accessibility privacy. D. Online public records allow others to find detailed information on a person, and therefore create a threat that the person may be unaware of.
D. Online public records allow others to find detailed information on a person, and therefore create a threat that the person may be unaware of.
The Electronic Frontier Foundation and Commerce.net created , a program that uses "trustmarks", or privacy seals, to assure website users that a website's practices match that of their privacy policies. Select one: A. SealMarks B. TMARKs C. Trusted Seals D. TRUSTe
D. TRUSTe
Industry self-regulation is: Select one: A. The use of a standard set of regulations for businesses regarding their Internet browsing policies within the organization to ensure management that employees are securely using their resources. B. The use of a standard set of regulations for websites or businesses regarding their privacy policies and their actual practices to ensure consumers of an organization's trustworthiness. C. The use of a privacy policy that states to consumers that they must abide by the guidelines set forth by a committee or be faced with banishment from specific websites. D. None of the above
not A
The Privacy Act of 1974 affects: Select one: A. Only some government agencies B. All government agencies C. All government agencies and industry organizations D. None of the above
not A or B
___________ are email forwarding services often located in foreign countries. Select one: A. Anonymizers B. Authenticators C. Pseudonymities D. None of the above
not D