ch 4

Ace your homework & exams now with Quizwiz!

Which of the following is not a U.S. federal law affecting private institutions?

Computer Matching and Privacy Protection Act

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

All of the following are technical solutions to protecting user privacy except:

data use policies

TRUSTe is an example of which of the following?

online seal program

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

patent law

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries

safe harbor

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

_______ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use

the opt in model

According to ________, you should take the action that produces the least harm.

the risk aversion principle

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

true

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

true

Copyright is a legal protection given to creators of certain types of intellectual property.

true

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

true

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

true

Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.

true

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family.

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The privacy act

All of the following are steps in the process for analyzing an ethical issue except:

assigning responsibility

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

Gaining unapproved access to a computer is not a federal crime.

false

pam is legally defined as any e-mail that is unsolicited.

false

Which of the following is not protected by copyright law?

machines

When a cookie is created during a website visit, it is stored:

n the hard drive of the visitor's computer.


Related study sets

Related questions of Saunders Test PREP off website 8th edition

View Set

Articulaciones - Enfermedades Infecciosas

View Set

IGCSE History CH 100 Question Quiz

View Set

Chapter 5: The First Two Years: Biosocial Development

View Set

Module 4 quiz evolve questions: Community

View Set

history test Topic 3: ancient india and china

View Set

x-intercept and y-intercept and slope

View Set

Massachusetts permit practice test 2018

View Set