True/False Chapter 12
False
Messages encrypted using a public key RSA129 cryptosystem code have not yet been cracked.
False
"Opt-in" means the business can use it unless the person explicitly prohibits the new use.
True
Hyperlinks have two parts: the part you read and the part the computer reads—the actual place you will go to when you click the link.
True
A company can place a cookie on your computer even if you've never visited its Web site.
False
A third-party cookie is initiated by a direct request by the user.
False
American privacy laws are much stricter than European laws.
False
Americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purpose and Security.
True
Cookies can be used to track ad placement on Web sites.
True
Emptying the trash is no guarantee that the data has been erased.
True
Identity theft is the crime of posing as someone else for fraudulent purposes.
False
In the United States, the protection of an individual's privacy is the responsibility of the government.
True
In contrast to the "omnibus" solution of adopting the OECD list, the United States uses an approach called "sectoral," meaning that it passes laws to deal with specific industries (business sectors) or practices.
True
Information is generated when buying goods and services at a store.
True
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States.
True
Modern browsers let you control the cookie policy for your computer.
True
Partial backups should be made more often than full backups.
True
Non-EU countries that want information on EU citizens must show that they have privacy laws consistent with the OECD principles.
False
Personal computers can only be backed up to another hard disk.
False
The Do-Not-Call List was so successful that it has now been applied to email.
True
The United States has not adopted the OECD principles.
True
The United States provides limited enforcement of OECD privacy principles.
False
The difference between a worm and a virus is that the worm program "rides along" with other software, while the virus can actually send itself to other devices on the Internet.
True
The laws protecting the information of individuals place more limits on the government than on business.
True
The purpose of encryption is to allow private transmission and storage of sensitive information.
False
The vast majority of business transactions are anonymous.
True
Viruses are often distributed through email attachments.