Filters
Question type

Study Flashcards

Sherry, a 12-year-old, visited a website that wanted to know her family size, her parents' educational level, and her weekly allowance. The site also asked Sherry's name, mailing and email addresses, and age.


A) Under COPPA, the website must disclose how it will use the information it acquires from Sherry.
B) COPPA prohibits the internet operator from collecting such information under any circumstances.
C) COPPA does not apply to Sherry's situation since she is over the age limit for those protected by the statute.
D) Under COPPA, the website may only collect information about Sherry's name and email address.

Correct Answer

verifed

verified

Musical Productions has a privacy policy posted on its website, but it does not follow the provisions contained within it. Musical Productions is in violation of


A) the CAN-SPAM Act.
B) the Communications Decency Act.
C) Section 5 of the FTC Act.
D) the Electronic Communications Privacy Act.

Correct Answer

verifed

verified

Data disposal laws require


A) businesses to destroy customer data and maintain reasonable security procedures to guard against theft.
B) senders of promotional emails to offer an opt-in system to recipients.
C) companies to obtain permission from customers before destroying data older than ten years old.
D) businesses to notify individuals who are affected by any incident that results in unauthorized access of data.

Correct Answer

verifed

verified

Which of the following statements regarding the Foreign Intelligence Surveillance Act (FISA) is true?


A) To spy on people located in the United States who are communicating abroad, the government needs a warrant.
B) FISA was enacted in 1978, but its provisions were greatly strengthened in the aftermath of the 9/11 terrorist attacks.
C) Under the FISA, the government does not need to notify defendants if the evidence being used against them in court was gathered in FISA surveillance.
D) To spy on people located in the United States who are communicating abroad, the government must obtain permission from a secret Foreign Intelligence Surveillance Court.

Correct Answer

verifed

verified

Jorgeson Co., on its website, promised the company would not give a customer's personal information to third parties without the customer's consent, but then gave out such information anyway. This practice violates Section 5 of the FTC Act.

Correct Answer

verifed

verified

What is user-generated content?


A) commercial transactions conducted electronically on the internet
B) unsolicited commercial email
C) anything created and made publicly available by end users
D) large data sets that reveal user patterns, trends, and association

Correct Answer

verifed

verified

The principle of net neutrality asserts that all information contained on the internet should be regulated equally among each of the fifty states.

Correct Answer

verifed

verified

The Electronic Communications Privacy Act of 1986 is a federal statute that regulates email.

Correct Answer

verifed

verified

Which statement regarding FIPS is true?


A) FIPS are only recommendations, not law.
B) FIPS originated from the Department of Justice.
C) FIPS has been ineffective in shaping privacy policies.
D) FIPS was established after the 9/11 terrorist attacks.

Correct Answer

verifed

verified

The federal government has preempted the field of online privacy, so states may not pass their own online privacy statutes.

Correct Answer

verifed

verified

Which of the following is NOT a core principle of the Fair Information Practices (FIPS) ?


A) Notice/Awareness
B) Choice/Consent
C) Privacy/Refusal
D) Access/Participation

Correct Answer

verifed

verified

The internet was started in the 1960s as a project to link military contractors and universities. The World Wide Web was created as a subnetwork of the internet.

Correct Answer

verifed

verified

Explain the core principles in the Fair Information Practices.

Correct Answer

verifed

verified

There are four core principles of the FI...

View Answer

The case of Chaney v. Fayette County Public School District held that


A) when someone shares a photo with friends online, he or she cannot justifiably expect that the photo will be kept private.
B) the Fourth Amendment governs the private sector as well as actions taken by the government.
C) wiretap laws protect all speakers, not just those with a reasonable expectation of privacy.
D) so-called "revenge porn" posted on social media is protected speech by the First Amendment.

Correct Answer

verifed

verified

Which of the following protects email messages from unauthorized interception?


A) CAN-SPAM
B) FIPS
C) ECPA
D) COPPA

Correct Answer

verifed

verified

Which of the following statutes requires that commercial email not have deceptive headings and clearly indicate if the email is an advertisement?


A) ECPA
B) CDA of 1996
C) Section 5 the FTC Act
D) CAN-SPAM

Correct Answer

verifed

verified

Which of the following is a true statement regarding the EU General Data Protection Regulation?


A) It defines data only as information that can be used directly to identify an individual.
B) It applies only to companies located within Europe.
C) It allows people to stop companies from processing their personal data.
D) It allows businesses to keep customer data indefinitely.

Correct Answer

verifed

verified

Unsolicited commercial email (UCE) or unsolicited bulk email (UBE) messages


A) are commonly known as "cookies."
B) constitute about 90 percent of all email.
C) are estimated to be fraudulent either in content or packaging in approximately one-fourth of all cases.
D) although annoying, do lower the cost of connecting to the internet.

Correct Answer

verifed

verified

Stuart is vying for a promotion but faces competition from a coworker, Brenda. Without authorization, Stuart accesses stored company records and discovers an unfavorable email message Brenda had written about the company. Stuart sends the message to his supervisor in hopes of keeping Brenda from getting the promotion. Discuss whether Stuart has violated any statute and, if so, what sanctions he may face.

Correct Answer

verifed

verified

Stuart violated the Electronic Communica...

View Answer

Which of the following regulates deceptive practices regarding a company's privacy policy?


A) Section 5 of the FTC Act
B) the federal COPPA
C) the federal ECPA
D) the FCC's privacy directive

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer