A) Under COPPA, the website must disclose how it will use the information it acquires from Sherry.
B) COPPA prohibits the internet operator from collecting such information under any circumstances.
C) COPPA does not apply to Sherry's situation since she is over the age limit for those protected by the statute.
D) Under COPPA, the website may only collect information about Sherry's name and email address.
Correct Answer
verified
Multiple Choice
A) the CAN-SPAM Act.
B) the Communications Decency Act.
C) Section 5 of the FTC Act.
D) the Electronic Communications Privacy Act.
Correct Answer
verified
Multiple Choice
A) businesses to destroy customer data and maintain reasonable security procedures to guard against theft.
B) senders of promotional emails to offer an opt-in system to recipients.
C) companies to obtain permission from customers before destroying data older than ten years old.
D) businesses to notify individuals who are affected by any incident that results in unauthorized access of data.
Correct Answer
verified
Multiple Choice
A) To spy on people located in the United States who are communicating abroad, the government needs a warrant.
B) FISA was enacted in 1978, but its provisions were greatly strengthened in the aftermath of the 9/11 terrorist attacks.
C) Under the FISA, the government does not need to notify defendants if the evidence being used against them in court was gathered in FISA surveillance.
D) To spy on people located in the United States who are communicating abroad, the government must obtain permission from a secret Foreign Intelligence Surveillance Court.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) commercial transactions conducted electronically on the internet
B) unsolicited commercial email
C) anything created and made publicly available by end users
D) large data sets that reveal user patterns, trends, and association
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) FIPS are only recommendations, not law.
B) FIPS originated from the Department of Justice.
C) FIPS has been ineffective in shaping privacy policies.
D) FIPS was established after the 9/11 terrorist attacks.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Notice/Awareness
B) Choice/Consent
C) Privacy/Refusal
D) Access/Participation
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) when someone shares a photo with friends online, he or she cannot justifiably expect that the photo will be kept private.
B) the Fourth Amendment governs the private sector as well as actions taken by the government.
C) wiretap laws protect all speakers, not just those with a reasonable expectation of privacy.
D) so-called "revenge porn" posted on social media is protected speech by the First Amendment.
Correct Answer
verified
Multiple Choice
A) CAN-SPAM
B) FIPS
C) ECPA
D) COPPA
Correct Answer
verified
Multiple Choice
A) ECPA
B) CDA of 1996
C) Section 5 the FTC Act
D) CAN-SPAM
Correct Answer
verified
Multiple Choice
A) It defines data only as information that can be used directly to identify an individual.
B) It applies only to companies located within Europe.
C) It allows people to stop companies from processing their personal data.
D) It allows businesses to keep customer data indefinitely.
Correct Answer
verified
Multiple Choice
A) are commonly known as "cookies."
B) constitute about 90 percent of all email.
C) are estimated to be fraudulent either in content or packaging in approximately one-fourth of all cases.
D) although annoying, do lower the cost of connecting to the internet.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Section 5 of the FTC Act
B) the federal COPPA
C) the federal ECPA
D) the FCC's privacy directive
Correct Answer
verified
Showing 21 - 40 of 45
Related Exams