Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The expansion of the ______ made it easier for the government to collect phone s

ID: 3855506 • Letter: T

Question

The expansion of the ______ made it easier for the government to collect phone subscriber data a. Sarbanes-Oxley Act b. Patriot Act c. Privacy Act d. Family Educational Rights and Privacy Act e. Health Insurance Portability and Accountability Act _____ is the right to determine when, and to what extent, information about and individual can be gathered and/or communicated to others. a. Right to privacy b. Freedom of speech c. Accessibility d. Information privacy e. Liability Digital dossiers may include the items below EXCEPT: a. Images in surveillance cameras b. Credit card transactions c. Health records d. Banking transactions e. Queries to search engines Cameras, digital sensors, mapping services, global positioning systems, and facial recognition technology are examples of technology used to conduct: a. Ethical reviews b. Big data analysis c. Business intelligence d. Profiling e. Electronic surveillance Lawful activities in business organizations include: a. Reading employees' email and other electronic documents b. Monitoring employers Internet usage c. Block employee's Internet connections d. URL filtering e. All of the above Students in public universities may maintain an informal, personal journal on the Web that they may update frequently and is intended for general public reading. a. Resume b. Social network profile c. Digital dossier d. Blog e. Thesis Bright Smiles, a cosmetic dental office, requires new patients to read the office's privacy policies and to sign their informed consent to permit the collection of their personal information only until the patient specifically requests that the data not be collected. The informed consent approach Bright Smiles is using is known as: a. Utilitarian model b. Rights model c. Opt-out model d. Fair information practices model e. None of the above Threats to privacy include the items below EXCEPT: a. Freedom of speech b. Electronic surveillance c. Personal information in databases d. Internet bulletin board e. Social networking sites To protect the privacy of citizens of other nations, the US developed the _____ framework to regulate the way that US companies export and handle personal data including their names and addresses. a. Fairness b. Opt-in c. Safe haven d. Safe harbor e. None of the above The following is true about a code of ethics EXCEPT: a. It usually developed by companies and professional organizations b. It is a collection of principles intended to guide decision making by members of the organization c. Different code of ethics are not always consistent with one another d. Are not always consistent with one another e. Includes the right to be left alone and to be free of unreasonable personal intrusions Employee errors are a threat to information security. The cause of these errors may be: a. Lack of awareness b. Carelessness c. Lack of training d. Poor education e. All of the above

Explanation / Answer

1. Privacy Act

This act was made for the collection , maintainence and use of personal identifiable information.It was started in 1974.

2. Right To Privacy

This act can be used by an individual to determine when and upto what extent it must be used.This act is applicable and meant right by a round figure of approx 150 countries.

3. NONE OF THE ABOVE

All the listed items in the options comes under the Digital Dossier and all the data is recorded and saved in the digial dossier rather it be survelliance images or bank transactions or search queries everything is recorded.

4. Big Data Analysis

All the above stated items can be used to collect the data of the user which then will be used to make a statistical information about the data and making a seperate user data so that further requirements of the user can be matched.

5. All Of The Above

All of the above options are valid options for the lawful activities upon the employee and managing such activities is useful for the organization to monitor the work of the employee and making him work efficiently.

6. Blog

This is an informal and personal journal on the web which lets the student update his daily life and keep a track on whatever is required and necessary for tracking the changes that he/she must do.

7. Opt-out Model

In this model the customer or client requests to avoid getting the unsolicited products and service information.The opt-out model always used in gaining digital market.

8. Electronic Survelliance

It is the survelliance program where an individual or group of individuals are monitored under the home, social networking sites, internet, cameras ,etc. This is the threat to privacy as everything is under the survelliance and somebody is watching you everytime .

9. Opt-in

This is the privacy policy which was actiated by the USA government to get the citizens relax because when it was breaking out that the companies are selling the data of the customers.To take measures USA government saw the creeping out of citizens and called out for this privacy policy.

10. Include the right to be left alone and to be free of unreasonable personal instructions.

The code of ethics are dependent on the guidelines which are outlined by the organization for an employee so there will be a monitoring team in the organizations and hence, leaving alone without any personal instructions is next to impossible.

11. All of the Above

Information Security is the field where minor errors can result in big disasters and when the employee causes them because of many reasons . Some of them are in the question with options.

Please rate the answer if it helped.....Thankyou

Hope it helps....

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote