Ch. 11 Telecommunications & Marketing Quiz Flashcards
In general, US laws regulating marketing communications require:
A. opt-in choice
B. opt-out choice
C. both opt-in and opt-out options
D. non of the above
B. opt-out choice
According to US marketing laws, opt-in is required in all the following circumstances EXCEPT:
A. email or SMS to wireless devices
B. faxing outside an existing relationship
C. telemarketing with a live operator
D. pre-recorded telemarketing messages
C. telemarketing with a live operator
Telemarketing registries must be scrubbed against the US federal Do-Not-Call Registry:
A. every week
B. every month
C. every year
D. every two years
B. every month
Which of the following entities has the ability to enforce the US federal Do- Not-Call Registry?
A. Better Business Bureau
B. state attorney generals
C. Federal Trade Commission
D. individuals
C. Federal Trade Commission
According to the Federal Trade Commission’s all of the following are included under the Telemarketing Sales Rules (TSR), EXCEPT:
A. caller ID information must be displayed
B. the caller must identify him/herself and the product being sold
C. records must be retained for 12 months
D. calls can only be made between 8AM and 9PM
C. records must be retained for 12 months
All of the following entities are regulated by the Federal Trade Commission’s Telemarketing Sales Rules, EXCEPT:
A. campaigns for charitable contributions
B. calls regarding the purchase of a product
C. calls regarding subscriptions to services
D. non-profit organizations calling on their own behalf
D. non-profit organizations calling on their own behalf
According to the national Do-Not-Call registry, “existing business relationships” are defined as calls:
A. to existing customers and prospects within 18 months
B. to existing customers within 18 months
C. to prospective customers within 90 days
D. both b and c are true
D. both b and c are true
Which of the following statements is TRUE regarding US state telemarketing rules?
A. Less than 12 states have telemarketing rules.
B. The Federal Trade Commission’s (FTC) Telemarketing Sales Rules (TSR) do not preempt state laws.
C. Most telemarketing companies do not need to respect state do-not-call registries.
D. State telemarketing rules are identical to the FTC’s TSR.
B. The Federal Trade Commission’s (FTC) Telemarketing Sales Rules (TSR) do not preempt state laws.
According to FCC (Federal Communication Commission) regulations:
A. unsolicited commercial faxes are not currently prohibited, but discouraged.
B. unsolicited faxes are allowed, but for commercial purposes only.
C. unsolicited commercial faxes have been prohibited since 2000.
D. unsolicited commercial faxes have been prohibited since 1991.
D. unsolicited commercial faxes have been prohibited since 1991.
The JFPA (Junk Fax Prevention Act) permits commercial faxes:
A. as long as opt-in choice was presented.
B. as long as opt-out was provided.
C. as long as there is a pre-existing customer relationship.
D. none of the above; commercial faxes are never permitted.
B. as long as opt-out was provided.
All of the following statements regarding the JFPA (Junk Fax Prevention Act) are true, EXCEPT:
A. The organization must have either an existing business relationship or the customer’s fax number before sending unsolicited commercial faxes.
B. Existing business relationships are based on a previous inquiry, application, purchase or transaction between the company and the customer.
C. Opt-out choice must be clear and free of charge.
D. Any fax numbers obtained from third parties must be verified before use.
A. The organization must have either an existing business relationship or the customer’s fax number before sending unsolicited commercial faxes.
The CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing Act, 2003) covers the transmission of:
A. commercial faxes
B. commercial phone calls
C. commercial e-mail messages
D. all of the above
C. commercial e-mail messages
According to the CAN-SPAM Act (Controlling the Assault of Non-Solicited Pornography and Marketing Act, 2003) all of the following statements are true, EXCEPT:
A. opt-outs must be processed within ten days.
B. e-mail messages must include the company’s physical address.
C. e-mail messages can only be sent to individuals with an existing business relationship.
D. e-mails cannot include false or deceptive messages or headers.
C. e-mail messages can only be sent to individuals with an existing business relationship.
Which of the following statements is TRUE regarding sending commercial messages to wireless devices?
A. The sender is prohibited from charging fees for the consent or revocation process.
B. Opt-out choice must be provided.
C. This is regulated by the FCC.
D. The individual must be presented with a consent form with specific criteria.
B. Opt-out choice must be provided.
What law does the Junk Fax Prevention Act amend?
A. Communications Act of 1934
B. Glass-Steagall Act of 1933
C. Fair Credit Reporting Act of 1970
D. Children’s Online Privacy Protection Act of 2000
A. Communications Act of 1934
On July 9, 2005, President Bush signed into law S. 714, the Junk Fax Prevention Act of 2005 (Act). The Act immediately came into force, substantially amending the Telephone Consumer Protection Act (“TCPA”; 47 U.S.C. § 227).
The law amends the Communications Act of 1934, significantly altering some aspects of prior amendments made by the Telephone Consumer Protection Act of 1991 and the CAN-SPAM Act of 2003 as they relate to the issue of junk fax.
What is the minimum per page fine for an unsolicited advertisement sent by fax, according to the Junk Fax Prevention Act?
A. 100
B. 200
C. 500
D. 1000
C. 500
Under the JFPA, sending an unsolicited advertisement could lead to a minimum civil penalty of $500 per page. … Including a notice on the first page of the unsolicited advertisement that instructs the recipient on how to request that they not receive future advertisements; and.
The Telephone Consumer Protection Act governs the behavior of:
A. consumers
B. telemarketers
C. telecommunications companies
D. cellular phone manufacturers
B. telemarketers
The Telephone Consumer Protection Act (TCPA) is the primary federal law governing the regulation of telephone solicitations.
What persons or groups may still make unsolicited calls to those on the National Do Not Call Registry?
A. political groups
B. charities
C. conductors of surveys
D. bill collectors
A. political groups
B. charities
C. conductors of surveys
D. bill collectors
A person may still receive calls from a company up to 31 days after submitting an application or inquiry to that company, unless the company is specifically asked not to call. A person may still receive calls from bill collectors (either primary creditors or collection agencies).
There are some exemptions to the Do Not Call rules. Because of the limits to FTC’s authority, the Registry does not apply to political calls or calls from non-profits and charities (but the Registry does cover telemarketers calling on behalf of charities).
The do not call provisions do not cover calls from political organizations, charities, telephone surveyors, or companies with which a consumer has an existing business relationship.
Commercial conduct that results in substantial injury is referred to as:
A. harmful trade practices
B. negligent trade practices
C. unfair trade practices
D. problematic trade practices
C. unfair trade practices
A situation in which neither person who sends or receives information is allowed to dispute the transferred information is called:
A. non-repudiation
B. conflict resolution
C. compromise
D. waived right to access
z
This is when an individual does not have the ability to opt out of receiving communications from an entity
A. customer fraud
B. required communication
C. no-opt
D. waived right to access
z
This is a document stating an entity’s practices - especially those concerned with information privacy:
A. notice
B. alert
C. privacy message
D. privacy document
z
Which of the following are typically included in a privacy notice?
A. a data subject’s rights with regard to their information
B. for what purposes personal data is used
C. the exact types of information collected
D. the name of any third party entities a company may use to process information
z
What is the definition of notification?
A. the act of giving notice to customers regarding privacy practices
B. any communication notifying customers about new services
C. notifying customers about any unauthorized access to their personal data
D. in the EU and EMEA, countries that store or process personal data must be registered with the office governing data protection.
z
This is the form of consumer agreement in which an individual actively chooses to receive communications from an entity:
A. voluntary communication
B. opt-in
C. opt-out
D. messaging sign-up
z
This is the form of consumer agreement in which communication from an entity is sent because a consumer has not yet expressed a wish to no longer receive communication
A. involuntary communication
B. opt-in
C. opt-out
D. spam
z
This is when information is automatically collected from Web users when they access a Web page:
A. information gathering
B. Web-related collection
C. internet collection
D. passive collection
z
This is a string of numbers, letters, or characters generated by a user to access a computer, document, application or site
A. access code
B. password
C. username
D. secret code
z
Which of the following includes personally identifiable information?
A. IP address
B. Web site preferences tracked by cookies
C. email address
D. name
z
——– is when an entity, posing as a trustworthy source, attempts to collect account information and other personal data from an individual in order to commit fraud. Usually done by scam emails.
A. criminal activity
B. fraudulent collection
C. phishing
D. identity theft
z
Pretexting is:
A. Web site popups
B. creating an invented scenario to collect personal information from individuals
C. sending scam emails
D. spam
a
What is Pretty Good Privacy (PGP)
A. customer management software
B. customer relations software
C. encryption software
D. database management software
C. encryption software
What is Primary Use?
A. use of a computer or database by the network manager or primary user
B. use of an individual’s name
C. using information only for the purposes it was originally collected
D. the top purpose for which a consumer uses a product
C. using information only for the purposes it was originally collected
This is a form of authentication in which a public key of a user is linked with a private key of a user and used to encrypt and decrypt information to allow for secure transactions.
A. public certificate
B. strong authentication
C. transaction encryption
D. cryptography
z
Which of the following is another name for opt-in email?
A. affirmative consent
B. subscription
C. passive consent
D. preemption
z
Which of the following is another name for opt-out?
A. Suppression
B. Subscription
C. Unsubscribe
D. Active Consent
C. Unsubscribe
The goal of the Controlling the Assault of non-solicited Pornography & Marketing Act is best described as which of the following?
A. Apply a paternalistic filtering of pornographic material so as to raise slipping moral standards
B. A way to respect individual rights & provide a way to indicate how wanted communication is
C. Eliminate phishing attacks & reducing the financial burden it causes
D. Allow parents to be in control over what messages their children receive
B. A way to respect individual right & provides a way to indicate how wanted the communication is
Which of the following can be said about the Cable Communications Policy Act?
A. Video rental records cannot be disclosed freely
B. It has become redundant due to internet television
C. Certain damages as a result of violations can be recovered because it provides for a private right of action
D. There is no such law as the Cable Communications Policy Act
C. Certain damages as a result of violations can be recovered because it provides for private right of action
Cable Communications Privacy Act of 1984
• Regulates the notice a cable TV provider must furnish to customers, the ability of cable providers to collect PI, the ability of cable providers to disseminate PI and the retention and destruction of PI by cable TV providers
• Provides a private right of action for violations of the aforementioned provisions and allows for actual or statutory damages, punitive damages, reasonable attorney’s fees, and court costs
Which state was the first to include a Do Not Track requirement in its laws?
A. New York
B. California
C. Washington
D. North Carolina
B. California
Which of the following is true of the US Wiretap Act?
A. Monitoring of business phone calls is permitted, as long as one party consents.
B. Monitoring of business phone calls requires the consent from both parties.
C. Phone calls - business or personal - may not be monitored under any circumstances.
D. Any consent to phone call monitoring must be done in writing only.
A. Monitoring of business phone calls is permitted, as long as one party consents.
Which of the following is NOT true regarding video monitoring in the US?
A. It is limited to non-private areas in the workplace.
B. Video monitoring is regulated by federal statutes.
C. If the video surveillance captures audio, it is also subject to the US Wiretap Act.
D. There are a number of state privacy laws that regulate video monitoring.
B. Video monitoring is regulated by federal statutes.
Which act was passed as part of the ECPA to address interception of electronic communications in facilities where electronic communication service is provided?
A. Privacy Protection Act (PPA)
B. Stored Communications Act (SCA)
C. Communications Assistance to Law Enforcement Act (CALEA)
D. Electronic Communications Privacy Act (ECPA)
B. Stored Communications Act (SCA)
Which act requires giving a privacy notice to subscribers at the time of the initial agreement (and annually thereafter) including the nature of personal information collected, how it is used, and retention period, as well as how to access and correct information?
A. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
B. Telecommunications Act
C. Cable Communications Policy Act
D. Video Privacy Protection Act (VPPA)
C. Cable Communications Policy Act
This type of software program filters content on Web pages to prevent advertisements from appearing on the page:
A. spambot
B. firewall
C. adblocker
D. spyware
C. adblocker
The following are not examples of affiliate entities:
A. parent companies
B. Competitors
C. Sister companies
D. Subsidiaries
B. Competitors
Affirmative Consent is:
A. a form of parental control
B. when a customer agrees to the privacy practices of a company
C. when a customer uses their credit card to purchase a product or service
D. when a customer voluntarily agrees to receive communication from an entity
D. when a customer voluntarily agrees to receive communication from an entity
A form of marketing in which a related entity may advertise the services of another company to increase traffic and share in profits is:
A. spam
B. affiliate programs
C. pop Ups
D. consumer direction
B. affiliate programs
Aggregate information includes:
A. Website traffic counts
B. consumer’s age, gender, or race
C. domain names
D. consumer’s name
A. Website traffic counts
B. consumer’s age, gender, or race
C. domain names
When an individual’s personal information cannot directly be linked back to his identity, he is:
A. hidden
B. behind a firewall
C. anonymous
D. performing an illegal act
C. anonymous
An anonymizer provides the following services:
A. allows the user to surf the internet without being traced
B. removes personal information from data collected by an entity
C. blocks cookies from being placed on a user’s computer
D. an individual who uses the internet anonymously
A. allows the user to surf the internet without being traced
C. blocks cookies from being placed on a user’s computer
How is authentication different from authorization?
A. authentication is the process in which a user is allowed access to information, and authorization is the process through which a user proves his identity
B. authentication is when a user agrees to the terms of a company, and authorization is the process through which a user proves his identity
C. authentication is the process through which a user proves his identity, and authorization is when a user agrees to the terms of a company
D. authentication is the process through which a user proves his identity, and authorization is the process through which a user is allowed access to information
D. authentication is the process through which a user proves his identity, and authorization is the process through which a user is allowed access to information
Which of the following are characteristics of a banner ad?
A. an advertisement typically placed at the top of a Web page
B. a message placed at the top of a Web page giving visitors a brief overview of its contents
C. when clicked will usually direct the user to another Web site offering products or services
D. the owner of a Web page on which a banner ad appears has paid for the placement of the ad
A. an advertisement typically placed at the top of a Web page
C. when clicked will usually direct the user to another Web site offering products or services
D. the owner of a Web page on which a banner ad appears has paid for the placement of the ad
Activities for which a company may use personal information about a customer (business need as related to a customer) include:
A. completing a transaction
B. sending “opt in” marketing communications
C. selling customer information to other entities
D. notifying consumers of an emergency in which the risk to their safety is greater than the risk to their privacy
A. completing a transaction
B. sending “opt in” marketing communications
D. notifying consumers of an emergency in which the risk to their safety is greater
than the risk to their privacy
Which of the following is NOT true about the CAN-SPAM Act of 2003?
A. requires entities to get permission to send marketing emails that would qualify as spam
B. is regulated by the Federal Trade Commission
C. requires commercial email to contain an unsubscribe function which they must honor
D. requires commercial email to contain notice of adult related content and subject lines representative of the offer it contains
A. requires entities to get permission to send marketing emails that would qualify as spam
——– is a form of temporary storage in which a copy of a Web page is saved to the user’s computer or server to allow for faster accessing times
A. cookie
B. caching
C. duplication
D. HTML
B. caching
——– are functions undertaken by a company to manage communications with consumers to increase efficacy
A. customer relations
B. customer relationship management
C. customer communications
D. customer contact management
D. customer contact management
What are the advantages of using a proxy server?
A. anonymity
B. privacy
C. restricting access to the Web
D. faster loading times
A. anonymity
What is the purpose Public Key Infrastructure (PKI)?
A. to control encryption methods
B. to create a set of privacy standards
C. to verify the identify of entities involved in a transaction using encryption
D. to reduce SPAM
C. to verify the identify of entities involved in a transaction using encryption
This is information that can be found in newspapers, telephone directives and other resources widely available:
A. public record
B. local listings
C. unprotected information
D. publicly available information
D. publicly available information
This is information the government may collect and maintain, made available to the public:
A. public record
B. government listings
C. legitimate information
D. publicly available information
A. public record
What is secure sockets layer?
A. another name for HTML
B. another name for encryption
C. a protocol used in the transfer and exchange of hypertext documents
D. a protocol that dictates the use of encryption for communication on the internet.
D. a protocol that dictates the use of encryption for communication on the internet.
This consists of all the policies standards and technology that protect information and support business function.
A. encryption
B. security controls
C. database management
D. customer relations management
B. security controls
Any unsolicited electronic messages are called:
A. opt-out email
B. subscription email
C. scam email
D. spam
D. spam
This is a software that may be downloaded to an individual’s computer without their knowledge and used to collect personal information, particularly financial account information:
A. Web beacon
B. phishing
C. spyware
D. cookies
C. spyware
This is the term for transmitting personal data between companies or countries in order to complete business or customer transactions.
A. Safe Harbor communication
B. electronic communication
C. file sharing
D. transfer
D. transfer
This company is the world’s largest privacy seal program and serves as a mediator in privacy disputes for US companies:
A. Better Business Bureau
B. TRUSTe
C. Federal Trade Commission
D. Safe Harbor
B. TRUSTe
This is a system in which the user has access and control over all actions:
A. any business operating with a TRUSTe certification
B. total access
C. open access
D. trusted system
D. trusted system
Which of the following are considered forms of verifiable parental consent?
A. credit card verification
B. a downloadable form that can be signed and returned by fax or mail.
C. creating a parental account with the same site
D. Social Security Number verification
A. credit card verification
B. a downloadable form that can be signed and returned by fax or mail.