dump Flashcards
Selfie Shenanigans is planning to implement its newest feature in US (only). It will analyze all uploaded photos for visible signs of health issues. The data is sold to the user’s health insurer which law would least possibly be broken?
A. HIPAA
B. Children’s Online Privacy Protection Act
C. GDPR
D. HITECH
C. GDPR only applies to Europe this was in the US only
Selfie Shenanigans. You find out the website has a privacy notice that is shown before users sign up. What needs to happen?
A check whether the new practice is allowed for, according to the privacy notice, needs to be performed
What is the Communications Assistance to Law Enforcement Act also referred to?
A. The Pen Register
B. The Digital Telephony Bill
C. The Wire
D. Track and Trace
B. The Digital Telephony Bill
The Communications Assistance for Law Enforcement Act (CALEA), also known as the “Digital Telephony Act,” is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton
In 2016 the FBI was quarreling with Apple. What was the quarrel about?
A. new firmware slowing down phones
B. helping gain access to the data on a seized phone
C. the tablets in the Federal Bureau of Investigation’s office could not fit the micro-SD required for the investigation
D. a cloud security breach exposing pictures of celebrities
B. Helping gain access to the data on a seized phone
What is not the result of an organization starting a privacy program?
A. awareness amongst employees
B. reduced risk of compliance issues
C. an increase in breach detection rate and breach response time
D. full future proof of compliance with privacy legislation
D. full future proof of compliance with privacy legislation
The word privacy is NOT mentioned in the U.S. Constitution
True/ False
True
True or false?
Health insurance providers may, under some circumstances, implement higher premiums based on genetic information.
False
What is COIT?
Consumerization of information technology (COIT): Use of personal computing devices in the workplace and online services (webmail, cloud storage, social media)
<p>Which act was passed as part of the ECPA to address interception of electronic communications in facilities where electronic communication service is provided?</p>
<p>A. Privacy Protection Act (PPA)</p>
<p>B. Stored Communications Act (SCA)</p>
<p>C. Communications Assistance to Law Enforcement Act (CALEA)</p>
<p>D. Electronic Communications Privacy Act (ECPA)</p>
B. Stored Communications Act (SCA)
Which act requires giving a privacy notice to subscribers at the time of the initial agreement (and annually thereafter) including the nature of personal information collected, how it is used, and retention period, as well as how to access and correct information?
A. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
B. Telecommunications Act
C. Cable Communications Policy Act
D. Video Privacy Protection Act (VPPA)
C. Cable Communications Policy Act
Which of the following terms specifically means removing or blocking information from court documents?
A. Protective order
B. Protecting publicly available information (PPAI)
C. Electronic discovery
D. Redaction
D. Redaction
Which of the following are required for an entity to be considered a “business” under the California Consumer Privacy Act? Select all that apply.
A. An entity that makes $10 million in annual revenue
B. An entity that holds the personal information of 50,000 people, households or devices
C. An entity that makes at least half of its revenue from the sale of personal information
D. All of the above.
B. An entity that holds the personal information of 50,000 people, households or devices
C. An entity that makes at least half of its revenue from the sale of personal information
Which are exceptions to state breach notification laws? Select all that apply.
A. Entities subject to other, more stringent data breach notification laws
B. Entities that already follow breach notification procedures that are compatible with state law
C. Entities enrolled in self-certification programs that meet industry security standards
D. None of the above.
A. Entities subject to other, more stringent data breach notification laws
B. Entities that already follow breach notification procedures that are compatible with state law
Is there an overarching employment privacy law in the U.S.?
EXAMPLE ANSWER: There is no overarching law for employment privacy.
- Some constitutional, federal, state, tort and statutory laws impact privacy
- Contracts between employer and employee may impact privacy agreements
- There is considerable local variation and complexity on employment privacy issues
- Many U.S. labor laws mandate employee data collection and management practices, such as conducting background checks and ensuring and documenting a safe workplace environment
- Organizations also have incentives to gather information about employees and monitor the workplace to reduce the risk of being sued for negligent hiring or supervision
Under the Fair Credit Reporting Act (FCRA), which are employer requirements for obtaining a consumer report on an applicant? Select all that apply.
A. Have a permissible purpose
B. Provide notification of the intention to run a consumer report
C. Allow the applicant to receive a copy of the report
D. Obtain written authorization from the applicant
E. Use a qualified credit reporting agency
F. Provide notice to the credit reporting agency outlining the intended purpose of the report
G. Provide the applicant with notice and a copy of the report for dispute prior to adverse action
A. Have a permissible purpose
B. Provide notification of the intention to run a consumer report
C. Allow the applicant to receive a copy of the report
D. Obtain written authorization from the applicant
E. Use a qualified credit reporting agency
G. Provide the applicant with notice and a copy of the report for dispute prior to adverse action
What are the four steps involved in the development of a privacy program?
A. Discover, build, communicate, evolve
B. Research, design, build, audit
C. Brainstorm, propose, implement, follow-through
D. Test, learn, revise, monitor
A. Discover, build, communicate, evolve
Which is a provision of the Cybersecurity Information Sharing Act (CISA)? Select all that apply.
A. Companies must remove personal information before sharing
B. Companies are protected from liability for monitoring activities
C. Companies that process the personal information of 100,000 individuals or more are required to participate
D. Sharing information with the federal government does not waive privileges
E. Shared information is exempt from federal and state Freedom of Information laws
A. Companies must remove personal information before sharing
B. Companies are protected from liability for monitoring activities
D. Sharing information with the federal government does not waive privileges
E. Shared information is exempt from federal and state Freedom of Information laws
Rules that govern the collection and handling of personal information regarding internet activity can be categorized as what type of privacy?
Information privacy
True or false?
When federal laws do not provide a consumer protection that a state believes is necessary, the state may enact a law to provide the protection for its citizens.
True
<p>Which of the following federal laws ensures that employee benefits programs are created fairly and administered properly?</p>
<p>A. The Health Insurance Portability and Accountability Act (HIPAA)</p>
<p>B. The Consolidated Omnibus Budget Reconciliation Act (COBRA)</p>
<p>C. The Employee Retirement Income Security Act (ERISA)</p>
<p>D. The Family and Medical Leave Act (FMLA)</p>
C. The Employee Retirement Income Security Act (ERISA)
<p>Which are provisions of the Fair Credit Reporting Act (FCRA)? Select all that apply.</p>
<p>A. Consumers have the ability to access and correct their information</p>
<p>B. Consumers may request annual updates and alerts</p>
<p>C. Use of consumer reports is limited to “permissible purposes”</p>
<p>D. Use of consumer reports is limited to three instances per six months</p>
<p>A. Consumers have the ability to access and correct their information</p>
<p>C. Use of consumer reports is limited to “permissible purposes</p>
you must respond to requests of information in connection with criminal investigations and litigation, which laws did you have to comply when responding to such requests .
EXAMPLE ANSWERS:
• Acts involving the access of financial data
- The Electronic Communications Privacy Act (ECPA)
- The Communications Assistance to Law Enforcement Act (CALEA)
<p>What is a pen register?</p>
<p>A. A list of consumers who have requested to be notified if their personal information is shared with law enforcement</p>
<p>B. A list of law enforcement personnel who may obtain sensitive personal information without a court order</p>
<p>C. Records kept by financial institutions on certain financial transactions</p>
<p>D. A device that records the telephone numbers of all outgoing calls</p>
D. A device that records the telephone numbers of all outgoing calls
<p>Under the Right to Financial Privacy Act (RFPA), which of the following may allow a government authority access to customer financial records? Select all that apply.</p>
<p>A. Appropriate formal written request from an authorized government authority</p>
<p>B. Appropriate administrative subpoena or summons</p>
<p>C. Qualified search warrant</p>
<p>D. Legitimate interest of an authorized government authority</p>
<p>E. Customer authorization F. Appropriate judicial subpoena</p>
A. Appropriate formal written request from an authorized government authority
B. Appropriate administrative subpoena or summons
C. Qualified search warrant
E. Customer authorization
F. Appropriate judicial subpoena
From the standpoint of a privacy professional, how was the collection and storage of personal information impacted by the Snowden revelations?
The case study of Edward Snowden illustrates that further reforms were necessary.Snowden’s revelations led to reforms enacted via the USA FREEDOM Act.
What actions can an organization take to proactively protect personal information in the event it is required to turn over electronic data for litigation?
<p>• Place limits on using company email for personal use</p>
<p>• Discourage conducting company business on personal devices</p>
<p>• Implement policies and practices for when an employee leaves the organization</p>
<p>True or false?</p>
<p>Materials submitted to courts during trials are usually publicly available</p>
True
What U.S. laws and guidelines address data subject privacy preferences?
EXAMPLE ANSWERS: • Opt-in • COPPA • HIPAA • Fair Credit Reporting Act • Some email marketers (double opt-in)
- Opt-out • GLBA • CAN-SPAM • Do Not Call rules
- Access • HIPAA (medical records) • Fair Credit Reporting Act (credit reports) • Statements of fair information practices (e.g., OECD Guidelines, APEC Principles, Privacy Shield)
<p>What are the pros of monitoring in the workplace? Select all that apply.</p>
<p>A. OSHA compliance</p>
<p>B. Employee morale</p>
<p>C. Physical security and cybersecurity</p>
<p>D. Training</p>
<p>E. Quality assurance</p>
A. OSHA compliance
C. Physical security and cybersecurity
D. Training
E. Quality assurance
True or false?
Some internet services fall within the scope of the Communications Assistance to Law Enforcement Act (CALEA).
True
<p>When a customer calls a company’s service support line and hears a recorded message that the call may be recorded for quality purposes, this qualifies as a legal exception to which act prohibiting the wiretapping of telephone calls?</p>
<p>A. Omnibus Crime Control and Safe Streets Act</p>
<p>B. Electronic Communications Privacy Act (ECPA)</p>
<p>C. Stored Communication Act (SCA)</p>
<p>D. Privacy Protection Act (PPA)</p>
A. Omnibus Crime Control and Safe Streets Act
<p>Which federal agency oversees “the welfare of the job seekers, wage earners, and retirees of the United States”?</p>
<p>A. Federal Trade Commission (FTC)</p>
<p>B. Department of Labor (DOL)</p>
<p>C. National Labor Relations Board (NLRB)</p>
<p>D. Occupational Safety and Health Act (OSHA)</p>
<p>E. Securities and Exchange Commission (SEC)</p>
<p>F. Equal Employment Opportunity Commission (EEOC)</p>
B. Department of Labor (DOL)
True or false? Restrictions on the processing of personal information may differ, depending on the source of the information.
True
<p>Which is a component of the Privacy Protection Act (PPA)? Select all that apply.</p>
<p>A. Provides an extra layer of protection for members of the media and media organizations from government searches or seizures</p>
<p>B. Prohibits government officials engaged in criminal investigations from searches or seizures of media work products or documentary materials</p>
<p>C. Applies to government officers or employees at all levels of government</p>
<p>A. Provides an extra layer of protection for members of the media and media organizations from government searches or seizures</p>
<p>B. Prohibits government officials engaged in criminal investigations from searches or seizures of media work products or documentary materials</p>
<p>C. Applies to government officers or employees at all levels of government</p>
If the PPA prohibits government officials from searching or seizing media work products or documentary materials, how could law enforcement obtain evidence from those engaged in these First Amendment activities
Law enforcement would need to rely on subpoenas or voluntary cooperation from the media.
<p>True or false?</p>
<p>The Telephone Consumer Protection Act (TCPA) implements the Telemarketing Sales Rule (TSR).</p>
False
True or false?
FISA was amended in 2008 because the flexible legal limits provided by the USA PATRIOT Act led to major legal, public relations and civil liberties issues
True
True or false?
All state laws regarding data breaches require third-party notification and notification to the state attorney general.
True
Which U.S. statutes provide the FTC with additional enforcement authority over privacy issues?
The Children’s Online Privacy Protection Act (COPPA),
the Fair Credit Reporting Act (FCRA),
the Gramm-Leach Bliley Act (GLBA),
the CAN-SPAM Act
<p>What does NSL stand for?</p>
<p>A. National security landscape</p>
<p>B. National security letter</p>
<p>C. National security law</p>
<p>D. National security liability</p>
B. National security letter
<p>Which act restricts accessing, using and disclosing customer proprietary network information (CPNI)?</p>
<p>A. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)</p>
<p>B. Telecommunications Act</p>
<p>C. Cable Communications Policy Act</p>
<p>D. Video Privacy Protection Act (VPPA)</p>
B. Telecommunications Act
What privacy concerns might arise as employers follow federal laws for employee benefits management in the workplace?
<p>EXAMPLE ANSWERS:</p>
<p>• The collection or continued maintenance of employee data when maintaining COBRA coverage</p>
<p>• The types of data that might be collected and maintained when complying with FMLA</p>
<p>Which procedures should be considered regarding the termination of employment? Select all that apply.</p>
<p>A. Have a secure method to deactivate physical access badges, keys and smartcards</p>
<p>B. Disable access to computer accounts</p>
<p>C. Design IT systems to minimize disruption</p>
<p>D. Ensure the return of all devices and any company data that is held by the employee outside of the company’s systems</p>
<p>A. Have a secure method to deactivate physical access badges, keys and smartcards</p>
<p>B. Disable access to computer accounts</p>
<p>C. Design IT systems to minimize disruption</p>
<p>D. Ensure the return of all devices and any company data that is held by the employee outside of the company’s systems</p>
<p>Which of the following is an agreement or settlement that resolves a dispute between two parties without admission of guilt or liability?</p>
<p>A. Common law</p>
<p>B. Tort law</p>
<p>C. Contract law</p>
<p>D. Consent decree</p>
D. Consent decree
True or false?
The USA PATRIOT Act was passed in response to the Edward Snowden revelations.
False
A. see how a company uses its personal information
B. view what personal information a company may have on record
C. correct any wrong personal information an entity may have on record
D. comprehensive approach
A. Relies on a confidence and trust business model
And
B. more self-regulation than government regulation
“Social engineering” is the technique by which:
A. Information security managers establish controls that protect the integrity of sensitive or personal data within an organization
B. Policy makers formulate procedural guidelines for the use, sharing or disclosure of sensitive or personal data within a community
C. Hackers or exploit artists use psychological persuasion or coercion in order to gain access to sensitive or personal data
D. Scientists and academics determine public attitudes concerning the handling of sensitive or personal data by governments, businesses and other organizations
C. Hackers or exploit artists use psychological persuasion or coercion in order to gain access to sensitive or personal data
Which of the following sources of law affect privacy for private-sector employees? Select all that apply.
A. Federal constitutional law
B. Contract law
C. Torts
D. Statutes
B. Contract law
C. Torts
D. Statutes
True or false?
Health insurance providers may, under some circumstances, implement higher premiums based on genetic information.
False
Which authorities oversee privacy-related issues in the U.S.? Select all that apply.
A. The Federal Trade Commission (FTC)
B. State attorneys general
C. The national data protection authority
D. Federal financial regulators
A. The Federal Trade Commission (FTC)
B. State attorneys general
D. Federal financial regulator
you must respond to requests of information in connection with criminal investigations and litigation, which laws did you have to comply when responding to such requests .
EXAMPLE ANSWERS:
• Acts involving the access of financial data
- The Electronic Communications Privacy Act (ECPA)
- The Communications Assistance to Law Enforcement Act (CALEA)
From the standpoint of a privacy professional, how was the collection and storage of personal information impacted by the Snowden revelations?
The case study of Edward Snowden illustrates that further reforms were necessary.Snowden’s revelations led to reforms enacted via the USA FREEDOM Act.
What actions can an organization take to proactively protect personal information in the event it is required to turn over electronic data for litigation?
- Place limits on using company email for personal use
- Discourage conducting company business on personal devices
- Implement policies and practices for when an employee leaves the organization
True or false?
Materials submitted to courts during trials are usually publicly available
True
True or false?
Data destruction requirements are often built into state data security laws
False
What U.S. laws and guidelines address data subject privacy preferences?
EXAMPLE ANSWERS: • Opt-in • COPPA • HIPAA • Fair Credit Reporting Act • Some email marketers (double opt-in)
- Opt-out • GLBA • CAN-SPAM • Do Not Call rules
- Access • HIPAA (medical records) • Fair Credit Reporting Act (credit reports) • Statements of fair information practices (e.g., OECD Guidelines, APEC Principles, Privacy Shield)
List additional high-profile FTC consent decrees.
- Eli Lilly and Company (2002)
- Nomi (2005)
- DesignerWare (2013)
- LabMD (2013)
True or false?
Some internet services fall within the scope of the Communications Assistance to Law Enforcement Act (CALEA).
True
The Civil Rights Act bars discrimination due to what? Select all that apply.
A. Race B. Color C. Religion D. Disabilities E. Sex F. National origin G. Genetic information
A. Race B. Color C. Religion E. Sex F. National origin
True or false? Restrictions on the processing of personal information may differ, depending on the source of the information.
True
Which is a component of the Privacy Protection Act (PPA)? Select all that apply.
A. Provides an extra layer of protection for members of the media and media organizations from government searches or seizures
B. Prohibits government officials engaged in criminal investigations from searches or seizures of media work products or documentary materials
C. Applies to government officers or employees at all levels of government
A. Provides an extra layer of protection for members of the media and media organizations from government searches or seizures
B. Prohibits government officials engaged in criminal investigations from searches or seizures of media work products or documentary materials
C. Applies to government officers or employees at all levels of government
If the PPA prohibits government officials from searching or seizing media work products or documentary materials, how could law enforcement obtain evidence from those engaged in these First Amendment activities
Law enforcement would need to rely on subpoenas or voluntary cooperation from the media.
True or false?
FISA was amended in 2008 because the flexible legal limits provided by the USA PATRIOT Act led to major legal, public relations and civil liberties issues
True
True or false?
HIPAA preempts stricter state laws.
False
True or false?
All state laws regarding data breaches require third-party notification and notification to the state attorney general.
True
True or false?
The USA PATRIOT Act was passed in response to the Edward Snowden revelations.
False