IS3340 CHAPTER 2 Flashcards
Software that displays advertising banners, re-directs a user to Web sites, and conducts advertising on a user’s computer. It also displays pop-up advertisements and is called ___?
ADWARE
Data about a person’s physical or behavioral traits used to identify a particular person. This is unique because it can’t be changed and is called ___?
BIOMETRIC DATA
A personal online journal is called a ___?
BLOG
The data trail that an Internet user creates while browsing. This is a record of the pages that a computer user visits when navigating on a particular Web site and is called ___?
CLICKSTREAM
A body of law that is developed because of legal tradition and court cases. This was also a body of law inherited from England and is called ___?
COMMON LAW
A small string of code that a Web site stores on a user’s computer. Web sites use this to remember specific information about visitors to the site and is called ___?
COOKIE
A tort that involves maliciously saying false things about another person is called ___?
DEFAMATION
The official schedule of a court and the events in the cases pending before a court is called a ___?
DOCKET
Looking through discarded trash for personal information is called ___?
DUMPSTER DIVING
Guidelines used to help describe how personal information should be collected and used is called ___?
FAIR INFORMATION PRACTICE PRINCIPLES
A navigation technology that uses satellites above the earth to compute the location of a certain type of receiver is called ___?
GLOBAL POSITIONING SYSTEM (GPS)
A crime that takes place when a person’s personally identifiable information is used without permission in order to commit other crimes is called a ___?
IDENTITY THEFT
The practice of tracking a user’s actions on the Internet in order to create an information outline of that user. It can be used to direct targeted advertising toward a particular user and is called ___?
ONLINE PROFILING
Documents filed in a court case are called ___?
PLEADINGS
Advertisements that open a new Web browser window to display the contents is called ___?
POP-UP ADVERTISEMENTS
A person’s right to have control of his or her own personal data. The person has the right to specify how that data is collected, used, and shared. This is called ___?
PRIVACY
People that work for the federal or state government are called ___?
PUBLIC EMPLOYEES
Information required by law to be made available to the public. This type of information is made or filed by a governmental entity and is called ___?
PUBLIC RECORDS
A wireless technology that uses radio waves to transmit data to a receiver is called ___?
RADIO FREQUENCY IDENTIFICATION (RFID)
A legal concept used to describe an ordinary person. This fictitious ordinary person is used to represent how an average person would think and act and is called a ___?
REASONABLE PERSON STANDARD
A program administered by a trusted organization that verifies that another organization meets recognized privacy practices is called a ___?
SEAL PROGRAM
A program that retrieves files and data from a computer network. These are used to examine the Internet for information. This is called a ___?
SEARCH ENGINE
Any compromise of a computer system that results in the loss of personally identifiable information is called ___?
SECURITY BREACH
Web site applications that allow users to post information about themselves is called ___?
SOCIAL NETWORKING SITES
A wrongful act or harm for which a civil action can be brought. This type of law governs disputes between individuals and is called ___?
TORT
A small, invisible electronic file that is placed on a Web page or in an email message and is called ___?
WEB BEACON
These issues are encountered in the workplace. Hiring and firing practices and daily performance practices all have potential privacy concerns and is called ___?
WORKPLACE PRIVACY
- What does a seal program verify?
- That an organization meets recognized privacy principles
- that an organization misfits recognized security principles
- That a third party is trusted
- that a Web site does not use cookies
That an organization meets recognized privacy principles
- What techniques are used to create a list of the Web pages that a computer user visits?
- Adware, malware, and phishing
- Malware, cookies, and Web beacons
- Web beacons, clickstreams, and spyware
- Malware, spyware, and cookies
- Clickstreams, cookies, and Web beacons
Clickstreams, cookies, and Web beacons
- Which amendment protects against unreasonable searches and seizures?
- First
- Third
- Fourth
- Fifth
- Seventh
Fourth
- Privacy refers to a person’s right to control personal data.
TRUE OR FALSE
TRUE
- What is the source of legal authority for the US government?
- The US Code
- The common law
- Supreme Court decisions
- The US Constitution
- The Declaration of Independence
The US Constitution
- Which of the following is NOT a privacy tort?
- Intrusion into seclusion
- Portrayal in a false light
- Appropriation of likeness or identity
- Defamation
- Public disclosure of private facts
Defamation
- The OECD privacy protection guidelines contain ___ privacy principles.
8
- Which principle means that an individual should be told the reason for data collection before the data is collected?
- The collection limitation principle
- The purpose specification principle
- The use limitation principle
- The openness principle
- The accountability principle
The purpose specification principle
- What are the two types of cookies?
- First-party and third party cookies
- Active and passive cookies
- First party and second party cookies
- Rational and irrational cookies
First-party and third party cookies
- What is a Web beacon?
- Text stored on a computer user’s hard drive
- A small, invisible electronic file
- A pop-up advertisement
- Executable code
- A data trail left by a computer user
A small, invisible electronic file
- Employer monitoring of employees in the workplace is generally allowed.
TRUE OR FALSE
TRUE
- To monitor telephone conversations, an employer must use equipment provided by a phone system service provider and have ___.
A legitimate business reason
- Why is biometric data unique?
- It can be used to identify a person
- It is data about a person’s physical traits
- It can used to commit identity theft
- It cannot be changed
- None of the above
It cannot be changed
- Which of the following is NOT a people-based privacy threat?
- Social engineering
- Web beacons
- Shoulder surfing
- Dumpster diving
- Social networks
Web beacons
- What is used to ensure privacy?
- Biometric data
- Encryption
- Information security
- Monitoring
- Online profiling
Information security