Correct Answer
verified
Multiple Choice
A) violators are subject to both criminal and civil penalties.
B) violators may be subject to civil, but not criminal, penalties.
C) only the unauthorized disclosure of email messages constitutes a violation.
D) only the unauthorized interception of email messages by the government or an ISP constitutes a violation.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) are commonly known as "cookies."
B) constitute about 90 percent of all email.
C) are estimated to be fraudulent either in content or packaging in approximately one-fourth of all cases.
D) although annoying, do lower the cost of connecting to the internet.
Correct Answer
verified
Multiple Choice
A) the notion that federal government remain a neutral party in deciding privacy law cases regarding the internet
B) the principle that internet service providers (ISPs) should not remain neutral in determining how information should flow on the internet
C) the notion that the First and Fourth Amendments should not be used in determining citizens' privacy rights regarding the internet
D) the principle that all information which flows on the internet must receive equal treatment
Correct Answer
verified
Multiple Choice
A) Under COPPA, the website must disclose how it will use the information it acquires from Sherry.
B) COPPA prohibits the internet operator from collecting such information under any circumstances.
C) COPPA does not apply to Sherry's situation since she is over the age limit for those protected by the statute.
D) Under COPPA, the website may only collect information about Sherry's name and email address.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An intended recipient of an email has the right to disclose it to third persons.
B) ISPs are prohibited from disclosing the content of electronic messages to anyone other than the addressee, even if the disclosure is necessary for the performance of the ISP's service.
C) An employer has the right to monitor workers' email if the monitoring occurs in the ordinary course of business.
D) An employer has the right to monitor workers' email if the employer provides the computer system.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Section 5 of the FTC Act
B) the federal COPPA
C) the federal ECPA
D) the FCC's privacy directive
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) To spy on people located in the United States who are communicating abroad, the government needs a warrant.
B) FISA was enacted in 1978, but its provisions were greatly strengthened in the aftermath of the 9/11 terrorist attacks.
C) Under the FISA, the government does not need to notify defendants if the evidence being used against them in court was gathered in FISA surveillance.
D) To spy on people located in the United States who are communicating abroad, the government must obtain permission from a secret Foreign Intelligence Surveillance Court.
Correct Answer
verified
Multiple Choice
A) CAN-SPAM
B) FIPS
C) ECPA
D) COPPA
Correct Answer
verified
Multiple Choice
A) Emily must have permission from her parents in order to furnish the information to the website.
B) Under the Children's Online Privacy Protection Act, the website cannot collect any of this information from Emily, even if her parents give her permission.
C) Under Section 5 of the FTC Act, the website is protected from disciplinary action if Emily provides the requested information.
D) The Electronic Communications Privacy Act will allow the website to collect Emily's information, but restricts the website from sharing the information with other firms.
Correct Answer
verified
Multiple Choice
A) 18
B) 16
C) 13
D) 10
Correct Answer
verified
Multiple Choice
A) businesses to destroy customer data and maintain reasonable security procedures to guard against theft.
B) senders of promotional emails to offer an opt-in system to recipients.
C) companies to obtain permission from customers before destroying data older than ten years old.
D) businesses to notify individuals who are affected by any incident that results in unauthorized access of data.
Correct Answer
verified
Showing 21 - 40 of 45
Related Exams