The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?
The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?A . The 1974 Privacy ActB . Common law principlesC . European Union DirectiveD . Traditional fair information practicesView AnswerAnswer: C Explanation: Reference: https://obamawhitehouse.archives.gov/sites/default/files/privacy-final.pdf
Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?
SCENARIO Please use the following to answer the next QUESTION: A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes...
Which of these organizations would be required to provide its customers with an annual privacy notice?
Which of these organizations would be required to provide its customers with an annual privacy notice?A . The Four Winds Tribal College.B . The Golden Gavel Auction House.C . The King County Savings and Loan.D . The Breezy City Housing Commission.View AnswerAnswer: B
What is the main purpose of the CAN-SPAM Act?
What is the main purpose of the CAN-SPAM Act?A . To diminish the use of electronic messages to send sexually explicit materialsB . To authorize the states to enforce federal privacy laws for electronic marketingC . To empower the FTC to create rules for messages containing sexually explicit contentD ....
What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?
SCENARIO Please use the following to answer the next QUESTION Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The...
In what area does Larry have a misconception about private-sector employee rights?
SCENARIO Please use the following to answer the next QUESTION: Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were...
Which of the following best describes what a “private right of action” is?
Which of the following best describes what a “private right of action” is?A . The right of individuals to keep their information private.B . The right of individuals to submit a request to access their information.C . The right of individuals harmed by data processing to have their information deleted.D...
What is the most important action an organization can take to comply with the FTC position on retroactive changes to a privacy policy?
What is the most important action an organization can take to comply with the FTC position on retroactive changes to a privacy policy?A . Describing the policy changes on its website.B . Obtaining affirmative consent from its customers.C . Publicizing the policy changes through social media.D . Reassuring customers of...
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?A . Determine which bodies will be involved in adjudicationB . Decide if any enforcement actions are justifiedC . Adhere to its industry’s code of conductD . Appeal decisions made against itView AnswerAnswer: A...
Which of the following answers most accurately reflects John’s ability to pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?
John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures...