What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?
SCENARIO Please use the following to answer the next QUESTION: Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse. Before taking this career path, Declan was vaguely familiar with the Health...
Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?
SCENARIO Please use the following to answer the next QUESTION: Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully. “No,” the boy said. “I’m filling out a survey.” Matt looked over his son’s...
In 2014, Google was alleged to have violated the Family Educational Rights and Privacy Act (FERPA) through its Apps for Education suite of tools. For what specific practice did students sue the company?
In 2014, Google was alleged to have violated the Family Educational Rights and Privacy Act (FERPA) through its Apps for Education suite of tools. For what specific practice did students sue the company?A . Scanning emails sent to and received by studentsB . Making student education records publicly availableC ....
Under the GDPR, the complainant’s request regarding her personal information is known as what?
SCENARIO Please use the following to answer the next QUESTION: A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes...
Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?
SCENARIO Please use the following to answer the next QUESTION: A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes...
Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?
SCENARIO Please use the following to answer the next QUESTION: Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully. “No,” the boy said. “I’m filling out a survey.” Matt looked over his son’s...
In which situation is a company operating under the assumption of implied consent?
In which situation is a company operating under the assumption of implied consent? A. An employer contacts the professional references provided on an applicant’s resume B. An online retailer subscribes new customers to an e-mail list by default C. A landlord uses the information on a completed rental application to...
According to the FTC Report of 2012, what is the main goal of Privacy by Design?
According to the FTC Report of 2012, what is the main goal of Privacy by Design?A . Obtaining consumer consent when collecting sensitive data for certain purposesB . Establishing a system of self-regulatory codes for mobile-related servicesC . Incorporating privacy protections throughout the development processD . Implementing a system of...
Which authority supervises and enforces laws regarding advertising to children via the Internet?
Which authority supervises and enforces laws regarding advertising to children via the Internet?A . The Office for Civil RightsB . The Federal Trade CommissionC . The Federal Communications CommissionD . The Department of Homeland SecurityView AnswerAnswer: B Explanation: The Federal Trade Commission (FTC) is the primary federal agency that regulates...
What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?
A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data. What law did ACME violate by designing the service...