Cybersecurity Worksheet – Consumers have a right to exercise control

Question

Dot Image

Central Washington University Cybersecurity Worksheet

Question 1         

Consumers have a right to exercise control over what personal data companies collect from them and how they use it. This defines which right from the Consumer Privacy Bill of Rights?

Respect for Context

Access and Accuracy

Individual Control

Accountability

Question 2         

The Equal Employment Opportunity Commission, for the Americans with Disabilities Act, oversees which type of privacy?

Medical Privacy

Financial Privacy

Workplace Privacy

Telemarketing and Marketing Privacy

Question 3         

Each state has a law roughly similar to Section 5 of the FTC Act. These laws are commonly known as what?

CAN-SPAM Act

Deceptive Trade Practices

Unfair and Deceptive Acts and Practices (UDAP)

Transparency

Question 4         

In what type of Federal Trade Commission (FTC) enforcement does the respondent not admit fault, but promises to change its practices and avoids further litigation on the issue?

Magnuson-Moss Authority

Deceptive Trade Practices

Consent Decrees

Unfair Trade Practices

Question 5         

Which type of law does the following statement refer to: “Legal principles that have developed over time in judicial decisions, often drawing on social customs and expectations”?

Tort Law

Contract Law

Common Law

Case Law

Question 6         

Which agency has general authority to enforce against unfair and deceptive trade practices, notably including the power to bring deception enforcement actions where a company has broken a privacy promise?

DOT

FTC

FCC

HHS

Question 7         

Which branch of government duties include enforcing and administering the law?

Judicial Branch

Executive Branch

Congressional Branch

Legislative Branch

Question 8         

Which of the following best describes consent decree?

Both the federal Congress and the state legislatures have enacted a variety of privacy and security laws. These regulate many different matters, including certain applications of information (such as use of information for marketing or preemployment screening), certain industries (such as financial institutions or healthcare providers), certain data elements (such as Social Security numbers or driver’s license information) or specific harms (such as identity theft or children’s online privacy).

Civil wrongs are recognized by law as the grounds for lawsuits. These wrongs result in an injury or harm that constitutes the basis for a claim by the injured party. Primary goals of are to provide relief for damages incurred and deter others from committing the same wrongs.

A judgment entered by agreement of the parties whereby the defendant agrees to stop alleged illegal activity, typically without admitting guilt or wrongdoing. In the privacy enforcement sphere, for example, the FTC has entered into numerousagreements with companies as a result of alleged violations of privacy laws, such as the Children’s Online Privacy Protection Act (COPPA).

Some laws require regulatory agencies such as the Federal Trade Commission or the Federal Communications Commission to issue regulations and rules. These place specific compliance expectations on the marketplace.

Question 9         

Markets, Technology, Law, and Self-/Co-Regulation are examples of what?

Sources of Personal Information

Processing of Personal Information

Models of Data Protection

Sources of Privacy Protection

Question 10       

Financial data, Operational data, and Intellectual property are examples of what?

Information Assets of an Organization

Data Subject

Publicly Available Information

Public records

Question 11       

Which of the following best describes processing personal information?

Controls the use of personal information by determining the purposes for its use and the manner in which the information will be processed.

Typically occurs through the privacy policy of a company or other entity, or by an industry association.

Non-public information that not generally available or easily accessed due to law or custom. Examples include medical records, financial information and adoption records.

The collection, recording, organization, storage, updating or modification, retrieval, consultation and use of personal information.

Question 12       

Public Records, Publicly Available Information, and Non-Public Information are examples of what?

Models of Data Protection

Sources of Privacy Protection

Sources of Personal Information

Processing of Personal Information

Question 13       

Fair Information Practices (FIPs) are principles for handling, storing, and managing data with privacy, security, and fairness in an information society that is rapidly evolving. These principles can be conceived in four categories. Which FIP principle does the following statement belong? “Notice: Organizations should provide notice about their privacy policies and procedures, and should identify the purpose for which personal information is collected, used, retained, and disclosed.”

Controls on the Information

Rights of Individuals

Management

Information Lifecycle

Question 14       

The Organisation for Economic Co-operation and Development (OECD) Guidelines, updated in 2013, are perhaps the most widely recognized framework for FIPs and have been endorsed by the U.S. Federal Trade Commission (FTC) and many other government organizations. Which of the following best defines the Use Limitation Principle?

Personal data should not be disclosed, made available or otherwise used for purposes other than those specified.

The purposes for which personal data are collected should be specified not later than at the time of data collection.

Personal data should be relevant to the purposes for which they are to be used.

Personal data should be protected by reasonable security.

Question 15       

Which type of privacy is concerned with placing limits on the ability to intrude into another individual’s environment?

Communications privacy

Territorial privacy

Information privacy

Bodily privacy

Question 16       

In which type of tort law does the subject often use the defense that the speaker is exercising free speech rights under the First Amendment?

Liability Torts

Privacy Torts

Negligent Torts

Intentional Torts

Question 17       

Even in the absence of statutes protecting confidentiality, common law has long upheld which of the following in relation to privacy?

Doctor-Patient Confidentiality

Congressional Confidentialities

Journalists Naming Sources

Religious Confidentialities

Question 18       

Which of the following is the ability to specify whether personal information will be collected and/or how it will be used or disclosed?

Acceptance

Access

Notice

Choice

Question 19       

Smart-TVs, Drones, and Ransomware are examples of what?

New technologies that have varied state laws to follow.

New technologies that have varied self-regulating requirements.

New technologies that have cross-border enforcement issues.

New technologies that raise important consumer protection issues.

Question 20       

As the volume of cross-border data transfers increases, privacy enforcement increasingly involves companies and government agencies in more than one jurisdiction. Which of the following is not a key issues of cross-border enforcement?

Self-Regulation and Enforcement

Cross-Border Enforcement

Cooperation Between Enforcement Agencies

Conflicts Between Privacy and Disclosure Laws

Question 21       

FTC categorizes the Privacy Bill of Rights into three themes. Which theme is described here: “Privacy notices should be clearer, shorter and more standardized to enable better comprehension and comparison of privacy practices.”

Transparency

Privacy by Design

Simplified Consumer Choice

Brokering Data

Question 22       

Which of the following was emphasized in both the White House consumer bill of rights and the 2012 FTC report?

Transparency

Individual Control

Accountability

Security

Question 23       

Red Clay is licensed to do business as a general contractor for residential buildings in three states (DE, MD, PA). The company’s architects maintain professional licensure in their state of residence. The company’s general counsel is licensed to practice law in Delaware and Maryland. The Chief Financial Officer is a Certified Public Accountant (CPA) and licensed to practice in all three states. In terms of privacy law, which of the best defines jurisdiction?

Specific authority is targeted at singular activities that are outlined by legislation.

A superior government’s ability to have its laws supersede those of an inferior government.

The authority of a court to hear a particular case.

A superior government’s ability to have its laws supersede those of an inferior government.

Question 24       

Red Clay respects their customer’s right to privacy. Their websites and other public-facing content inform individuals about what information is collected, how the information is used and disclosed, how to exercise any choices about uses or disclosures, and whether the individual can access or update the information. This action supports two purposes of US Privacy Laws: (1) consumer education and (2) corporate accountability. What are these external communications referred to?

Choice

Jurisdiction

Access

Notices

Question 25       

Red Clay chooses to promote consumer privacy throughout its organizations and at every stage in the development of its products and services. Red Clay also chooses to incorporate substantive privacy protections into their practices, such as data security, reasonable collection limits, sound retention and disposal practices, and data accuracy. These actions describe which of the FTC privacy enforcement areas?

Transparency

Privacy by design

Do Not Track

Simplified consumer choice

Question 26       

The Consumer Privacy Bill of Rights is based on traditional fair information practices. The bill of rights states that these rights should apply to commercial uses of personal data. As such, Red Clay must collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. Which right is this?

Transparency

Focused collection

Individual control

Respect for context

Question 27       

When examining data protection and privacy laws and practices, it can be helpful to focus on four categories or classes of privacy. Which two of the four categories of privacy apply to Red Clay?

Territorial privacy and Bodily Privacy

Information privacy and Communications privacy

Information privacy and Bodily Privacy

Communications privacy and Bodily Privacy

Question 28       

Red Clay strives to ensure they comply with all privacy laws, regulations, standards, guidelines, etc. Fair Information Practices (FIPs) are guidelines for handling, storing, and managing data with privacy, security, and fairness in an information society that is rapidly evolving. Notice, Choice and Consent, and Data Subject Access are associated with which of the following FIPs principle?

Controls on the Information

Rights of Individuals

Management

Information Lifecycle

Having Trouble Meeting Your Deadline?

Get your assignment on Cybersecurity Worksheet – Consumers have a right to exercise control completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts