True or false? Within the information life cycle, Retention is the...
True or false? Secret Keys are "a cryptographic key used with a...
_____ Unsolicited commercial e-mail.
_____ As defined in Article 9 of the General Data Protection...
_____ enacted as part of Electronic Communications Privacy Act in 1986...
_____ A written court order issued in an administrative, civil or...
_____ A screening to identify drug use.
_____ Most legislation recognizes that data breach notifications...
_____ The first enactment of laws limiting unsolicited and automated...
_____ is concerned with placing limitations on the ability of one to...
_____ The movement of personal data from one organization to another.
Which is the best description of the U.S. legal concept of...
_____ Taking appropriate measures to provide any information relating...
What is one reason consent decrees are posted publicly on the FTC...
_____ A U.S. federal agency that oversees "the welfare of the job...
Which of the following is considered an acceptable method for...
_____ Commercial conduct that intentionally causes substantial injury,...
Which statement is true regarding transfers of personal information to...
What is the primary basis of common law?
United States Department of Health, Education and Welfare Fair...
What should a U.S.-based organization do before it shares personal...
_____ A telecommunications industry term for non-core services; i.e.,...
What is the role of a U.S.-based software-as-a-service provider that...
_____ Recordings that do not have sound.
Which federal agency has specific statutory responsibility for issues...
_____ A technology that allows telephone calls to be made over a LAN...
Under the Children's Online Privacy Protection Act, which is an...
_____ Created by the American Institute of Certified Public...
In addition to the Security Rule, what other rule was promulgated by...
_____ If illegal or improper activity is taking place within an...
Which of the following examples best illustrates the concept of...
Which of the statements about the requirements for privacy under the...
What does the "red flags rule" require of financial...
The "Digital Telephony Bill" is another name for which...
Which condition must be met to satisfy the Right to Financial Privacy...
Which U.S. state requires daily electronic notice in order for an...
Under the USA PATRIOT Act and its amendments, which statement is...
Which investigative tactic requires a probable cause and other...
Based on Aerospaciale v. S.D. of Iowa, which is NOT a factor American...
What changes did the FISA Amendments Act of 2008 make to the original...
Which two actions are required under the Fair Credit Reporting Act in...
All of the following are considered acceptable reasons for sharing...
All of the following are considered acceptable lines of questioning by...
In terms of U.S. employees' workplace privacy rights, all of the...
All of the following are valid privacy protection procedures when...
Security laws in U.S. states often restrict:
For those states that have security breach notification requirements,...
The act of video monitoring the workplace is likely to survive a legal...
The loss of names and what other data point would require an employer...
If a company located in Massachusetts maintains all of its...
Rules that govern the collection and handling of personal information...
32. Which authority does not oversee privacy-related issues in the...
Which types of personal information may qualify as sensitive personal...
True or false? Restrictions on the processing of personal information...
35. True or false? Federal privacy laws will always supersede state...
What is an agreement or settlement that resolves a dispute between two...
37. True or false? The word privacy is not mentioned in the U.S....
39. True or false? An organization that does not process personal data...
What type of international data transfer mechanism was invalidated for...
From the list below, select the obligations that are directly...
True or false? Under the GDPR, both controllers and processors have...
Which of the following are data subject rights under the GDPR? Select...
True or false? Under the GDPR, the controller is obligated to notify...
Which of the following are required for an entity to be considered a...
How does the CCPA define a "consumer"? Select all that apply.
The CCPA allows consumers to request and receive records of what...
True or false? Under the CCPA, a business may be required to include a...
49. What theory of legal liability is described as the absence of or...
Which of the following are powers of the FTC? Select all that apply.
Which federal agency is the most visible proponent of privacy concerns...
During which decade did the FTC's perspective evolve into a harm-based...
What does GPEN stand for?
What types of risk should an organization consider when designing and...
What are the four steps involved in the development of a privacy...
Who may need privacy training? Select all that apply.
Which step in the process for developing an incident response program...
Which is not a reason for assigning classification levels to personal...
True or false? HIPAA preempts stricter state laws.
Who is responsible for enforcing HIPAA's Privacy and Security Rules?
True or false? Health insurance providers may, under some...
Which act is intended to expedite the research process for medical...
Which act introduced the first medical privacy provisions?
65. What are some major components of financial privacy? Select all...
What does CRA stand for?
Which is a provision of the Fair Credit Reporting Act (FCRA)? Select...
True or false? The Fair Credit Reporting Act (FCRA) amended the Fair...
True or false? The FACTA Disposal Rule requires any entity that uses a...
Which act regulates financial institutions and their management of...
Under the GLBA Privacy Rule, what must a privacy notice include?...
Which authority was created by the Dodd-Frank Wall Street Reform and...
What are the key components of the Family Educational Rights and...
74. Under FERPA, how often should students receive notice of their...
True or false? The No Child Left Behind Act (NCLBA) broadened the...
True or false? Technology companies that provide free teaching...
Which legislation provides rights to parents of minors regarding...
Which legislation provides rights to parents of minors regarding...
True or false? The Telephone Consumer Protection Act (TCPA) implements...
80. True or false? The Telemarketing Sales Rule (TSR) has been amended...
81. Under the U.S. National Do Not Call (DNC) Registry, how often must...
Which act requires giving a privacy notice to subscribers at the time...
Which act restricts accessing, using and disclosing customer...
84. What does MSCM stand for?
85. Which amendment to the United States Constitution articulates many...
What are the two parts of the "expectation of privacy test"? Select...
87. Under the Right to Financial Privacy Act (RFPA), which of the...
Under the Bank Secrecy Act (BSA), who has the authority to impose...
When a customer calls in to a company's service support line and hears...
What is a pen register?
Which act was passed as part of the ECPA to address interception of...
Which is a component of the Privacy Protection Act (PPA)? Select all...
Some Internet services fall within the scope of the Communications...
Which act was passed during the Cold War to enable national security...
What does NSL stand for?
The USA PATRIOT Act was passed in response to the Edward Snowden...
FISA was amended in 2008 because the flexible legal limits provided by...
Which is a provision of the Cybersecurity Information Sharing Act...
The Employee Polygraph Protection Act (EPPA) prohibits employers from...
Federal law mandates substance use testing for certain positions.
Which type of workplace surveillance is permitted within the course of...
True or false? Most U.S. states have laws limiting the use of Social...
In the event of a data breach, Connecticut's breach notification law...
Which states specify extensive requirements for data breach...
True or false? In the case of state requirements regarding data breach...
True or false? State laws regarding data breaches may require...
The _____ is a U.S. federal law that requires U.S. financial...
_____ policies are designed to facilitate the use of employees' own...
_____ are principles of law that have been established by...
_____ has come to be shorthand for any video surveillance system....
COPPA requires website operators & online services that are...
In the context of consent, choice refers to the idea that consent must...
_____ consists of unwritten legal principles that have developed over...
Which of the following fall into the generally recognized classes of...
_____ may be affirmative; i.e., opt-in; or implied; i.e., the...
A _____ typically occurs when the defendant agrees to stop alleged...
Created by the Dodd-Frank Act, _____ is intended to consolidate the...
_____ is any person or entity that complies or evaluates personal...
_____ The unauthorized acquisition of computerized data that...
_____ is the natural or legal person, public authority, agency or any...
_____ A natural or legal person (other than an employee of the...
_____ A fair information practices principle, it is the principle that...
_____ An identified or identifiable natural person.
_____ Created in 2016 to replace the invalidated U.S.-EU Safe Harbor...
_____ An expansion of the Fair Credit Reporting Act which focuses on...
_____ One of the oldest U.S. federal privacy laws still in force...
_____ The United States' primary consumer protection agency which...
_____ A U.S. federal law that ensures citizen access to federal...
_____ Organized following an OECD recommendation for cooperation among...
_____ Enacted as part of the American Recovery and Reinvestment Act of...
_____ A U.S. law passed to create national standards for electronic...
_____ this class of privacy that encompasses the claim of individuals,...
_____ Creates the Existing Business Relationship exception to the...
_____ An authentication process that requires more than one...
_____ A category of subpoena under The USA PATRIOT Act. Separate and...
_____ Is defined by GLBA as personally identifiable financial...
_____ First released in 1980, and then updated in 2013, these...
_____ Used to distinguish from sectorial laws (see Sectorial Laws), to...
_____ Websites or online advertising services that engage in the...
_____ One of two central concepts of choice. It means an individual...
_____ One of two central concepts of choice. It means an individual's...
_____ An international organization that promotes policies designed to...
_____ Contracting business processes, which may include the processing...
_____ A self-regulatory system that provides an enforceable security...
_____ Technologies and processes that are designed to secure an entire...
_____ defined broadly in the General Data Protection Regulation as any...
_____ It is a term with particular meaning under the California...
_____ A device used for the purpose of rendering a diagnostic opinion...
_____ A superior government's ability to have its law(s) supersede...
_____ of an organization's compliance with its privacy policies and...
_____ as a specific term was first outlined in a framework in the...
_____ A statement made to a data subject that describes how an...
_____ An internal statement that governs an organization or entity's...
_____ Under HIPAA, this rule establishes U.S. national standards to...
_____ Unless otherwise restricted by law, any individual that is...
_____ Any individually identifiable health information transmitted or...
_____ a vehicle allowing a judge to determine what information should...
_____ Information collected and maintained by a government entity and...
_____ A U.S. common law tort that states: "One who gives publicity to...
_____ Requires that the parties are prohibited from using or...
_____ Technologies that use radio waves to identify people or objects...
_____ Substance testing sometimes required by law, prohibited in...
_____ The action of reattaching identifying characteristics to...
_____ A determining factor in substance testing where testing is...
_____ An individual's right to have personal data about them corrected...
_____ The practice of identifying and removing or blocking information...
_____ Adopted either directly by the European Commission or by a...
_____ An important source of standards and best practices for managing...
_____ refers to stakeholder-based models for ensuring privacy.
_____ A case recognized as establishing the "knock-and-announce...
_____ An energy system that manages electricity consumption through...
_____ A United States law, passed in 2002, regulating the transparency...
_____ Programs that require participants to abide by codes of...
_____ A regulation created by the Federal Trade Commission (FTC) under...
_____ An individual's right to request and receive their personal data...
_____ is a broad-ranging act designed to counter terrorism that...
Which federal agency plays a role in enforcing privacy and security...
Which is not a requirement under HIPAA's Privacy Rule?
Which federal agency oversees "the welfare of the job seekers, wage...
The Civil Rights Act bars discrimination due to what? Select all that...
Job candidate background screenings are required for what types of...
Under the Fair Credit Reporting Act (FCRA), what is not an employer...