CIPP/US Certification Exam Prep Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Themes
T
Themes
Community Contributor
Quizzes Created: 424 | Total Attempts: 1,037,092
| Attempts: 165 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. True or false? Within the information life cycle, Retention is the concept that organizations should retain personal information only as long as necessary to fulfill the stated purpose.

Explanation

Retention is indeed the concept within the information life cycle that organizations should retain personal information only as long as necessary to fulfill the stated purpose. This means that organizations should not keep personal information longer than needed and should have proper procedures in place to securely dispose of it once it is no longer necessary. This helps to protect individuals' privacy and comply with data protection regulations.

Submit
Please wait...
About This Quiz
CIPP/US Certification Exam Prep Test - Quiz

Prepare for the CIPP\/US Certification Exam with this focused prep test. Assess your understanding of U. S. Privacy laws, data protection, and legal compliance with key concepts like preemption, consent decrees, and international data transfers.

Personalize your quiz and earn a certificate with your name on it!
2. True or false? Secret Keys are "a cryptographic key used with a secret key cryptographic algorithm, uniquely associated with one or more entities and which shall not be made public. The use of the term "secret" in this context does not imply a classification level, rather the term implies the need to protect the key from disclosure or substitution." (Federal Information Processing Standards Publication 140-1, Security Requirements for Cryptographic Modules)

Explanation

Secret keys are cryptographic keys that are used with a secret key cryptographic algorithm. These keys are uniquely associated with one or more entities and should not be made public. The term "secret" in this context does not imply a classification level, but rather refers to the need to protect the key from disclosure or substitution. This definition aligns with the description given in Federal Information Processing Standards Publication 140-1, which is why the correct answer is True.

Submit
3. _____ Unsolicited commercial e-mail.

Explanation

Associated law(s): CASL; CAN-SPAM Act

Submit
4. _____ As defined in Article 9 of the General Data Protection Regulation, personal information that reveals, for example, racial origin, political opinions or religious or other beliefs, as well as personal data that concerns health or sexual life or criminal convictions and cannot be processed except under specific circumstances.

Explanation

The correct answer is "Special Categories of Data." This term refers to personal information that is considered sensitive and requires special protection under the General Data Protection Regulation (GDPR). This includes data related to racial origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data, health data, and data concerning a person's sex life or sexual orientation. These categories of data are subject to stricter regulations and can only be processed under specific circumstances outlined in the GDPR.

Submit
5. _____ enacted as part of Electronic Communications Privacy Act in 1986 in the United States. It generally prohibits the unauthorized acquisition, alteration or blocking of electronic communications while in electronic storage in a facility through which an electronic communications service is provided.

Explanation

The Stored Communications Act was enacted as part of the Electronic Communications Privacy Act in 1986 in the United States. This act specifically addresses the unauthorized acquisition, alteration, or blocking of electronic communications that are stored in a facility providing electronic communications services. It serves to protect the privacy and security of electronic communications by prohibiting unauthorized access to such communications while they are in electronic storage.

Submit
6. _____ A written court order issued in an administrative, civil or criminal action that requires the person named to appear in court in order to testify under oath on a particular matter which is the subject of an investigation, proceeding or lawsuit. It may also require the production of a paper, document or other object relevant to an investigation, proceeding or lawsuit that discloses personal information.

Explanation

A subpoena is a written court order that requires a person to appear in court and testify under oath on a specific matter. It can be issued in administrative, civil, or criminal actions and is used in investigations, proceedings, or lawsuits. In addition to requiring testimony, a subpoena may also demand the production of relevant documents or objects that disclose personal information.

Submit
7. _____ A screening to identify drug use.

Explanation

Substance testing can be used in a variety of settings such as pre-employment, reasonable suspicion, routine testing, post-accident testing or randomly.

Associated terms(s): Americans with Disabilities Act, Random Testing, Reasonable Suspicion

Submit
8. _____ Most legislation recognizes that data breach notifications involving thousands of impacted data subjects could place an undue financial burden on the organization and therefore allow alternate methods of notice.

Explanation

In Connecticut, for example, “Substitute notice shall consist of the following: (A) Electronic mail notice when the person, business or agency has an electronic mail address for the affected persons; (B) conspicuous posting of the notice on the website of the person, business or agency if the person maintains one, and (C) notification to major state-wide media, including newspapers, radio and television.”

Associated term(s): Data Breach

Submit
9. _____ The first enactment of laws limiting unsolicited and automated telemarketing for both telephone and fax communications. Most notably the act creates a private right of action for those receiving unsolicited faxes, carrying a $500 fine per violation and any damages sustained because of the fax.

Explanation

The Telephone Consumer Protection Act also gives rule-making authority to the Federal Communications Commission, allowing it to make further regulations in this area. Among other provisions, the act prevents faxing without consent from the recipient (this requirement was amended by the Junk Fax Prevention Act of 2005 to not include customers with an existing business relationship) and requires companies to create and honor internal do-not-call registries (in 2003 the National Registry was created by the Federal Trade Commission).

Link to text of law: Telephone Consumer Protection Act

Acronym: TCPA

Associated term(s): Junk Fax Prevention Act of 2005, Federal Communications Commission, Federal Trade Commission

Submit
10. _____ is concerned with placing limitations on the ability of one to intrude into another individual's environment. Environment is not limited to the home; it may be defined as the workplace or public space and environmental considerations can be extended to an international level.

Explanation

Invasion into an individual’s territorial privacy typically comes in the form of video surveillance, ID checks and use of similar technology and procedures.

Associated term(s): Home Privacy

Submit
11. _____ The movement of personal data from one organization to another.

Explanation

The term "transfer" refers to the movement of personal data from one organization to another. This can occur when an individual's data is shared or passed on from one company or entity to another, either for processing purposes or for other reasons. The transfer of personal data is an important aspect of data protection and privacy, as it involves the handling and transmission of sensitive information.

Submit
12. Which is the best description of the U.S. legal concept of "preemption"?

Explanation

The correct answer is B: [States are prevented by federal law from enforcing laws that impose different or stricter laws in the same area.]

Article VI, Section 2, of the U.S. Constitution provides that the "…Constitution, and the Laws of the United States … shall be the supreme Law of the Land." This Supremacy Clause has come to mean that the national government, in exercising any of the powers enumerated in the Constitution, must prevail over any conflicting or inconsistent state exercise of power. The federal preemption doctrine is a judicial response to the conflict between federal and state legislation. When it is clearly established that a federal law preempts a state law, the state law must be declared invalid. Also, a doctrine of state law that holds that a state law displaces a local law or regulation that is in the same field and is in conflict or inconsistent with the state law. West's Encyclopedia of American Law, edition 2. Copyright 2008 The Gale Group, Inc.

Submit
13. _____ Taking appropriate measures to provide any information relating to processing to the data subject in a concise, intelligible and easily accessible form, using clear and plain language.

Explanation

Transparency refers to the act of providing information to the data subject in a clear and easily understandable manner. It involves taking appropriate measures to ensure that the data subject is aware of how their personal data is being processed. This includes providing concise and easily accessible information, using plain language that can be easily understood by the data subject. Transparency is an important principle in data protection as it allows individuals to make informed decisions about their personal data and ensures that they have control over how their information is used.

Submit
14. What is one reason consent decrees are posted publicly on the FTC website?

Explanation

The correct answer is D: [To provide guidance about what practices the FTC finds inappropriate.]

FTC privacy enforcement actions have been settled through consent decrees and accompanying consent orders. Consent decrees are posted publicly on the FTC website, and the details of these decrees provide guidance about what practices the FTC finds inappropriate.

Submit
15. _____ A U.S. federal agency that oversees "the welfare of the job seekers, wage earners and retirees of the United States by improving their working conditions, advancing their opportunities for profitable employment, protecting their retirement and healthcare benefits, helping employers find workers, strengthening free collective bargaining and tracking changes in employment, prices and other national economic measurements." To achieve this mission, the department administers a variety of federal laws including, but not limited to, the Fair Labor Standards Act (FLSA), the Occupational Safety and Health Act (OSHA) and the Employee Retirement Income Security Act (ERISA).

Explanation

Link to: U.S. Department of Labor

Link to text of act: Fair Labor Standards Act

Link to text of act: Occupational Safety and Health Act

Link to text of act: Employee Retirement Income Security Act

Acronym(s): DOL

Associated law(s): FLSA; ERISA, OSHA

Submit
16. Which of the following is considered an acceptable method for U.S.-based multinational transportation companies to achieve compliance with the EU General Data Protection Regulation?

Explanation

The correct answer is C: [Binding corporate rules.]

Binding corporate rules (BCRs) are data protection policies adhered to by companies established in the EU. They are one method through which organizations can transfer data to non-EU member states under the GDPR. Supervisory authorities participate in the review and approval process of BCRs.

Submit
17. _____ Commercial conduct that intentionally causes substantial injury, without offsetting benefits, and that consumers cannot reasonably avoid.

Explanation

Associated term(s): Deceptive Trade Practices

Associated law(s): U.S. Federal Trade Commission Act

Submit
18. Which statement is true regarding transfers of personal information to locations outside of the U.S.?

Explanation

The correct answer is A: [U.S. laws generally do not restrict geographic transfer of personal information.]

This stands in contrast to the restrictions imposed by Chapter V of the EU General Data Protection Regulation (GDPR), which states, in part, “ Any transfer of personal data which are undergoing processing or are intended for processing after transfer to a third country or to an international organisation shall take place only if, subject to the other provisions of this Regulation, the conditions laid down in this Chapter are complied with by the controller and processor, including for onward transfers of personal data from the third country or an international organisation to another third country or to another international organization...” GDPR Chapter V then outlines specific data transfer mechanisms, including “an adequacy decision,” “appropriate safeguards,” “binding corporate rules,” and “derogations.”

Submit
19. What is the primary basis of common law?

Explanation

The correct answer is B: [Legal precedent and social custom.]

In the absence of statutes, common law has long drawn on precedent to provide special privilege rules such as attorney-client privilege and doctor-patient confidentiality.

Submit
20. United States Department of Health, Education and Welfare Fair Information Practice Principles (1973),  A code of fair information practices that contains:

Explanation

Link to text of: United States Department of Health, Education and Welfare Fair Information Practice Principles (1973)

Associated term(s): HEW Principles; HEW Report, The

Submit
21. What should a U.S.-based organization do before it shares personal information with a U.S.- based third party?

Explanation

The correct answer is C: [Assure appropriate privacy terms and conditions are included in a contract with the third party.]

This question involves data transfers within the U.S., so no special restrictions apply other than those imposed on certain sectors, such as healthcare or financial. As a matter of best practices, however, an organization should apply due diligence to ensure that a third party treats personal information with at least the same protections as the originating organization. A contract with appropriate privacy terms and conditions is a good way to assure such is the case.

Submit
22. _____ A telecommunications industry term for non-core services; i.e., services beyond voice calls and fax transmissions. More broadly, the term is used in the service sector to refer to services, which are available at little or no cost, and promote their primary business.

Explanation

For mobile phones, while technologies like SMS, MMS and GPRS are usually considered value-added services, a distinction may also be made between standard (peer-to-peer) content and premium-charged content. These are called mobile value-added services (MVAS), which are often simply referred to as VAS. Value-added services are supplied either in-house by the mobile network operator themselves or by a third-party value-added service provider (VASP), also known as a content provider (CP) such as Headline News or Reuters. VASPs typically connect to the operator using protocols like short message peer-to-peer protocol (SMPP), connecting either directly to the short message service centre (SMSC) or, increasingly, to a messaging gateway that gives the operator better control of the content.

Associated term(s): MVAS, VASP

Submit
23. What is the role of a U.S.-based software-as-a-service provider that stores employee personal data for a global company headquartered in the U.S. with subsidiaries in the EU?

Explanation

The correct answer is C: [Data processor.]

The terms “data subject,” “data processor” and “data controller” originated in the EU Data Protection Directive and are not universally used in the U.S. A data subject is an individual about whom information is being processed. A data controller is an organization or individual with the authority to decide how and why information about data subjects is to be processed. A data processor is an organization or individual that processes data on behalf of the data controller. In the question then, the U.S. SaaS provider is processing data of behalf of the data controller, it is a data processor.

Submit
24. _____ Recordings that do not have sound.

Explanation

Video surveillance recordings are recordings that do not have sound. Video surveillance systems are commonly used for monitoring and recording activities in various settings such as homes, offices, and public spaces. These recordings typically capture visual information without any accompanying audio. They are primarily focused on capturing and documenting visual evidence rather than sound.

Submit
25. Which federal agency has specific statutory responsibility for issues such as children's privacy online and commercial email marketing?

Explanation

The correct answer is D: [Federal Trade Commission.]

In addition to its general authority to enforce “unfair and deceptive trade practices,” the Federal Trade Commission (FTC) has been legislatively charged with enforcing specific privacy-related laws. COPPA required the FTC to issue and enforce a rule concerning children’s online privacy, which the Commission did in 1999. The Children’s Online Privacy Protection Rule, 16 C.F.R. Part 312, became effective on April 21, 2000. CAN-SPAM authorized the FTC to enforce the CAN-SPAM Act, and the Commission subsequently issued the “Telemarketing Sales Rule” (TSR). Between these actions and many others, including
consent decrees, the FTC has indeed played a prominent role in the development of U.S. privacy standards. See also web-based information sources, such as http://www.ftc.gov/privacy/coppafaqs.shtm

Submit
26. _____ A technology that allows telephone calls to be made over a LAN or the Internet itself. Skype is a well-known example.

Explanation

VoIP poses the same risk as network-connected PBX systems but also poses the additional risk of data interception when such data travel over an unsecured connection. VoIP functionality should be encrypted where possible and equipment monitored with intrusion-detection systems.

Submit
27. Under the Children's Online Privacy Protection Act, which is an accepted means for an organization to validate parental consent when it intends to disclose a child's information to a third party?

Explanation

The correct answer is B: [E-mail a consent form and the parent can provide consent by signing and mailing back the form.]

According to the FTC website, if a website operator is going to disclose children’s personal information to third parties…then it must use one of the more reliable methods to obtain verifiable parental consent enumerated in the rule:

• provide a form for the parent to print, fill out, sign, and mail or fax back to you (the “print-and-send” method);

• require the parent to use a credit card in connection with a transaction (which could consist of a membership or subscription fee, a purchase, or a charge to cover the cost of processing the credit card).

• maintain a toll-free telephone number staffed by trained personnel for parents to call in their consent; or

• obtain consent through an email from the parent, if that email contains a digital signature, or other digital certificate that uses public key technology obtained through one of the above methods. http://www.ftc.gov/privacy/coppafaqs.shtm#consent

Submit
28. _____ Created by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). It is a self-regulating seal program which licenses qualifying certified public accountants.

Explanation

Associated term(s): Seal Programs

Submit
29. In addition to the Security Rule, what other rule was promulgated by Health and Human Services and and mandated by the Health Insurance Portability and Accountability Act?

Explanation

The correct answer is C: [The Privacy Rule.]

HIPAA required the Department of Health and Human Services (HHS) to promulgate regulations to protect the privacy and security of healthcare information, and HHS issued the Privacy Rule in December 2000 (revised in 2002) and the Security Rule in February 2003. HHS also promulgated the Transactions Rule, but this related not to privacy or data security but to standard electronic formats to fulfill another important reason for the legislation—to improve the efficiency of healthcare delivery. There is no “operations rule” under HIPAA.

Submit
30. _____ If illegal or improper activity is taking place within an organization, employees may first observe it and report it to individuals with more authority or an agency outside of the organization.

Explanation

In setting up procedures to make it possible for an employee to report such activity, per laws in a variety of jurisdictions that protect the rights of these so-called whistleblowers, an organization will want to be sure that appropriate privacy safeguards are put in place.

Associated term(s): Whistleblower

Associated law(s): Sarbanes-Oxley Act

Submit
31. Which of the following examples best illustrates the concept of "consumer report" for preemployment screening as defined under the U.S. Fair Credit Reporting Act?

Explanation

The correct answer is B: [Driving history obtained from an information aggregator.]

Under the Fair Credit Reporting Act (FCRA), users must have a permissible purpose in order to obtain an individual’s credit report. Among these permissible purposes is the determination of a consumer’s eligibility for a license. Library records, purchase transactions and academic records do not represent a permissible purpose.

Submit
32. Which of the statements about the requirements for privacy under the U.S. Gramm-Leach-Bliley Act (GLBA) is true?

Explanation

The correct answer is A: [Financial institutions can share customer information with non-affiliated third-party companies without obtaining an opt-in from the customer.]

GLBA does not preempt stricter state laws. The Department of Commerce has no role in enforcing GLBA privacy rules. While financial institutions are prohibited from disclosing consumer account numbers to non-affiliated companies even if the consumer has not opted out of sharing information, other information can be shared without obtaining an opt in, such as information shared the outside companies that provide essential services like data processing.

Submit
33. What does the "red flags rule" require of financial institutions?

Explanation

The correct answer is A: [That they develop and implement methods of detecting identity theft.]

Section 114 of the Fair and Accurate Credit Transactions Act of 2003 (FACTA) requires regulators to develop a set of rules to mandate the detection, prevention and mitigation of identity theft.
http://www.ftc.gov/os/fedreg/2007/november/071109redflags.pdf

Submit
34. The "Digital Telephony Bill" is another name for which legislation?

Explanation

The correct answer is D: [The U.S. Communications Assistance to Law Enforcement Act.]

CALEA is also known as the Digital Telephony Bill.

Submit
35. Which condition must be met to satisfy the Right to Financial Privacy Act requirements for disclosure of individual records by financial institutions?

Explanation

The correct answer is D: [The financial records are reasonably described.]

The Right to Financial Privacy Act of 1978 (RFPA) states that “no Government authority may have access to or obtain copies of, or the information contained in the financial records of any customer from a financial institution unless the financial records are
reasonably described” and meet at least one additional conditions. Options B-D are three of these five conditions and are not absolutely required.

Submit
36. Which U.S. state requires daily electronic notice in order for an employer to monitor or intercept electronic mail?

Explanation

The correct answer is C: [Delaware.]

Delaware Code, Section 705: Notice of monitoring of telephone transmissions, electronic mail and internet usage states: “No employer, nor any agent or any representative of any employer, shall monitor or otherwise intercept any telephone conversation or transmission, electronic mail or transmission, or Internet access or usage of or by a Delaware employee unless the employer…(p)rovides an electronic notice of such monitoring or intercepting policies or activities to the employee at least once during each day the employee accesses the employer-provided e-mail or Internet access services.”
http://codes.lp.findlaw.com/decode/19/7/I/705

Submit
37. Under the USA PATRIOT Act and its amendments, which statement is correct concerning National Security Letters (NSL)?

Explanation

The correct answer is D: [An organization receiving an NSL may disclose the request to an attorney for legal assistance.]

NSL recipients may disclose the request to those necessary to comply with the request and to an attorney for legal assistance. NSLs can be issued by authorized officials, often the special agent in charge of an FBI field office, and requires no judicial authorization. The number of NSLs issued has increased in recent years. Under the 2006 amendments to the USA Patriot Act, recipients can petition a federal court to modify or set aside an NSL if compliance would be unreasonable or oppressive.

Submit
38. Which investigative tactic requires a probable cause and other requirements, such as exhausting alternative means of acquiring the evidence?

Explanation

The answer is A: [A telephone wiretap.]

A telephone wiretap requires a probable cause and other requirements, such as the exhaustion of alternative means of acquiring the evidence. The Supreme Court has held that police need warrants to use telephone wiretaps, but that police do not need warrants to obtain information from a third party, such as from the telephone company. There may be changes in the near future to the third party exception because of increased technologies.

Submit
39. Based on Aerospaciale v. S.D. of Iowa, which is NOT a factor American courts will use to reconcile a conflict between U.S. and foreign law regarding electronic discovery requests?

Explanation

The correct answer is C: [Whether counsel for both parties are based in the United States.]

The factors an American court will use to reconcile trans-border eDiscovery conflicts are (1) the importance of the documents or data to the litigation at hand, (2) The specificity of the request, (3) whether the information originated in the United States, (4) the availability of alternative means of securing the information and (5) the extent to which the important interests of the United States and the foreign state would be undermined by an adverse ruling. The location of opposing counsel is irrelevant.

Submit
40. What changes did the FISA Amendments Act of 2008 make to the original Foreign Intelligence Surveillance Act of 1978?

Explanation

The correct answer is B: [Legal authorization of some new surveillance practices.]

FISA gave legal authorization to new surveillance practices, including when one party is reasonably believed to be outside of the United States. It also granted immunity to the telephone companies so they would not be liable for the records they had provided to the government in the wake of September 11. The new rules required more reporting from the government to Congress and put limits on some of the secrecy about NSLs and other government requests for records in the national security realm. FISA itself expressly authorized foreign intelligence wiretaps and put checks and balances on the Administration. Neither FISA nor its amendments authorized access to stored communications without judicial authorization.

Submit
41. Which two actions are required under the Fair Credit Reporting Act in order for an employer to obtain a consumer report on a job applicant?

Explanation

The correct answer is D: [Obtain applicant’s written consent and provide applicant with a copy of the credit report before taking an adverse action.]

To obtain any consumer report under FCRA, an employer must meet the following standards: (1) provide written notice to the applicant that it is obtaining a consumer report for employment purposes and indicate if an investigative consumer report will be obtained; (2) obtain written consent from the applicant; (3) obtain data only from a qualified consumer reporting agency that has taken steps to assure the accuracy and currency of the data; (4) certify to the consumer reporting agency that the employer has a permissible purpose and has obtained consent from the employee; (5) before taking an adverse action, provide a pre-adverse action notice to the applicant with a copy of the consumer report in order to give the applicant an opportunity to dispute the report and (6) after taking adverse action, provide an adverse action notice.

Submit
42. All of the following are considered acceptable reasons for sharing records of U.S. employees with third parties without obtaining the consent of the employees except:

Explanation

The correct answer is A: [Test marketing the company’s new products.]

Determining legal standing or citizen status, retirement planning and group insurance underwriting all constitute legitimate organizational activities in the course of doing business or managing employees. Sharing employee records with a third party for the purpose of test marketing the company’s products, however, would be an inappropriate disclosure of the employee’s personal information.

Submit
43. All of the following are considered acceptable lines of questioning by U.S. employers to applicants in the pre-employment process except:

Explanation

The correct answer is C: [Questions on whether an applicant has applied for or received worker’s compensation.]

A number of U.S. federal laws prohibit discrimination in employment and place limits on the information an employer is entitled to ascertain in the screening process. Generally speaking questions that specifically relate to a candidate’s ability to perform the job for which he or she has applied are allowable, such as medical conditions, disabilities and physical characteristics and anticipated absences. Questions about past worker’s compensation applications, however, are specifically prohibited by the Americans with Disabilities Act (ADA).

Submit
44. In terms of U.S. employees' workplace privacy rights, all of the following are acceptable monitoring techniques available to employers except:

Explanation

The correct answer is C: [Secret surveillance.]

In the United States, private-sector employees in general have limited expectations of privacy at the workplace, and there are sometimes significant incentives to monitor employees. Except as limited by state statute or a collective bargaining agreement, video monitoring is allowable unless placed in a “private place,” such as a restroom or locker rooms. Employers also have a right to monitor internet usage if such a policy is publicized and applied to all employees. Furthermore, employers certainly have the right, and often the obligation, to limit access to company property through the use of badges, readers and other techniques. The key to avoiding a privacy issue, beyond adherence to specific laws and regulations, is to ensure that all policies regarding monitoring are made known to employees—secret surveillance is not acceptable in most settings.

Submit
45. All of the following are valid privacy protection procedures when terminating an employee who has access to sensitive personal information except:

Explanation

The correct answer is D: [Asking employees to sign the privacy policy immediately before conducting the exit interview.]

Employers have the right to terminate a former employee’s access to the physical and informational assets of the organization. In the case of a terminated employee, it is reasonable to require the individual, under observation, to remove only personal effects and to remove the individual’s access right to personal information held by the organization. When an employee signed a non-disclosure agreement at the time of employment, it is also appropriate to remind a terminated employee of that agreement.
The time to ask employees to sign a privacy policy, however, is not upon termination but upon employment or at the time an employee first has access to personal information stored by the organization.

Submit
46. Security laws in U.S. states often restrict:

Explanation

The correct answer is C: [The display of Social Security numbers on identification cards.]

While the disclosure of biometric data may be restricted by law, this is a privacy issue, not a security one. Similarly, the FTC Telemarketing Sales Rule (TSR) restricts the hours that organizations may make telemarketing calls, but that is not a security issue. The collection of Social Security numbers in hiring is permissible as long as there is a legitimate purpose and the data is secured. On the other hand, Social Security numbers are widely considered to be personal information and should not therefore be displayed publicly, such as on an identification card. The practice is specifically prohibited by privacy laws in many states.

Submit
47. For those states that have security breach notification requirements, what general information must the breach-of-personally-identifiable-information notification letter to the individual include?

Explanation

The correct answer is D: [A brief description of the incident, the type of information involved, and a toll-free number for answers to questions.]

Most states do not specify what must be included in the notification letter. Privacy professionals residing in states that do not provide guidance should use the guidelines of states that do.

Submit
48. The act of video monitoring the workplace is likely to survive a legal challenge under U.S. law provided that:

Explanation

The correct answer is B: [Monitoring is limited to “non-private” areas of the workplace.]

Many states have specific laws prohibiting workplace video monitoring of private places such as restrooms and locker rooms. Even in the absence of a statute, employees may be able to bring a common-law tort claim for invasion of privacy, especially where a jury would find the use of the camera to be offensive. Monitoring of private areas in the workplace would be unlikely to survive a legal challenge.

Submit
49. The loss of names and what other data point would require an employer to notify affected individuals?

Explanation

The correct answer is C: [Social Security numbers.]

The definition of what constitutes personal information varies state by state. However, there are some factors that are included in the definition of personal information in all states. These include the loss of a name combined with another form of personal
information. Generally, student records and intellectual property are not considered personal information.

Submit
50. If a company located in Massachusetts maintains all of its employees' personal information in a hosted online database in Florida, what must the third-party service provider agree to?

Explanation

The answer is A: [A confidentiality provision.]

If a company plans to share personal data with a third-party processor, it is important to consider incorporating a written contract including a confidentiality provision, no further use of shared information, requirement to notify and disclose a breach, and information security provisions.

Submit
51. Rules that govern the collection and handling of personal information regarding Internet activity can be categorized as what type of privacy?

Explanation

The correct answer is information privacy because the question is asking about the rules that govern the collection and handling of personal information regarding internet activity. Information privacy refers to the protection and control of personal data, ensuring that individuals have the right to determine how their information is collected, used, and shared.

Submit
52. 32. Which authority does not oversee privacy-related issues in the U.S.?

Explanation

The national data protection authority does not oversee privacy-related issues in the U.S. The Federal Trade Commission (FTC) is responsible for protecting consumers and enforcing privacy laws. State attorneys general also play a role in addressing privacy concerns. Federal financial regulators focus on overseeing financial institutions and ensuring compliance with financial regulations, but they may not have direct authority over privacy matters. Therefore, the national data protection authority is not involved in privacy-related issues in the U.S.

Submit
53. Which types of personal information may qualify as sensitive personal information? Select all that apply.

Explanation

Sensitive personal information refers to personal data that, if disclosed or compromised, could result in harm or discrimination to an individual. In this case, the correct answer includes Social Security number, Bank account number, Driver's license number, and Medical history. These types of information are considered sensitive as they can be used for identity theft, financial fraud, or unauthorized access to personal records.

Submit
54. True or false? Restrictions on the processing of personal information may differ, depending on the source of the information.

Explanation

Restrictions on the processing of personal information may differ depending on the source of the information. This means that different rules and regulations may apply to personal information obtained from different sources. For example, there may be stricter restrictions on processing personal information obtained from sensitive sources such as medical records or financial institutions, compared to information obtained from public sources or freely available sources. Therefore, it is true that restrictions on the processing of personal information may vary depending on the source.

Submit
55. 35. True or false? Federal privacy laws will always supersede state laws.

Explanation

Federal privacy laws do not always supersede state laws. In some cases, state laws may provide stronger privacy protections than federal laws, and in such instances, the state laws would take precedence. This is because states have the authority to enact their own privacy laws as long as they do not conflict with federal laws. Therefore, it is incorrect to say that federal privacy laws will always supersede state laws.

Submit
56. What is an agreement or settlement that resolves a dispute between two parties without admission of guilt or liability?

Explanation

A consent decree is an agreement or settlement that resolves a dispute between two parties without admission of guilt or liability. It is a legally binding resolution that allows both parties to avoid admitting fault while still resolving the issue at hand. This type of agreement is often used in legal cases to save time and resources, as it allows parties to come to a mutual understanding without going through a lengthy trial process.

Submit
57. 37. True or false? The word privacy is not mentioned in the U.S. Constitution.

Explanation

The word privacy is not explicitly mentioned in the U.S. Constitution. While the Constitution does protect certain individual rights such as freedom of speech and the right to be secure in one's person and property, the concept of privacy is not specifically addressed. However, the Supreme Court has interpreted certain provisions of the Constitution, such as the Fourth Amendment's protection against unreasonable searches and seizures, to encompass a right to privacy.

Submit
58. 39. True or false? An organization that does not process personal data that forms part of a filing system, nor processes personal data by automated means, but does process personal data in a place where member state law applies is subject to the GDPR.

Explanation

An organization that does not process personal data that forms part of a filing system, nor processes personal data by automated means, and also does not process personal data in a place where member state law applies is not subject to the GDPR. The GDPR only applies to organizations that process personal data in a place where member state law applies or when they process personal data that forms part of a filing system or by automated means.

Submit
59. What type of international data transfer mechanism was invalidated for EU-U.S. data transfers?

Explanation

The adequacy decision was invalidated for EU-U.S. data transfers. An adequacy decision is a mechanism that allows the transfer of personal data from the European Union to a third country if that country provides an adequate level of data protection. However, in this case, the adequacy decision for EU-U.S. data transfers was invalidated, meaning that the U.S. did not provide an adequate level of data protection according to the European Union's standards.

Submit
60. From the list below, select the obligations that are directly applicable to both the controller and processor. Select all that apply.

Explanation

The obligations that are directly applicable to both the controller and processor are data breach reporting, records keeping, data protection officer, and security. Data breach reporting is necessary for both the controller and processor to ensure that any breaches are promptly reported to the relevant authorities. Records keeping is important for both parties to maintain accurate documentation of their data processing activities. The appointment of a data protection officer is required for both the controller and processor to ensure compliance with data protection regulations. Security measures are essential for both parties to protect the personal data they process from unauthorized access or disclosure.

Submit
61. True or false? Under the GDPR, both controllers and processors have record-keeping obligations.

Explanation

Under the GDPR (General Data Protection Regulation), both controllers and processors have record-keeping obligations. This means that both parties are required to maintain documentation of their processing activities. Controllers are responsible for ensuring compliance with the GDPR and must keep records of their processing activities. Processors, on the other hand, are required to keep records of all categories of processing activities they perform on behalf of the controller. These record-keeping obligations help ensure transparency and accountability in the handling of personal data, as well as facilitate regulatory oversight and enforcement.

Submit
62. Which of the following are data subject rights under the GDPR? Select all that apply.

Explanation

Under the GDPR, data subject rights include data portability, rectification of inaccurate or incomplete personal data, erasure, and restriction of processing. Data portability allows individuals to obtain and reuse their personal data for their own purposes across different services. Rectification allows individuals to correct any inaccuracies or incompleteness in their personal data. Erasure gives individuals the right to request the deletion of their personal data. Restriction of processing allows individuals to limit the processing of their personal data under certain circumstances.

Submit
63. True or false? Under the GDPR, the controller is obligated to notify the supervisory authority of a personal data breach without undue delay (and within 72 hours of becoming aware of it) if the breach is likely to result in a risk for the rights and freedoms of natural persons.

Explanation

Under the GDPR, the controller is indeed obligated to notify the supervisory authority of a personal data breach without undue delay, and within 72 hours of becoming aware of it, if the breach is likely to result in a risk for the rights and freedoms of natural persons. This requirement aims to ensure that the supervisory authority can assess and potentially mitigate the risks associated with the breach in a timely manner. Failure to comply with this obligation can result in penalties and fines under the GDPR.

Submit
64. Which of the following are required for an entity to be considered a "business" under the California Consumer Privacy Act? Select all that apply.

Explanation

To be considered a "business" under the California Consumer Privacy Act, an entity must meet two criteria. First, it must hold the personal information of 50,000 people, households, or devices. This means that the entity has access to and stores the personal information of a significant number of individuals or devices. Second, the entity must make at least half of its revenue from the sale of personal information. This means that a substantial portion of the entity's income comes from selling personal information. Both of these criteria are necessary for an entity to be classified as a "business" under the California Consumer Privacy Act.

Submit
65. How does the CCPA define a "consumer"? Select all that apply.

Explanation

The CCPA defines a "consumer" as a natural person who is a California resident, as well as every individual who is in California for other than a temporary or transitory purpose, and every individual who is domiciled in California who is outside the state for a temporary or transitory purpose. This means that anyone who is a California resident, anyone who is in California for a non-temporary purpose, and anyone who is domiciled in California but temporarily outside the state is considered a consumer under the CCPA.

Submit
66. The CCPA allows consumers to request and receive records of what personal information? Select all that apply.

Explanation

The CCPA allows consumers to request and receive records of the types of personal information (PI) that an organization holds about them, the sources of PI that the organization holds about them, the specific PI that the organization holds about them, and information about what is being done with the related data in terms of both business use and third-party sharing. This means that consumers have the right to know what information is being collected about them, where it is coming from, and how it is being used and shared.

Submit
67. True or false? Under the CCPA, a business may be required to include a "Do Not Sell My Personal Information" button on its website.

Explanation

Under the CCPA (California Consumer Privacy Act), businesses are indeed required to include a "Do Not Sell My Personal Information" button on their website. This button allows consumers to opt-out of the sale of their personal information to third parties. This requirement ensures that individuals have control over how their personal information is used and shared by businesses.

Submit
68. 49. What theory of legal liability is described as the absence of or failure to exercise proper or ordinary care?

Explanation

Negligence is the theory of legal liability that is described as the absence of or failure to exercise proper or ordinary care. This means that a person or entity is held responsible for their actions or omissions when they fail to meet the standard of care expected in a given situation. In a negligence claim, the plaintiff must prove that the defendant owed a duty of care, breached that duty, and caused the plaintiff's injuries or damages. Defamation, breach of warranty, and strict tort liability are different theories of legal liability that are not directly related to the absence of or failure to exercise proper or ordinary care.

Submit
69. Which of the following are powers of the FTC? Select all that apply.

Explanation

The Federal Trade Commission (FTC) has the power to penalize and halt unfair or deceptive trade practices, seek monetary redress for conduct injurious to consumers, prescribe trade regulation rules, and establish requirements to prevent unfair or deceptive trade practices. These powers allow the FTC to enforce laws and regulations that protect consumers from fraudulent or unfair business practices, ensuring fair competition and promoting consumer welfare in the marketplace.

Submit
70. Which federal agency is the most visible proponent of privacy concerns in the U.S.?

Explanation

The Federal Trade Commission (FTC) is the most visible proponent of privacy concerns in the U.S. This agency is responsible for protecting consumers from unfair and deceptive practices, including privacy violations. The FTC has the authority to enforce laws and regulations related to privacy, and it actively advocates for privacy rights through investigations, lawsuits, and public education campaigns. Its role in promoting privacy and taking action against companies that fail to protect consumer information makes it the primary federal agency addressing privacy concerns in the U.S.

Submit
71. During which decade did the FTC's perspective evolve into a harm-based model?

Explanation

In the 2000s, the FTC's perspective evolved into a harm-based model. This means that during this decade, the FTC started focusing more on identifying and addressing potential harm to consumers, rather than solely relying on proving actual harm. This shift in perspective allowed the FTC to take more proactive measures in protecting consumers from deceptive or unfair business practices, even before significant harm occurred.

Submit
72. What does GPEN stand for?

Explanation

The correct answer is Global Privacy Enforcement Network. GPEN is an international network of privacy enforcement authorities that work together to promote and enforce privacy laws and regulations globally. This network aims to enhance cooperation and information sharing among privacy enforcement authorities to address cross-border privacy issues and protect individuals' privacy rights.

Submit
73. What types of risk should an organization consider when designing and administering a privacy program? Select all that apply.

Explanation

When designing and administering a privacy program, an organization should consider various types of risks. Legal risks are important to consider as organizations need to comply with privacy laws and regulations to avoid legal consequences. Reputational risks should also be considered as any privacy breaches or mishandling of personal information can damage the organization's reputation and trustworthiness. Operational risks are relevant as organizations need to ensure that their privacy program is effectively implemented and operationalized. Investment risks should be considered as organizations need to allocate resources and budget for implementing and maintaining a privacy program. Therefore, all the options provided are types of risks that an organization should consider.

Submit
74. What are the four steps involved in the development of a privacy program?

Explanation

The four steps involved in the development of a privacy program are discover, build, communicate, and evolve. These steps outline a systematic approach to creating and maintaining a privacy program. The first step, discover, involves identifying and understanding the organization's privacy needs and requirements. The second step, build, focuses on developing and implementing privacy policies, procedures, and controls. The third step, communicate, involves effectively communicating the privacy program to all relevant stakeholders. The final step, evolve, emphasizes the continuous improvement and adaptation of the privacy program to keep up with changing privacy laws and regulations.

Submit
75. Who may need privacy training? Select all that apply.

Explanation

Privacy training may be needed by customer service representatives, leaders at the executive level, marketing managers, sales executives, and IT staff. This is because all of these roles may handle sensitive customer information or have access to confidential data. Privacy training helps individuals understand the importance of protecting privacy, the legal and ethical responsibilities associated with handling personal information, and how to effectively safeguard data from unauthorized access or breaches. By providing training to these individuals, organizations can ensure that privacy is prioritized and maintained across various departments and roles.

Submit
76. Which step in the process for developing an incident response program involves permitting affected systems back into the production environment and ensuring no threat remains?

Explanation

The step in the process for developing an incident response program that involves permitting affected systems back into the production environment and ensuring no threat remains is recovery. This step focuses on restoring the affected systems to their normal state and ensuring that all security measures have been taken to prevent any further threats or incidents. It involves verifying that the systems are clean and secure before allowing them back into the production environment.

Submit
77. Which is not a reason for assigning classification levels to personal data?

Explanation

The reason for assigning classification levels to personal data is not to determine the data's sensitivity based on the level of pseudonymization. Classification levels are used to define the clearance of individuals who can access or handle the data, identify the baseline of protection that is appropriate for the data, and segregate highly sensitive data from less sensitive data. Pseudonymization, on the other hand, is a technique used to replace personally identifiable information with a pseudonym, but it does not determine the sensitivity of the data.

Submit
78. True or false? HIPAA preempts stricter state laws.

Explanation

HIPAA stands for the Health Insurance Portability and Accountability Act. It is a federal law that sets standards for the protection of sensitive patient health information. HIPAA includes privacy and security rules that healthcare providers must follow. When it comes to conflicts between federal and state laws regarding patient privacy, HIPAA generally preempts stricter state laws. This means that if a state law is more stringent than HIPAA, the state law will be overridden by HIPAA. Therefore, the statement "HIPAA preempts stricter state laws" is true.

Submit
79. Who is responsible for enforcing HIPAA's Privacy and Security Rules?

Explanation

The Office for Civil Rights (OCR) is responsible for enforcing HIPAA's Privacy and Security Rules. These rules are designed to protect the privacy and security of individuals' health information. The OCR ensures that covered entities, such as healthcare providers and health plans, comply with these rules by conducting investigations, audits, and enforcement actions. They also provide guidance and education to help organizations understand and meet their HIPAA obligations. The OCR plays a crucial role in upholding the privacy and security of individuals' health information in the United States.

Submit
80. True or false? Health insurance providers may, under some circumstances, implement higher premiums based on genetic information.

Explanation

Health insurance providers may implement higher premiums based on genetic information under some circumstances. This is because genetic information can provide insights into an individual's predisposition to certain health conditions, which can increase the risk and cost of providing coverage. However, it is important to note that in many countries, including the United States, there are laws in place, such as the Genetic Information Nondiscrimination Act (GINA), that prohibit health insurance providers from using genetic information to discriminate against individuals when setting premiums or making coverage decisions.

Submit
81. Which act is intended to expedite the research process for medical devices and prescription drugs?

Explanation

The 21st Century Cures Act is intended to expedite the research process for medical devices and prescription drugs. This act aims to accelerate the development and approval of new treatments by streamlining the regulatory process and providing additional funding for research. It also promotes the use of innovative technologies and encourages collaboration between stakeholders in the healthcare industry. The act includes provisions to improve the efficiency of clinical trials and enhance patient access to experimental treatments. Overall, the 21st Century Cures Act aims to speed up the availability of new medical advancements to patients in need.

Submit
82. Which act introduced the first medical privacy provisions?

Explanation

not-available-via-ai

Submit
83. 65. What are some major components of financial privacy? Select all that apply.

Explanation

Financial privacy is the protection of sensitive financial information from unauthorized access or disclosure. Confidentiality ensures that financial information is kept private and not shared with unauthorized individuals. Laws and regulations provide a legal framework for protecting financial privacy and outline the responsibilities of financial institutions and individuals in safeguarding sensitive information. Security measures, such as encryption and secure authentication methods, are essential components of financial privacy as they prevent unauthorized access to financial data. Anonymity, on the other hand, refers to the ability to conduct financial transactions without revealing one's identity, which is not directly related to financial privacy.

Submit
84. What does CRA stand for?

Explanation

CRA stands for Consumer reporting agencies. Consumer reporting agencies are entities that collect and maintain consumer credit information. They gather data from various sources and create credit reports, which are used by lenders, employers, and other entities to assess an individual's creditworthiness. This term is commonly used in the context of credit and financial industries.

Submit
85. Which is a provision of the Fair Credit Reporting Act (FCRA)? Select all that apply.

Explanation

The Fair Credit Reporting Act (FCRA) provides consumers with the ability to access and correct their information, ensuring that they have control over their personal credit information. Additionally, the FCRA limits the use of consumer reports to "permissible purposes," meaning that these reports can only be used for specific and legitimate reasons. This helps protect consumers from unauthorized and inappropriate use of their credit information.

Submit
86. True or false? The Fair Credit Reporting Act (FCRA) amended the Fair and Accurate Credit Transactions Act (FACTA).

Explanation

The statement is false because the Fair Credit Reporting Act (FCRA) did not amend the Fair and Accurate Credit Transactions Act (FACTA). The FCRA and FACTA are two separate laws that regulate different aspects of credit reporting and consumer rights. The FCRA primarily focuses on the accuracy and privacy of consumer credit information, while FACTA deals with identity theft prevention and the truncation of credit card numbers on receipts.

Submit
87. True or false? The FACTA Disposal Rule requires any entity that uses a consumer report for a business purpose to dispose of it in a way that prevents unauthorized access and misuse of the data.

Explanation

The FACTA Disposal Rule indeed requires any entity that uses a consumer report for a business purpose to dispose of it in a way that prevents unauthorized access and misuse of the data. This means that businesses must take appropriate measures to securely dispose of consumer reports to protect sensitive information from falling into the wrong hands.

Submit
88. Which act regulates financial institutions and their management of nonpublic personal information?

Explanation

The Gramm-Leach-Bliley Act (GLBA) is the correct answer because it specifically regulates financial institutions and their management of nonpublic personal information. The GLBA requires financial institutions to provide privacy notices to their customers and to implement safeguards to protect the security and confidentiality of customer information. It also limits the sharing of customer information with nonaffiliated third parties. The FCRA and FACTA are acts that primarily focus on credit reporting and consumer credit information, while the Dodd-Frank Act primarily focuses on financial regulation and consumer protection in response to the 2008 financial crisis.

Submit
89. Under the GLBA Privacy Rule, what must a privacy notice include? Select all that apply.

Explanation

Under the GLBA Privacy Rule, a privacy notice must include information about what is collected, with whom information is being shared, how information will be safeguarded, and how consumers can opt out. This means that the privacy notice should clearly state what types of personal information are collected, who the information may be shared with, the measures taken to protect the information, and provide an option for consumers to opt out of certain data sharing practices.

Submit
90. Which authority was created by the Dodd-Frank Wall Street Reform and Consumer Protection Act?

Explanation

The Dodd-Frank Wall Street Reform and Consumer Protection Act created the Consumer Financial Protection Bureau (CFPB). This authority was established to promote fairness and transparency in the consumer financial marketplace, prevent abusive practices by financial institutions, and protect consumers from unfair treatment. The CFPB is responsible for enforcing consumer financial protection laws and regulating various financial products and services, such as mortgages, credit cards, and payday loans.

Submit
91. What are the key components of the Family Educational Rights and Privacy Act (FERPA)?

Explanation

The key components of the Family Educational Rights and Privacy Act (FERPA) include notice, consent, access and correction, and security and accountability. Notice refers to schools providing information to parents and students about their rights under FERPA. Consent ensures that schools obtain permission from parents or eligible students before disclosing their education records. Access and correction give parents and eligible students the right to review and request changes to their education records. Security and accountability require schools to protect the privacy of education records through appropriate safeguards and to be accountable for any violations of FERPA.

Submit
92. 74. Under FERPA, how often should students receive notice of their rights?

Explanation

Under FERPA (Family Educational Rights and Privacy Act), students should receive notice of their rights annually. This ensures that students are informed about their privacy rights and how their educational records are being handled by educational institutions. By receiving this notice on a yearly basis, students can stay updated and make informed decisions regarding their educational information and privacy.

Submit
93. True or false? The No Child Left Behind Act (NCLBA) broadened the Protection of Pupil Rights Amendment (PPRA).

Explanation

The No Child Left Behind Act (NCLBA) did indeed broaden the Protection of Pupil Rights Amendment (PPRA). The PPRA is a federal law that protects the rights of parents and students regarding surveys, analyses, or evaluations that ask questions about personal beliefs, behaviors, or attitudes. The NCLBA expanded the scope of the PPRA by requiring schools to obtain written consent from parents before students participate in any survey, analysis, or evaluation funded by the U.S. Department of Education that reveals personal information. This expansion of the PPRA under the NCLBA aimed to ensure the privacy and protection of students and their families.

Submit
94. True or false? Technology companies that provide free teaching material are subject to the laws and regulations of FERPA, PPRA and NCLBA.

Explanation

Technology companies that provide free teaching material are subject to the laws and regulations of FERPA, PPRA, and NCLBA. This means that these companies must comply with the requirements and guidelines outlined in these laws when handling and protecting student data and privacy. FERPA (Family Educational Rights and Privacy Act) protects the privacy of student education records, PPRA (Protection of Pupil Rights Amendment) safeguards student privacy in surveys and marketing activities, and NCLBA (No Child Left Behind Act) sets standards for student data privacy and security. Therefore, it is true that technology companies providing free teaching material must adhere to these laws and regulations.

Submit
95. Which legislation provides rights to parents of minors regarding sensitive information from students via surveys?

Explanation

The correct answer is Protection of Pupil Rights Amendment (PPRA). This legislation provides rights to parents of minors regarding sensitive information from students via surveys. PPRA ensures that parents have the right to give their consent before their child participates in any survey that asks for sensitive information, such as political beliefs or sexual behavior. It also gives parents the right to inspect any surveys before they are given to their child and to opt their child out of participating in such surveys. FERPA, on the other hand, focuses on protecting the privacy of students' educational records.

Submit
96. Which legislation provides rights to parents of minors regarding sensitive information from students via surveys?

Explanation

The correct answer is Protection of Pupil Rights Amendment (PPRA). PPRA is a legislation that provides rights to parents of minors regarding sensitive information from students via surveys. It ensures that parents have the right to give their consent before their child participates in any surveys that ask for personal or sensitive information. This legislation aims to protect the privacy and rights of students and their parents in educational settings. FERPA, on the other hand, is a different legislation that protects the privacy of student education records.

Submit
97. True or false? The Telephone Consumer Protection Act (TCPA) implements the Telemarketing Sales Rule (TSR).

Explanation

The Telephone Consumer Protection Act (TCPA) and the Telemarketing Sales Rule (TSR) are two separate regulations. While the TCPA focuses on protecting consumers from unwanted telemarketing calls and text messages, the TSR is a rule enforced by the Federal Trade Commission (FTC) that sets specific guidelines for telemarketing practices. Therefore, the statement that the TCPA implements the TSR is false.

Submit
98. 80. True or false? The Telemarketing Sales Rule (TSR) has been amended several times.

Explanation

The statement is true. The Telemarketing Sales Rule (TSR) has indeed been amended multiple times. The TSR is a set of regulations enforced by the Federal Trade Commission (FTC) to protect consumers from deceptive telemarketing practices. Over the years, the FTC has made several updates and amendments to the rule to adapt to changing technologies and address new challenges in telemarketing. These amendments aim to enhance consumer protection, ensure fair business practices, and keep up with the evolving landscape of telemarketing.

Submit
99. 81. Under the U.S. National Do Not Call (DNC) Registry, how often must telemarketers update their call lists?

Explanation

Telemarketers are required to update their call lists every 31 days under the U.S. National Do Not Call (DNC) Registry. This ensures that individuals who have registered their phone numbers on the DNC list are not contacted by telemarketers after the specified period. Regular updates help to maintain the accuracy and effectiveness of the registry, providing protection to consumers who do not wish to receive unsolicited telemarketing calls.

Submit
100. Which act requires giving a privacy notice to subscribers at the time of the initial agreement (and annually thereafter) including the nature of personal information collected, how it is used, and retention period, as well as how to access and correct information?

Explanation

The Cable Communications Policy Act requires giving a privacy notice to subscribers at the time of the initial agreement (and annually thereafter) including the nature of personal information collected, how it is used, and retention period, as well as how to access and correct information. This act specifically focuses on cable communications and ensures that subscribers are informed about the handling of their personal information.

Submit
101. Which act restricts accessing, using and disclosing customer proprietary network information (CPNI)?

Explanation

The Telecommunications Act restricts accessing, using, and disclosing customer proprietary network information (CPNI). This act was passed in 1996 and it regulates various aspects of the telecommunications industry, including the privacy of customer information. CPNI refers to sensitive information about a customer's telephone usage, such as call records and billing information. The Telecommunications Act ensures that this information is protected and can only be accessed, used, and disclosed under specific circumstances and with the customer's consent.

Submit
102. 84. What does MSCM stand for?

Explanation

MSCM stands for Mobile service commercial message. This refers to a type of message that is sent to mobile phone users for commercial purposes. These messages can include advertisements, promotional offers, or other marketing content. It is a common practice for businesses to send MSCMs as a way to reach and engage with their target audience.

Submit
103. 85. Which amendment to the United States Constitution articulates many of the fundamental concepts used by privacy professionals in the U.S.?

Explanation

The Fourth Amendment to the United States Constitution articulates many of the fundamental concepts used by privacy professionals in the U.S. This amendment protects individuals from unreasonable searches and seizures by the government, and requires that search warrants be supported by probable cause. It is often invoked in cases involving privacy rights, such as surveillance, wiretapping, and data collection by law enforcement agencies. The Fourth Amendment is crucial in safeguarding the privacy of individuals and ensuring that their personal information is protected from unwarranted intrusion by the government.

Submit
104. What are the two parts of the "expectation of privacy test"? Select two.

Explanation

The correct answer is: A person has exhibited an actual expectation of privacy, The expectation be one that society is prepared to recognize as “reasonable”.

This answer explains that for the "expectation of privacy test" to be satisfied, two conditions must be met. First, a person must exhibit an actual expectation of privacy, meaning that they have taken actions or measures to protect their privacy. Second, the expectation of privacy must be one that society is willing to recognize as reasonable, indicating that it aligns with societal norms and expectations regarding privacy.

Submit
105. 87. Under the Right to Financial Privacy Act (RFPA), which of the following may allow a government authority access to customer financial records? Select all that apply.

Explanation

Under the Right to Financial Privacy Act (RFPA), a government authority may access customer financial records through several means. These include an appropriate formal written request from an authorized government authority, an appropriate administrative subpoena or summons, a qualified search warrant, customer authorization, and an appropriate judicial subpoena. These methods ensure that access to customer financial records is granted only when there is a legitimate need and proper legal procedures are followed.

Submit
106. Under the Bank Secrecy Act (BSA), who has the authority to impose record-keeping and reporting requirements on financial institutions?

Explanation

The U.S. Secretary of the Treasury has the authority to impose record-keeping and reporting requirements on financial institutions under the Bank Secrecy Act (BSA). This act is aimed at preventing money laundering and other financial crimes by requiring financial institutions to maintain records and report certain transactions to the government. The Secretary of the Treasury is responsible for enforcing these requirements and ensuring compliance from financial institutions.

Submit
107. When a customer calls in to a company's service support line and hears a recorded message that the call may be recorded for quality purposes, this qualifies as a legal exception to which act prohibiting the wiretapping of telephone calls?

Explanation

not-available-via-ai

Submit
108. What is a pen register?

Explanation

A pen register is a device that records the telephone numbers of all outgoing calls. This device does not capture the content of the calls, but rather logs the numbers dialed. It is commonly used by law enforcement agencies to gather information about the communication patterns of individuals under investigation. The purpose of a pen register is to collect data on outgoing calls, which can be useful in criminal investigations or intelligence gathering.

Submit
109. Which act was passed as part of the ECPA to address interception of electronic communications in facilities where electronic communication service is provided?

Explanation

The Stored Communications Act (SCA) was passed as part of the Electronic Communications Privacy Act (ECPA) to address interception of electronic communications in facilities where electronic communication service is provided. The SCA specifically focuses on the protection of stored communications, such as emails, text messages, and other electronic data, from unauthorized access and disclosure. It establishes guidelines and restrictions for government access to these communications, requiring law enforcement agencies to obtain proper legal authorization, such as a warrant, before accessing stored communications.

Submit
110. Which is a component of the Privacy Protection Act (PPA)? Select all that apply.

Explanation

The Privacy Protection Act (PPA) includes several components. One component is providing an extra layer of protection for members of the media and media organizations from government searches or seizures. This means that the government cannot easily access or confiscate materials from media outlets without following proper legal procedures. Another component is prohibiting government officials engaged in criminal investigations from conducting searches or seizures of media work products or documentary materials. This ensures that journalists' sources and materials are protected from unwarranted government intrusion. Lastly, the PPA applies to government officers or employees at all levels of government, meaning that it is applicable to individuals working in government positions regardless of their rank or jurisdiction.

Submit
111. Some Internet services fall within the scope of the Communications Assistance to Law Enforcement Act (CALEA).

Explanation

Some Internet services fall within the scope of the Communications Assistance to Law Enforcement Act (CALEA). This means that these services are required to provide assistance and cooperation to law enforcement agencies in conducting electronic surveillance. CALEA was enacted to ensure that law enforcement agencies can intercept and access communications in order to investigate and prevent criminal activities. Therefore, it is true that some Internet services are covered by CALEA.

Submit
112. Which act was passed during the Cold War to enable national security to track the activities of agents of the Soviet Union and its foreign allies?

Explanation

The correct answer is the Foreign Intelligence Surveillance Act (FISA). This act was passed during the Cold War to allow national security agencies to monitor and track the activities of agents from the Soviet Union and its allies. FISA established a legal framework for conducting surveillance on foreign powers and their agents within the United States, with the aim of protecting national security interests. It granted authorities the ability to obtain warrants from a special court to conduct electronic surveillance on individuals suspected of being involved in espionage or terrorism.

Submit
113. What does NSL stand for?

Explanation

NSL stands for National Security Letter. This is a type of administrative subpoena used by the United States government agencies, particularly the FBI, to gather information for national security purposes. These letters are issued without the need for a court order and typically request customer records from telecommunications companies, financial institutions, and other organizations. The purpose of NSLs is to assist in the investigation of terrorism and espionage activities.

Submit
114. The USA PATRIOT Act was passed in response to the Edward Snowden revelations.

Explanation

The USA PATRIOT Act was actually passed in response to the 9/11 terrorist attacks, not the Edward Snowden revelations. The Act was intended to enhance national security and expand the powers of law enforcement agencies to prevent future attacks. It was signed into law by President George W. Bush in October 2001, several years before Edward Snowden leaked classified information in 2013.

Submit
115. FISA was amended in 2008 because the flexible legal limits provided by the USA PATRIOT Act led to major legal, public relations and civil liberties issues.

Explanation

The statement is true because the USA PATRIOT Act, which was enacted in response to the 9/11 attacks, granted broad surveillance powers to the government. However, these powers were criticized for potentially violating civil liberties and privacy rights. Therefore, in 2008, the Foreign Intelligence Surveillance Act (FISA) was amended to address these concerns and provide more stringent legal limits on surveillance activities. This amendment was necessary to address the legal, public relations, and civil liberties issues that arose from the flexible legal limits provided by the USA PATRIOT Act.

Submit
116. Which is a provision of the Cybersecurity Information Sharing Act (CISA)? Select all that apply.

Explanation

The Cybersecurity Information Sharing Act (CISA) includes several provisions. One provision states that companies must remove personal information before sharing it with others. Another provision protects companies from liability for monitoring activities related to cybersecurity. Additionally, CISA ensures that sharing information with the federal government does not waive any privileges. Lastly, shared information under CISA is exempt from federal and state Freedom of Information laws, meaning it cannot be accessed through public records requests.

Submit
117. The Employee Polygraph Protection Act (EPPA) prohibits employers from using lie detectors and taking adverse action against an employee who refuses to take a test.

Explanation

The Employee Polygraph Protection Act (EPPA) is a federal law that prohibits employers from using lie detectors, such as polygraph tests, as a means of screening job applicants or for ongoing employment. This law also protects employees from facing adverse actions, such as termination or disciplinary measures, if they refuse to take a lie detector test. Therefore, the statement "The Employee Polygraph Protection Act (EPPA) prohibits employers from using lie detectors and taking adverse action against an employee who refuses to take a test" is true.

Submit
118. Federal law mandates substance use testing for certain positions.

Explanation

Federal law does require substance use testing for certain positions. This means that individuals applying for or working in these specific positions are legally obligated to undergo drug and alcohol testing. The purpose of this requirement is to ensure safety and security in workplaces that involve critical responsibilities or the handling of sensitive information.

Submit
119. Which type of workplace surveillance is permitted within the course of business? Select all that apply.

Explanation

Within the course of business, employers are generally permitted to conduct surveillance on email, telephony, and geolocation. These forms of surveillance can help ensure the security and productivity of the workplace. However, not all wire communications are permitted to be monitored without consent, as wiretapping laws vary depending on jurisdiction.

Submit
120. True or false? Most U.S. states have laws limiting the use of Social Security numbers.

Explanation

Most U.S. states have laws limiting the use of Social Security numbers. This is because Social Security numbers are considered sensitive personal information that can be used for identity theft and fraud. To protect individuals' privacy and prevent misuse, many states have implemented laws that restrict the collection, use, and disclosure of Social Security numbers. These laws often require businesses and government agencies to adopt safeguards and alternative identification methods to minimize the risk of identity theft. Therefore, the statement "Most U.S. states have laws limiting the use of Social Security numbers" is true.

Submit
121. In the event of a data breach, Connecticut's breach notification law defines personal information as the first name (or initial) and last name in combination with one or more what? Select all that apply.

Explanation

Connecticut's breach notification law defines personal information as the first name (or initial) and last name in combination with Social Security number, Driver's license number, and Bank account or card number in combination with a security or access code. This means that if any of these pieces of information are compromised in a data breach, it would be considered a breach of personal information under Connecticut law and would require notification to affected individuals.

Submit
122. Which states specify extensive requirements for data breach notification? Select all that apply.

Explanation

California, Hawaii, Maryland, Massachusetts, and Virginia all specify extensive requirements for data breach notification. These states have enacted laws that require organizations to notify individuals if their personal information has been compromised in a data breach. These laws typically outline the specific information that must be included in the notification, the timeframe for notification, and any additional requirements for providing credit monitoring or other assistance to affected individuals. By selecting all of these states, organizations can ensure that they are in compliance with the comprehensive data breach notification requirements.

Submit
123. True or false? In the case of state requirements regarding data breach notification, email notice is always required first.

Explanation

The statement is false because in the case of state requirements regarding data breach notification, email notice is not always required first. State requirements can vary and may specify different methods of notification, such as postal mail, phone calls, or even public announcements. Email notice may be one of the options, but it is not always the first or only required method of notification.

Submit
124. True or false? State laws regarding data breaches may require third-party notification and notification to the state attorney general.

Explanation

State laws regarding data breaches may require third-party notification and notification to the state attorney general. This means that if a data breach occurs, organizations may be legally obligated to inform affected individuals and also report the breach to the state attorney general's office. These laws are in place to protect individuals' privacy and ensure that appropriate actions are taken to mitigate the impact of the breach.

Submit
125. The _____ is a U.S. federal law that requires U.S. financial institutions and money services businesses (MSBs), which are entities that sell money orders or provide cash transfer services, to record, retain and report certain financial transactions to the federal government. This requirement is meant to assist the government in the investigation of money laundering, tax evasion, terrorist financing and various other domestic and international criminal activities.

Explanation

The Bank Secrecy Act is a U.S. federal law that mandates U.S. financial institutions and money services businesses to keep records, retain them, and report specific financial transactions to the federal government. The purpose of this law is to aid the government in combatting money laundering, tax evasion, terrorist financing, and other criminal activities, both domestically and internationally.

Submit
126. _____ policies are designed to facilitate the use of employees' own personal computing devices for work purposes.

Explanation

Bring Your Own Device (BYOD) policies are designed to allow employees to use their own personal computing devices for work-related tasks. These policies aim to streamline and simplify the process of integrating personal devices into the workplace, enabling employees to use their preferred devices and increasing flexibility and productivity. BYOD policies often include guidelines and security measures to protect sensitive company information and ensure compliance with data protection regulations. By implementing BYOD policies, organizations can take advantage of the familiarity and convenience of employees' personal devices while also potentially reducing hardware and maintenance costs.

Submit
127.   _____ are principles of law that have been established by judges in past decisions.

Explanation

When similar issues arise again, judges look to the past decisions as precedents and decide the new case in a manner that is consistent with past decisions.

Submit
128. _____ has come to be shorthand for any video surveillance system. Originally, such systems relied on coaxial cable and was truly only accessible on premise. Today, most surveillance systems are hosted via TCP/IP networks and can be accessed remotely, and the footage much more easily shared, eliciting new and different privacy concerns.

Explanation

Associated term(s): Video Surveillance

Submit
129. COPPA requires website operators & online services that are directed towards or collect personal information from children under the age of 13 to do which of the following:

Explanation

COPPA (Children's Online Privacy Protection Act) requires website operators and online services that target or collect personal information from children under the age of 13 to take several specific actions. These include posting a privacy notice on the homepage of the website, providing notice about collection practices to parents, obtaining verifiable parental consent before collecting personal information from children, giving parents a choice regarding the disclosure of their child's personal information to third parties, providing parents access and the opportunity to delete their child's personal information and opt out of future collection or use of the information, and maintaining the confidentiality, security, and integrity of the collected personal information from children.

Submit
130. In the context of consent, choice refers to the idea that consent must be freely given and that data subjects must have a genuine choice as to whether to provide personal data or not.

Explanation

If there is no true choice it is unlikely the consent will be deemed valid under the General Data Protection Regulation.

Submit
131. _____ consists of unwritten legal principles that have developed over time based on social customs and expectations.

Explanation

Common Law consists of unwritten legal principles that have developed over time based on social customs and expectations. It is a legal system that relies on judicial decisions and precedents rather than statutory laws. Common Law is derived from the decisions made by judges in previous cases and is shaped by societal norms and practices. This system allows for flexibility and adaptability in the law, as it evolves with changing social values and circumstances.

Submit
132. Which of the following fall into the generally recognized classes of privacy?

Explanation

Bodily Privacy refers to the right to keep one's body and personal space private, such as not being subjected to invasive searches or medical procedures without consent. Communications Privacy refers to the right to keep one's communications, such as phone calls or emails, private from unauthorized access. Information Privacy refers to the right to keep one's personal information, such as financial or medical records, private and secure. Territorial Privacy refers to the right to privacy within one's home or personal space. Therefore, all of the options listed fall into the generally recognized classes of privacy.

Submit
133. _____ may be affirmative; i.e., opt-in; or implied; i.e., the individual didn't opt out.

Explanation

This privacy requirement is one of the fair information practices. Individuals must be able to prevent the collection of their personal data, unless the disclosure is required by law. If an individual has choice about the use or disclosure of his or her information, consent is the individual's way of giving permission for the use or disclosure. Consent may be affirmative; i.e., opt-in; or implied; i.e., the individual didn’t opt out.

(1) Affirmative/Explicit Consent: A requirement that an individual ""signifies"" his or her agreement with a data controller by some active communication between the parties.

(2) Implicit Consent: Implied consent arises where consent may reasonably be inferred from the action or inaction of the individual.

Associated term(s): Choice

Submit
134. A _____ typically occurs when the defendant agrees to stop alleged illegal activity and pay a fine, without admitting guilt or wrongdoing. This legal document is approved by a judge and formalizes an agreement reached between a U.S. federal or state agency and an adverse party.

Explanation

A Consent Decree is a legal document that is approved by a judge and formalizes an agreement reached between a U.S. federal or state agency and an adverse party. It typically occurs when the defendant agrees to stop alleged illegal activity and pay a fine, without admitting guilt or wrongdoing. This allows both parties to avoid a lengthy and costly trial while still addressing the alleged misconduct. The Consent Decree serves as a binding agreement that outlines the specific terms and conditions that the defendant must adhere to in order to resolve the dispute.

Submit
135. Created by the Dodd-Frank Act, _____ is intended to consolidate the oversight of the financial industry. It is an independent bureau within the Federal Reserve and when it was created it took rule-making authority over FCRA and GLBA regulations from the FTC and Financial Industry Regulators. Its enforcement powers include authority to take action against "abusive acts and practices" as specified by the Dodd-Frank Act.

Explanation

The correct answer is the Consumer Financial Protection Bureau. The Consumer Financial Protection Bureau was created by the Dodd-Frank Act to consolidate the oversight of the financial industry. It is an independent bureau within the Federal Reserve and has the authority to enforce regulations such as the FCRA and GLBA. The bureau also has the power to take action against "abusive acts and practices" as outlined in the Dodd-Frank Act.

Submit
136. _____ is any person or entity that complies or evaluates personal information for the purpose of furnishing reports to third parties for a fee.

Explanation

Acronym(s): CRAs

Associated term(s): Credit Reporting Agency

Submit
137. _____  The unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by a data collector.

Explanation

Breaches do not include good faith acquisitions of personal information by an employee or agent of the data collector for a legitimate purpose of the data collector—provided the personal information is not used for a purpose unrelated to the data collector's business or subject to further unauthorized disclosure.

Associated term(s): Breach, Privacy Breach (Canadian)

Submit
138. _____ is the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data.

Explanation

Where the purposes and means of such processing are determined by EU or member state law, the controller or the specific criteria for its nomination may be provided for by EU or member state law.

Associated term(s): Data Processor

Submit
139. _____ A natural or legal person (other than an employee of the controller), public authority, agency or other body which processes personal data on behalf of the controller.

Explanation

An organization can be both a controller and a processor at the same time, depending on the function the organization is performing.

Associated term(s): Data Controller, Processor

Submit
140. _____ A fair information practices principle, it is the principle that personal data should be relevant to the purposes for which it is to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.

Explanation

The quality of data is judged by four criteria: Does it meet the business needs?; Is it accurate?; Is it complete?, and is it recent? Data is of an appropriate quality if these criteria are satisfied for a particular application.

Submit
141. _____ An identified or identifiable natural person.

Explanation

not-available-via-ai

Submit
142. _____ Created in 2016 to replace the invalidated U.S.-EU Safe Harbor agreement, it is a data transfer mechanism negotiated by U.S. and EU authorities that received an adequacy determination from the European Commission that allowed for the transfer of personal data from the EU to the United States for companies participating in the program. Only those companies that fell under the jurisdiction of the U.S. Federal Trade Commission could certify to the principles and participate, which notably excludes health care, financial services, and non-profit institutions. On July 16, 2020, the Court of Justice of the European Union invalidated the European Commission's adequacy determination.

Explanation

Privacy Shield is a data transfer mechanism that was created in 2016 to replace the invalidated U.S.-EU Safe Harbor agreement. It was negotiated by U.S. and EU authorities and received an adequacy determination from the European Commission, allowing for the transfer of personal data from the EU to the United States for participating companies. Only companies falling under the jurisdiction of the U.S. Federal Trade Commission could certify to the principles and participate, excluding health care, financial services, and non-profit institutions. However, on July 16, 2020, the Court of Justice of the European Union invalidated the European Commission's adequacy determination.

Submit
143. _____ An expansion of the Fair Credit Reporting Act which focuses on consumer access and identity theft prevention. The act mandates that credit reporting agencies allow consumers to obtain a free credit report once every twelve months. Additionally, it allows consumers to request alerts when a creditor suspects identity theft and gave the Federal Trade Commission (FTC) authority to promulgate rules to prevent identity theft. The FTC used the authority to create the Red Flags Rule.

Explanation

Link to text of law: Fair and Accurate Credit Transactions Act of 2003

Acronym(s): FACTA, FACT Act

Associated term(s): Red Flags Rule

Associated law(s): Fair Credit Reporting Act

Submit
144. _____ One of the oldest U.S. federal privacy laws still in force today. It was enacted in 1970 to mandate accurate and relevant data collection, give consumers the ability access and correct their information, and limit the use of consumer reports to permissible purposes, such as employment and extension of credit or insurance.

Explanation

Link to text of law: The Fair Credit Reporting Act

Acronym(s): FCRA

Associated law(s): Fair and Accurate Credit Transactions Act of 2003 (FACTA)

Submit
145. _____ The United States' primary consumer protection agency which collects complaints about companies, business practices and identity theft under the Act and other laws that they enforce or administer.

Explanation

Importantly, the FTC brings actions under Section 5 of the FTC Act, which prohibits unfair and deceptive trade practices.

Acronym(s): FTC

Associated law(s): FTC Act

Submit
146. _____ A U.S. federal law that ensures citizen access to federal government agency records.

Explanation

FOIA only applies to federal executive branch documents. It does not apply to legislative or judicial records. FOIA requests will be fulfilled unless they are subject to nine specific exemptions. Most states have some state level equivalent of FOIA. The federal and most state FOIA statutes include a specific exemption for personal information so that sensitive data (such as Social Security numbers) are not disclosed.

Link to text of law: The Freedom of Information Act

Acronym(s): FOIA

Submit
147. _____ Organized following an OECD recommendation for cooperation among member countries on enforcement of privacy laws, GPEN is collection of data protection authorities dedicated to discussing aspects of privacy law enforcement cooperation, the sharing of best practices, development of shared enforcement priorities, and the support of joint enforcement initiatives and awareness campaigns. As of 2018, GPEN counted 50 member countries.

Explanation

The Global Privacy Enforcement Network (GPEN) is an organization that was established based on a recommendation by the OECD for member countries to cooperate on the enforcement of privacy laws. GPEN is a collection of data protection authorities from various countries who come together to discuss and collaborate on different aspects of privacy law enforcement. They share best practices, develop shared enforcement priorities, and support joint enforcement initiatives and awareness campaigns. As of 2018, GPEN had 50 member countries.

Submit
148. _____ Enacted as part of the American Recovery and Reinvestment Act of 2009, the HITECH Act, among other objectives, further addresses privacy and security issues involving PHI as defined by HIPAA.  The HITECH privacy provisions include the introduction of categories of violations based on culpability that, in turn, are tied to tiered ranges of civil monetary penalties.  Its most noteworthy elements elaborate upon breach notifications resulting from the use or disclosure of information that compromises its security or privacy.

Explanation

The correct answer is the Health Information Technology for Economic and Clinical Health Act. This act was enacted as part of the American Recovery and Reinvestment Act of 2009 and aims to address privacy and security issues involving Protected Health Information (PHI) as defined by HIPAA. The act introduces categories of violations based on culpability and sets tiered ranges of civil monetary penalties. It also focuses on breach notifications resulting from the use or disclosure of information that compromises its security or privacy.

Submit
149. _____ A U.S. law passed to create national standards for electronic healthcare transactions, among other purposes.

Explanation

HIPAA required the U.S. Department of Health and Human Services to promulgate regulations to protect the privacy and security of personal health information. The basic rule is that patients have to opt in before their information can be shared with other organizations—although there are important exceptions such as for treatment, payment and healthcare operations.

Submit
150. _____ this class of privacy that encompasses the claim of individuals, groups or institutions to determine for themselves when, how and to what extent information about them is communicated to others.

Explanation

not-available-via-ai

Submit
151. _____ Creates the Existing Business Relationship exception to the U.S. Telephone Consumer Protection Act's ban of fax-based marketing without consent but contains a requirement that all marketing faxes be accompanied by instructions on how to opt out of further unsolicited communications.

Explanation

The Junk Fax Prevention Act creates the Existing Business Relationship exception to the U.S. Telephone Consumer Protection Act's ban on fax-based marketing without consent. This exception allows businesses to send marketing faxes to customers with whom they have an existing business relationship. However, the act also requires that all marketing faxes include instructions on how recipients can opt out of receiving further unsolicited communications. This provision aims to protect consumers' rights and provide them with the option to stop receiving unwanted marketing faxes.

Submit
152. _____ An authentication process that requires more than one verification method, such as a password and biometric identifier, or log-in credentials and a code sent to an email address or phone number supplied by a data subject.

Explanation

Multi-Factor Authentication is an authentication process that involves multiple verification methods. This can include a combination of factors such as passwords, biometric identifiers, log-in credentials, and codes sent to email addresses or phone numbers. By requiring multiple factors, it adds an extra layer of security to ensure that the user is indeed the authorized person. This helps to prevent unauthorized access and protect sensitive information.

Submit
153. _____ A category of subpoena under The USA PATRIOT Act. Separate and sometimes differing statutory provisions now govern access, without a court order, to communication providers, financial institutions, consumer credit agencies and travel agencies.

Explanation

A National Security Letter is a category of subpoena under The USA PATRIOT Act. It allows government agencies to access information from communication providers, financial institutions, consumer credit agencies, and travel agencies without the need for a court order. This provision was implemented to enhance national security measures and enable government agencies to obtain necessary information for investigations related to terrorism and national security threats.

Submit
154. _____ Is defined by GLBA as personally identifiable financial information (i) provided by a consumer to a financial institution, (ii) resulting from a transaction or service performed for the consumer, or (iii) otherwise obtained by the financial institution. Excluded from the definition are (i) publicly available information and (ii) any consumer list that is derived without using personally identifiable financial information.

Explanation

The correct answer, Non-Public Personal Information, is defined by GLBA as personally identifiable financial information provided by a consumer to a financial institution, resulting from a transaction or service performed for the consumer, or otherwise obtained by the financial institution. This definition excludes publicly available information and any consumer list that is derived without using personally identifiable financial information.

Submit
155. _____ First released in 1980, and then updated in 2013, these guidelines represent perhaps the most widely accepted and circulated set of internationally agreed upon privacy principles along with guidance for countries as they develop regulations surrounding cross-border data flows and law-enforcement access to personal data. The principles, widely emulated in national privacy laws, include Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, and Accountability (see entries for each principle under their own listing elsewhere in the glossary).

Explanation

The OECD Guidelines, first released in 1980 and updated in 2013, are a set of internationally agreed upon privacy principles and guidance for countries regarding cross-border data flows and law-enforcement access to personal data. These principles, which are widely emulated in national privacy laws, include Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, and Accountability.

Submit
156. _____ Used to distinguish from sectorial laws (see Sectorial Laws), to mean laws that cover a broad spectrum of organizations or natural persons, rather than simply a certain market sector or population.

Explanation

Omnibus laws are used to distinguish from sectorial laws, which only apply to a specific market sector or population. Omnibus laws, on the other hand, cover a broad spectrum of organizations or natural persons. They are comprehensive in nature and aim to address various issues or regulations that affect multiple sectors or individuals. These laws are designed to provide a holistic approach to governance and ensure consistency and uniformity in the legal framework across different areas.

Submit
157. _____ Websites or online advertising services that engage in the tracking or analysis of search terms, browser or user profiles, preferences, demographics, online activity, offline activity, location data, etc., and offer advertising based on that tracking.

Explanation

Online Behavioral Advertising refers to websites or online advertising services that track and analyze various aspects of user behavior such as search terms, browser history, preferences, demographics, online and offline activity, and location data. Based on this tracking, they offer targeted advertising to users. This type of advertising aims to deliver personalized and relevant ads to individuals based on their online behavior and interests.

Submit
158. _____ One of two central concepts of choice. It means an individual makes an active affirmative indication of choice; i.e., checking a box signaling a desire to share his or her information with third parties.

Explanation

Opt-In is one of the two central concepts of choice. It refers to the action of an individual actively indicating their choice by checking a box to share their information with third parties. This means that the individual is making a deliberate and affirmative decision to allow their information to be shared, rather than it being done automatically or without their explicit consent.

Submit
159. _____ One of two central concepts of choice. It means an individual's lack of action implies that a choice has been made; i.e., unless an individual checks or unchecks a box, their information will be shared with third parties.

Explanation

Opt-Out is one of two central concepts of choice. It means that if an individual does not take any action, it is considered as a choice being made. In the context of this question, unless an individual checks or unchecks a box, their information will be shared with third parties.

Submit
160. _____ An international organization that promotes policies designed to achieve the highest sustainable economic growth, employment and a rising standard of living in both member and non-member countries, while contributing to the world economy.

Explanation

The Organization for Economic Cooperation and Development (OECD) is an international organization that aims to promote policies that foster sustainable economic growth, employment, and a higher standard of living in member and non-member countries. It also seeks to contribute to the global economy. The OECD collaborates with governments, businesses, and civil society to develop and implement policies that address economic and social challenges. Through its research, analysis, and recommendations, the OECD helps countries improve their economic performance and well-being, and it provides a platform for dialogue and cooperation among its member countries.

Submit
161. _____ Contracting business processes, which may include the processing of personal information, to a third party.

Explanation

The answer "Outsourcing" is correct because it refers to the practice of contracting business processes, including the processing of personal information, to a third party. This allows companies to delegate certain tasks or operations to external organizations, which can often provide specialized expertise or cost savings. By outsourcing, companies can focus on their core competencies while relying on external partners to handle specific functions.

Submit
162. _____ A self-regulatory system that provides an enforceable security standard for payment card data.

Explanation

The rules were drafted by the Payment Card Industry Security Standards Council, which built on previous rules written by the various credit card companies. Except for small companies, compliance with the standard requires hiring a third party to conduct security assessments and detect violations. Failure to comply can lead to exclusion from Visa, MasterCard or other major payment card systems, as well as penalties.

Acronym(s): PCI-DSS

Submit
163. _____ Technologies and processes that are designed to secure an entire network environment by preventing penetration from the outside.

Explanation

Associated term(s): Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Internet Protocol Security (IPSEC), Secure Sockets Layer (SSL)

Submit
164. _____ defined broadly in the General Data Protection Regulation as any information relating to an identified or identifiable natural person.

Explanation

Associated term(s): Personal Information; Personally Identifying Information; Personally Identifiable Information

Submit
165. _____ It is a term with particular meaning under the California Consumer Privacy Act, which identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer.

Explanation

The term "Personal Information" in the context of the California Consumer Privacy Act refers to any information that can be linked to a specific consumer. This includes any data that identifies, describes, or relates to an individual, either directly or indirectly. The term encompasses a wide range of data, such as names, addresses, social security numbers, email addresses, and more. The California Consumer Privacy Act aims to protect the privacy and personal information of consumers by regulating how businesses handle and use this data.

Submit
166. _____ A device used for the purpose of rendering a diagnostic opinion regarding an individual's honesty.

Explanation

Associated term(s): Lie Detector

Associated law(s): Employee Polygraph Protection Act of 1988 (EPPA)

Submit
167. _____ A superior government's ability to have its law(s) supersede those of an inferior government. For example, the U.S. federal government has mandated that no state government can regulate consumer credit reporting.

Explanation

Preemption refers to the ability of a superior government to override or supersede the laws and regulations of an inferior government. In this example, the U.S. federal government has mandated that state governments cannot regulate consumer credit reporting. This means that even if a state government had its own laws regarding consumer credit reporting, they would be preempted or invalidated by the federal law. Preemption ensures consistency and uniformity in certain areas of governance, allowing the superior government to have ultimate authority in specific matters.

Submit
168. _____ of an organization's compliance with its privacy policies and procedures, applicable laws, regulations, service-level agreements, standards adopted by the entity and other contracts.

Explanation

The assessment or audit measures how closely the organization’s practices align with its legal obligations and stated practices and may rely on subjective information such as employee interviews/questionnaires and complaints received, or objective standards, such as information system logs or training and awareness attendance and test scores. Audits and assessments may be conducted internally by an audit function or by external third parties. It is also common in some jurisdictions for the privacy/data protection officer to conduct assessments. The results of the assessment or audit are documented for management sign-off, and analyzed to develop recommendations for improvement and a remediation plan. Resolution of the issues and vulnerabilities noted are then monitored to ensure appropriate corrective action is taken on a timely basis. While assessments and audits may be conducted on a regular or scheduled basis, they may also arise ad hoc as the result of a privacy or security event or due to a request from an enforcement authority.

Submit
169. _____ as a specific term was first outlined in a framework in the mid-1990s by then-Information and Privacy Commissioner of Ontario, Canada, Ann Cavoukian, with seven foundational principles.

Explanation

Generally regarded as a synonym for Data Protection by Design (see Data Protection by Design). However, Privacy by Design as a specific term was first outlined in a framework in the mid-1990s by then-Information and Privacy Commissioner of Ontario, Canada, Ann Cavoukian, with seven foundational principles.

Acronym(s): PbD

Submit
170. _____ A statement made to a data subject that describes how an organization collects, uses, retains and discloses personal information.

Explanation

A privacy notice may be referred to as a privacy statement, a fair processing statement or, sometimes, a privacy policy. Numerous global privacy and data protection laws require privacy notices.

Submit
171. _____ An internal statement that governs an organization or entity's handling of personal information. It is directed at those members of the organization who might handle or make decisions regarding the personal information, instructing them on the collection, use, storage and destruction of the data, as well as any specific rights the data subjects may have. May also be referred to as a data protection policy.

Explanation

A privacy policy is an internal statement that governs an organization or entity's handling of personal information. It provides instructions to members of the organization who handle or make decisions regarding personal information, guiding them on the collection, use, storage, and destruction of the data. It also outlines any specific rights that data subjects may have. A privacy policy is sometimes referred to as a data protection policy.

Submit
172. _____ Under HIPAA, this rule establishes U.S. national standards to protect individuals' medical records and other personal health information and applies to health plans, healthcare clearinghouses and those healthcare providers that conduct certain healthcare transactions electronically.

Explanation

The rule requires appropriate safeguards to protect the privacy of personal health information and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The rule also gives patients’ rights over their health information, including rights to examine and obtain a copy of their health records and to request corrections.

Link to text of rule: Privacy Rule

Associated law(s): HIPAA

Submit
173. _____ Unless otherwise restricted by law, any individual that is harmed by a violation of the law can file a lawsuit against the violator.

Explanation

This statement is referring to the concept of a private right of action, which allows individuals who have been harmed by a violation of the law to file a lawsuit against the person or entity responsible for the violation. This means that unless there are legal restrictions in place, any individual who has suffered harm due to a violation of the law has the right to seek legal recourse through a lawsuit.

Submit
174. _____ Any individually identifiable health information transmitted or maintained in any form or medium that is held by an entity covered by the Health Insurance Portability and Accountability Act or its business associate; identifies the individual or offers a reasonable basis for identification; is created or received by a covered entity or an employer; and relates to a past, present or future physical or mental condition, provision of healthcare or payment for healthcare to that individual.

Explanation

Protected Health Information (PHI) refers to any individually identifiable health information that is transmitted or maintained by a covered entity or its business associate. This information can be in any form or medium and includes data that identifies the individual or provides a reasonable basis for identification. It is created or received by a covered entity or an employer and is related to the individual's past, present, or future physical or mental condition, provision of healthcare, or payment for healthcare. PHI is protected under the Health Insurance Portability and Accountability Act (HIPAA) to ensure the privacy and security of individuals' health information.

Submit
175. _____ a vehicle allowing a judge to determine what information should not be made public and what conditions apply to who may access the protected information.

Explanation

A protective order is a legal mechanism that enables a judge to decide which information should be kept confidential and establishes the conditions under which individuals can access this protected information. This order is typically used in cases where sensitive or private information needs to be safeguarded, such as in legal proceedings or investigations. It grants the judge discretionary power to control the dissemination of information and ensures that only authorized individuals can access it, thereby maintaining the privacy and integrity of the information.

Submit
176. _____ Information collected and maintained by a government entity and available to the general public.

Explanation

Public records refer to the information that is collected and maintained by a government entity and is accessible to the general public. These records can include various types of information such as court records, property records, birth and death certificates, business licenses, and more. Public records are typically considered to be part of the public domain and can be accessed by anyone who wishes to view or obtain them, subject to certain restrictions and regulations.

Submit
177. _____ A U.S. common law tort that states: "One who gives publicity to a matter concerning the private life of another is subject to liability to the other for invasion of his privacy, if the matter publicized is of a kind that (a) would be highly offensive to a reasonable person and (b) is not of legitimate concern to the public." (Restatement (Second) of Torts p 652D) Link to text of: Restatement (Second) of Torts p 652D Associated term(s): Common Law

Explanation

The correct answer refers to the tort of "Publicity Given to Private Life." This tort is a U.S. common law concept that holds individuals liable if they give publicity to private matters of another person's life. In order for this tort to apply, the matter publicized must be highly offensive to a reasonable person and not of legitimate concern to the public. The Restatement (Second) of Torts § 652D provides a legal framework for this tort.

Submit
178. _____ Requires that the parties are prohibited from using or disclosing protected health information for any purpose other than the litigation and that the PHI will be returned or destroyed at the end of the litigation.

Explanation

A Qualified Protective Order is a legal requirement that prohibits parties involved in litigation from using or disclosing protected health information (PHI) for any purpose other than the litigation itself. This order also ensures that the PHI will be returned or destroyed once the litigation is concluded. This measure is in place to protect the privacy and confidentiality of individuals' health information during legal proceedings.

Submit
179. _____ Technologies that use radio waves to identify people or objects carrying encoded microchips.

Explanation

Radio-Frequency Identification (RFID) is a technology that uses radio waves to identify people or objects carrying encoded microchips. This technology allows for the wireless transmission of data from the microchip to a reader, enabling the identification and tracking of individuals or items. RFID is commonly used in various applications such as access control, inventory management, and contactless payment systems.

Submit
180. _____ Substance testing sometimes required by law, prohibited in certain jurisdictions, but acceptable where used on existing employees in specific, narrowly defined jobs, such as those in highly regulated industries where the employee has a severely diminished expectation of privacy or where testing is critical to public safety or national security.

Explanation

Random testing is sometimes required by law, prohibited in certain jurisdictions, but acceptable where used on existing employees in specific, narrowly defined jobs, such as those in highly regulated industries where the employee has a severely diminished expectation of privacy or where testing is critical to public safety or national security. This type of testing involves selecting employees randomly and without any predetermined criteria, ensuring that each employee has an equal chance of being selected. Random testing helps to deter substance abuse in the workplace and maintain a safe and secure environment in industries where it is necessary.

Submit
181. _____ The action of reattaching identifying characteristics to pseudonymized or de-identified data (see De-identification and Pseudonymization) .

Explanation

Often invoked as a “risk of re-identification” or “re-identification risk,” which refers to nullifying the de-identification actions previously applied to data (see De-identification).

Associated term(s): De-identification; Anonymization; Anonymous Data, Pseudonymous Data

Submit
182. _____ A determining factor in substance testing where testing is allowed as a condition of continued employment

Explanation

A determining factor in substance testing where testing is allowed as a condition of continued employment if there is “reasonable suspicion” of drug or alcohol use based on specific facts as well as rational inferences from those facts; i.e., appearance, behavior, speech, odors.

Associated term(s): Substance Testing

Submit
183. _____ An individual's right to have personal data about them corrected or amended by a business or other organization if it is inaccurate.

Explanation

Rectification refers to the right of an individual to request corrections or amendments to their personal data if it is found to be inaccurate. This right allows individuals to ensure that their personal information is up-to-date and correct, preventing any potential harm or negative consequences that may arise from inaccurate data. By exercising the right of rectification, individuals can have control over the accuracy and integrity of their personal information held by businesses or organizations.

Submit
184. _____ The practice of identifying and removing or blocking information from documents being produced pursuant to a discovery request or as evidence in a court proceeding.

Explanation

Specifically, attorneys are required to redact documents so that no more than the following information is included in court filings: (1) The last four digits of the Social Security number and taxpayer-identification number; (2) the year of the individual’s birth; (3) if the individual is a minor, only the minor’s initials, and (4) the last four digits of the financial account number.

Associated term(s): Protective Order

Submit
185.  _____ Adopted either directly by the European Commission or by a supervisory authority in accordance with the consistency mechanism (see Consistency Mechanism) and then adopted by the Commission

Explanation

contractual clauses are mechanisms by which organizations can commit to protect personal data to facilitate ongoing and systematic cross-border personal data transfers.

Submit
186. _____ An important source of standards and best practices for managing electronic discovery compliance through data retention policies.

Explanation

Regarding email retention, the Sedona Conference offers four key guidelines:

Email retention policies should be administered by interdisciplinary teams composed of participants across a diverse array of business units;

such teams should continually develop their understanding of the policies and practices in place and identify the gaps between policy and practice;

interdisciplinary teams should reach consensus as to policies while looking to industry standards;

technical solutions should meet and parallel the functional requirements of the organization.

Link to: Sedona Conference

Associated term(s): Data retention, e-Discovery

Submit
187. _____ refers to stakeholder-based models for ensuring privacy.

Explanation

The term “self-regulation” can refer to any or all of three pieces: legislation, enforcement and adjudication. Legislation refers to question of who defines privacy rules. For self-regulation, this typically occurs through the privacy policy of a company or other entity, or by an industry association. Enforcement refers to the question of who should initiate enforcement action. Actions may be brought by data protection authorities, other government agencies, industry code enforcement or, in some cases, the affected individuals. Finally, adjudication refers to the question of who should decide whether an organization has violated a privacy rule. The decision maker can be an industry association, a government agency or a judicial officer. These examples illustrate that the term “self-regulation” covers a broad range of institutional arrangements. For a clear understanding of data privacy responsibilities, privacy professionals should consider who defines the requirements, which organization brings enforcement action and who actually makes the judicial decisions.

Associated term(s): Comprehensive Laws, Co-regulatory Model, Online Privacy Alliance, Sectoral Laws, Seal Programs, Technology Based Model

Submit
188. _____ A case recognized as establishing the "knock-and-announce rule," an important concept relating to privacy in one's home and Fourth Amendment search and seizure jurisprudence in the U.S.

Explanation

Semayne's Case is recognized as establishing the "knock-and-announce rule" which is an important concept relating to privacy in one's home and Fourth Amendment search and seizure jurisprudence in the U.S. This case established the principle that before entering a private residence, law enforcement officers must first announce their presence and purpose, giving the occupants an opportunity to open the door voluntarily. This rule protects individuals' privacy rights and prevents unreasonable searches and seizures in violation of the Fourth Amendment.

Submit
189. _____ An energy system that manages electricity consumption through continuous monitoring, remote computerization and automation.

Explanation

The traditional electric transmission system required physically sending workers into the field to periodically read customer meters and find where problems existed in the grid. Smart grid operators; however, can remotely monitor and control the use of electricity to each home or business.

Submit
190. _____ A United States law, passed in 2002, regulating the transparency of publicly held companies. In particular, public companies must establish a way for the company to confidentially receive and deal with complaints about actual or potential fraud from misappropriation of assets and/or material misstatements in financial reporting from so-called "whistle-blowers."

Explanation

The Sarbanes-Oxley Act is a United States law passed in 2002 that regulates the transparency of publicly held companies. It requires public companies to establish a mechanism for receiving and addressing complaints about fraud and misstatements in financial reporting from whistle-blowers. This act was enacted in response to major corporate scandals, such as Enron and WorldCom, in order to enhance corporate governance and protect investors.

Submit
191. _____ Programs that require participants to abide by codes of information practices and submit to monitoring to ensure compliance.

Explanation

In return, companies that abide by the terms of the seal program are allowed to display the programs seal on their website.

Associated term(s): Self-regulatory Model, WebTrust

Submit
192. _____ A regulation created by the Federal Trade Commission (FTC) under the authority of the Fair and Accurate Credit Transactions Act of 2003.  This regulation requires financial institutions and creditors to implement measures to detect and prevent identity theft.

Explanation

The original FTC rule was circumscribed by the Red Flag Program Clarification Act of 2010, which limited the definition of “creditors” to exclude any creditor “that advances funds on the behalf of a person for expenses incidental to a service.” The act in effect allowed lawyers, some doctors and other service type companies to avoid implementing Red Flag credit measures.

Link to text of law: Red Flag Program Clarification Act of 2010

Associated term(s): Federal Trade Commission

Associated law(s): Fair and Accurate Credit Transactions Act of 2003

Submit
193. _____ An individual's right to request and receive their personal data from a business or other organization.

Explanation

The term "Right of Access" refers to an individual's entitlement to request and obtain their personal data from a business or any other organization. This right allows individuals to have control over their personal information and ensures transparency in how their data is being used. It empowers individuals to be aware of and verify the accuracy of the data held by organizations, promoting data privacy and protection.

Submit
194. _____ is a broad-ranging act designed to counter terrorism that expanded U.S. law enforcement authority to surveillance and capturing communications and records.

Explanation

The correct answer is the USA PATRIOT Act. The USA PATRIOT Act is a broad-ranging act designed to counter terrorism that expanded U.S. law enforcement authority to surveillance and capturing communications and records.

Submit
195. Which federal agency plays a role in enforcing privacy and security standards set by organizations?

Explanation

The Department of Commerce (DOC) plays a role in enforcing privacy and security standards set by organizations. This is because the DOC is responsible for promoting economic growth and technological advancement in the United States. As part of its mission, the DOC oversees the National Institute of Standards and Technology (NIST), which develops and maintains standards for information security and privacy. These standards are used by organizations to protect sensitive information and ensure compliance with regulations. Therefore, the DOC is the federal agency that plays a role in enforcing privacy and security standards.

Submit
196. Which is not a requirement under HIPAA's Privacy Rule?

Explanation

The Privacy Rule under HIPAA does not require an opt-out authorization for the use or disclosure of personal health information outside of HIPAA guidelines. The Privacy Rule focuses on ensuring the protection and privacy of personal health information, including the provision of a detailed privacy notice, limited use and disclosure of information for business associates, and safeguards to protect the confidentiality and integrity of personal health information.

Submit
197. Which federal agency oversees "the welfare of the job seekers, wage earners, and retirees of the United States"?

Explanation

The Department of Labor (DOL) oversees the welfare of job seekers, wage earners, and retirees in the United States. This agency is responsible for enforcing labor laws, promoting fair employment practices, ensuring safe working conditions, and providing resources and support for workers. They also administer programs such as unemployment insurance, workers' compensation, and retirement benefits. The other options listed are not specifically focused on the welfare of job seekers, wage earners, and retirees, making the Department of Labor the correct answer.

Submit
198. The Civil Rights Act bars discrimination due to what? Select all that apply.

Explanation

The Civil Rights Act prohibits discrimination based on various factors. This includes race, color, religion, sex, and national origin. These are all protected characteristics under the Act, meaning that individuals cannot be treated unfairly or denied certain rights and opportunities based on these factors. The Act aims to promote equality and prevent discrimination in various aspects of life, such as employment, housing, and public accommodations. Genetic information and disabilities are not specifically mentioned in the given answer choices, so they are not included as protected characteristics under the Civil Rights Act.

Submit
199. Job candidate background screenings are required for what types of jobs? Select all that apply.

Explanation

Job candidate background screenings are required for those who work with children, the elderly, and disabled individuals because these positions involve vulnerable populations who may be at risk if the candidate has a history of criminal activity or abuse. Screening candidates for these types of jobs helps ensure the safety and well-being of the individuals they will be working with.

Submit
200. Under the Fair Credit Reporting Act (FCRA), what is not an employer requirement to obtain a consumer report on an applicant?

Explanation

The correct answer is "Provide notice to the credit reporting agency outlining the intended purpose of the report." This is not an employer requirement because the FCRA does not require employers to notify the credit reporting agency about the intended purpose of the report. However, employers are required to have a permissible purpose, provide notification to the applicant, allow the applicant to receive a copy of the report, obtain written authorization from the applicant, use a qualified credit reporting agency, and provide notice and a copy of the report for dispute prior to adverse action.

Submit
View My Results

Quiz Review Timeline (Updated): May 8, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 08, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2020
    Quiz Created by
    Themes
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
True or false? Within the information life cycle, Retention is the...
True or false? Secret Keys are "a cryptographic key used with a...
_____ Unsolicited commercial e-mail.
_____ As defined in Article 9 of the General Data Protection...
_____ enacted as part of Electronic Communications Privacy Act in 1986...
_____ A written court order issued in an administrative, civil or...
_____ A screening to identify drug use.
_____ Most legislation recognizes that data breach notifications...
_____ The first enactment of laws limiting unsolicited and automated...
_____ is concerned with placing limitations on the ability of one to...
_____ The movement of personal data from one organization to another.
Which is the best description of the U.S. legal concept of...
_____ Taking appropriate measures to provide any information relating...
What is one reason consent decrees are posted publicly on the FTC...
_____ A U.S. federal agency that oversees "the welfare of the job...
Which of the following is considered an acceptable method for...
_____ Commercial conduct that intentionally causes substantial injury,...
Which statement is true regarding transfers of personal information to...
What is the primary basis of common law?
United States Department of Health, Education and Welfare Fair...
What should a U.S.-based organization do before it shares personal...
_____ A telecommunications industry term for non-core services; i.e.,...
What is the role of a U.S.-based software-as-a-service provider that...
_____ Recordings that do not have sound.
Which federal agency has specific statutory responsibility for issues...
_____ A technology that allows telephone calls to be made over a LAN...
Under the Children's Online Privacy Protection Act, which is an...
_____ Created by the American Institute of Certified Public...
In addition to the Security Rule, what other rule was promulgated by...
_____ If illegal or improper activity is taking place within an...
Which of the following examples best illustrates the concept of...
Which of the statements about the requirements for privacy under the...
What does the "red flags rule" require of financial...
The "Digital Telephony Bill" is another name for which...
Which condition must be met to satisfy the Right to Financial Privacy...
Which U.S. state requires daily electronic notice in order for an...
Under the USA PATRIOT Act and its amendments, which statement is...
Which investigative tactic requires a probable cause and other...
Based on Aerospaciale v. S.D. of Iowa, which is NOT a factor American...
What changes did the FISA Amendments Act of 2008 make to the original...
Which two actions are required under the Fair Credit Reporting Act in...
All of the following are considered acceptable reasons for sharing...
All of the following are considered acceptable lines of questioning by...
In terms of U.S. employees' workplace privacy rights, all of the...
All of the following are valid privacy protection procedures when...
Security laws in U.S. states often restrict:
For those states that have security breach notification requirements,...
The act of video monitoring the workplace is likely to survive a legal...
The loss of names and what other data point would require an employer...
If a company located in Massachusetts maintains all of its...
Rules that govern the collection and handling of personal information...
32. Which authority does not oversee privacy-related issues in the...
Which types of personal information may qualify as sensitive personal...
True or false? Restrictions on the processing of personal information...
35. True or false? Federal privacy laws will always supersede state...
What is an agreement or settlement that resolves a dispute between two...
37. True or false? The word privacy is not mentioned in the U.S....
39. True or false? An organization that does not process personal data...
What type of international data transfer mechanism was invalidated for...
From the list below, select the obligations that are directly...
True or false? Under the GDPR, both controllers and processors have...
Which of the following are data subject rights under the GDPR? Select...
True or false? Under the GDPR, the controller is obligated to notify...
Which of the following are required for an entity to be considered a...
How does the CCPA define a "consumer"? Select all that apply.
The CCPA allows consumers to request and receive records of what...
True or false? Under the CCPA, a business may be required to include a...
49. What theory of legal liability is described as the absence of or...
Which of the following are powers of the FTC? Select all that apply.
Which federal agency is the most visible proponent of privacy concerns...
During which decade did the FTC's perspective evolve into a harm-based...
What does GPEN stand for?
What types of risk should an organization consider when designing and...
What are the four steps involved in the development of a privacy...
Who may need privacy training? Select all that apply.
Which step in the process for developing an incident response program...
Which is not a reason for assigning classification levels to personal...
True or false? HIPAA preempts stricter state laws.
Who is responsible for enforcing HIPAA's Privacy and Security Rules?
True or false? Health insurance providers may, under some...
Which act is intended to expedite the research process for medical...
Which act introduced the first medical privacy provisions?
65. What are some major components of financial privacy? Select all...
What does CRA stand for?
Which is a provision of the Fair Credit Reporting Act (FCRA)? Select...
True or false? The Fair Credit Reporting Act (FCRA) amended the Fair...
True or false? The FACTA Disposal Rule requires any entity that uses a...
Which act regulates financial institutions and their management of...
Under the GLBA Privacy Rule, what must a privacy notice include?...
Which authority was created by the Dodd-Frank Wall Street Reform and...
What are the key components of the Family Educational Rights and...
74. Under FERPA, how often should students receive notice of their...
True or false? The No Child Left Behind Act (NCLBA) broadened the...
True or false? Technology companies that provide free teaching...
Which legislation provides rights to parents of minors regarding...
Which legislation provides rights to parents of minors regarding...
True or false? The Telephone Consumer Protection Act (TCPA) implements...
80. True or false? The Telemarketing Sales Rule (TSR) has been amended...
81. Under the U.S. National Do Not Call (DNC) Registry, how often must...
Which act requires giving a privacy notice to subscribers at the time...
Which act restricts accessing, using and disclosing customer...
84. What does MSCM stand for?
85. Which amendment to the United States Constitution articulates many...
What are the two parts of the "expectation of privacy test"? Select...
87. Under the Right to Financial Privacy Act (RFPA), which of the...
Under the Bank Secrecy Act (BSA), who has the authority to impose...
When a customer calls in to a company's service support line and hears...
What is a pen register?
Which act was passed as part of the ECPA to address interception of...
Which is a component of the Privacy Protection Act (PPA)? Select all...
Some Internet services fall within the scope of the Communications...
Which act was passed during the Cold War to enable national security...
What does NSL stand for?
The USA PATRIOT Act was passed in response to the Edward Snowden...
FISA was amended in 2008 because the flexible legal limits provided by...
Which is a provision of the Cybersecurity Information Sharing Act...
The Employee Polygraph Protection Act (EPPA) prohibits employers from...
Federal law mandates substance use testing for certain positions.
Which type of workplace surveillance is permitted within the course of...
True or false? Most U.S. states have laws limiting the use of Social...
In the event of a data breach, Connecticut's breach notification law...
Which states specify extensive requirements for data breach...
True or false? In the case of state requirements regarding data breach...
True or false? State laws regarding data breaches may require...
The _____ is a U.S. federal law that requires U.S. financial...
_____ policies are designed to facilitate the use of employees' own...
  _____ are principles of law that have been established by...
_____ has come to be shorthand for any video surveillance system....
COPPA requires website operators & online services that are...
In the context of consent, choice refers to the idea that consent must...
_____ consists of unwritten legal principles that have developed over...
Which of the following fall into the generally recognized classes of...
_____ may be affirmative; i.e., opt-in; or implied; i.e., the...
A _____ typically occurs when the defendant agrees to stop alleged...
Created by the Dodd-Frank Act, _____ is intended to consolidate the...
_____ is any person or entity that complies or evaluates personal...
_____  The unauthorized acquisition of computerized data that...
_____ is the natural or legal person, public authority, agency or any...
_____ A natural or legal person (other than an employee of the...
_____ A fair information practices principle, it is the principle that...
_____ An identified or identifiable natural person.
_____ Created in 2016 to replace the invalidated U.S.-EU Safe Harbor...
_____ An expansion of the Fair Credit Reporting Act which focuses on...
_____ One of the oldest U.S. federal privacy laws still in force...
_____ The United States' primary consumer protection agency which...
_____ A U.S. federal law that ensures citizen access to federal...
_____ Organized following an OECD recommendation for cooperation among...
_____ Enacted as part of the American Recovery and Reinvestment Act of...
_____ A U.S. law passed to create national standards for electronic...
_____ this class of privacy that encompasses the claim of individuals,...
_____ Creates the Existing Business Relationship exception to the...
_____ An authentication process that requires more than one...
_____ A category of subpoena under The USA PATRIOT Act. Separate and...
_____ Is defined by GLBA as personally identifiable financial...
_____ First released in 1980, and then updated in 2013, these...
_____ Used to distinguish from sectorial laws (see Sectorial Laws), to...
_____ Websites or online advertising services that engage in the...
_____ One of two central concepts of choice. It means an individual...
_____ One of two central concepts of choice. It means an individual's...
_____ An international organization that promotes policies designed to...
_____ Contracting business processes, which may include the processing...
_____ A self-regulatory system that provides an enforceable security...
_____ Technologies and processes that are designed to secure an entire...
_____ defined broadly in the General Data Protection Regulation as any...
_____ It is a term with particular meaning under the California...
_____ A device used for the purpose of rendering a diagnostic opinion...
_____ A superior government's ability to have its law(s) supersede...
_____ of an organization's compliance with its privacy policies and...
_____ as a specific term was first outlined in a framework in the...
_____ A statement made to a data subject that describes how an...
_____ An internal statement that governs an organization or entity's...
_____ Under HIPAA, this rule establishes U.S. national standards to...
_____ Unless otherwise restricted by law, any individual that is...
_____ Any individually identifiable health information transmitted or...
_____ a vehicle allowing a judge to determine what information should...
_____ Information collected and maintained by a government entity and...
_____ A U.S. common law tort that states: "One who gives publicity to...
_____ Requires that the parties are prohibited from using or...
_____ Technologies that use radio waves to identify people or objects...
_____ Substance testing sometimes required by law, prohibited in...
_____ The action of reattaching identifying characteristics to...
_____ A determining factor in substance testing where testing is...
_____ An individual's right to have personal data about them corrected...
_____ The practice of identifying and removing or blocking information...
 _____ Adopted either directly by the European Commission or by a...
_____ An important source of standards and best practices for managing...
_____ refers to stakeholder-based models for ensuring privacy.
_____ A case recognized as establishing the "knock-and-announce...
_____ An energy system that manages electricity consumption through...
_____ A United States law, passed in 2002, regulating the transparency...
_____ Programs that require participants to abide by codes of...
_____ A regulation created by the Federal Trade Commission (FTC) under...
_____ An individual's right to request and receive their personal data...
_____ is a broad-ranging act designed to counter terrorism that...
Which federal agency plays a role in enforcing privacy and security...
Which is not a requirement under HIPAA's Privacy Rule?
Which federal agency oversees "the welfare of the job seekers, wage...
The Civil Rights Act bars discrimination due to what? Select all that...
Job candidate background screenings are required for what types of...
Under the Fair Credit Reporting Act (FCRA), what is not an employer...
Alert!

Advertisement