1. __________ is the unauthorized entry into a computer system via any means. A. Computer trespass
2. ____________________ is the determination of what records require storage and for how long. A. Data retention
3. In the United States, the primary path to privacy is via __________, whereas in Europe and other countries, it is via __________. A. opt-out; opt-in
4. The development of a privacy policy is an essential foundational element of a company’s privacy stance. A. True
5. The Gramm-Leach-Bliley Act is a major piece of legislation that __________. A. affects the financial industry and contains significant privacy provisions for individuals
6. The low risk of being caught is one of the reasons that criminals are turning to computer crime. A. True
7. Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? A. Digital Millennium Copyright Act
8. Which law overhauled the financial accounting standards for publicly traded firms in the United States? A. Sarbanes-Oxley Act
9. Which law was designed to enable public access to U.S. government records? A. FOIA – Freedom of Information Act
10. Which term refers to a structured approach to determining the gap between desired privacy performance and actual privacy performance? A. Privacy impact assessment
Other Links:
See other websites for quiz:
Check on QUIZLET