1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
it is false that a National security letter is subject to review and oversight
A National Security Letter is subject to judicial review and oversight. T/F
event data recorder
One purpose of a(n) _____ is to capture and record data that can be used by the manufacturer to make future changes to improve vehicle performance in the case of a crash.
It is true that the GLBA includes key rules that include the follow
The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule. T/F
FCC
The Communications Act of 1934 established the _____.
allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."
The Foreign Intelligence Surveillance Act:
It is false the US does not have a single national data privacy policy
The U.S. has a single, overarching national data privacy policy. T/F
It is false American citizens are not protected by the 4th amendment
American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy. T/F
Privacy Act
The _____ prohibits the government from concealing the existence of any personal data record-keeping systems.
It is false, financial institution cannot release customer's financial records
Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records. T/F
Gramm-Leach-Bliley Act
Under the _____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.
evidence
Discovery is part of the pretrial phase of a lawsuit in which each party can obtain _____ from the other party by various means.
it is true that information privacy is the combination of communication and data privacy
Information privacy is the combination of communications privacy and data privacy.
Electronic Communications Privacy Act
Title I of the _____ extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet.