1/70
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
An individual makes a free-willed choice based on a principles of right and wrong. These principles would be examples of ____________.
morals
Rules which are codified and enforceable by societal institutions are called ____________.
laws
A framework which guides and evaluates behavior in a specific context such as a company or a professional society is called _________
ethics
The National Information Infrastructure Protection Act is part of a society's ____________.
laws
The Association for Computing Machinery has published a set of principles to guide the conduct of its computing professional members. This is an example of a code of _________.
ethics
A person is guided by a belief that it is important to put in effort and work hard. This belief is a an example of a person's _________.
morals
The United States has an overarching law that broadly views privacy as a fundamental human right.
True or False
False
Many people believe that the traditional notion of privacy as "the right to be left alone" is inadequate in the digital age and needs to be expanded.
True or False
True
The European Union has an overarching law that broadly views privacy as a fundamental human right.
True or False
True
The United States has NO laws which govern data privacy.
True or False
False
The fourth amendment of the United States Constitution protects citizens against unreasonable search and seizure.
True or False
True
The 4th amendment does NOT apply to any electronic communications.
True or False
False
The _________ fair information practice ensures that individuals have the capability to review and correct information about themselves.
access/participation
The __________ fair information practice ensures that other fair information practices are followed.
enforcement
The __________ fair information practice ensures that individual permission is obtained if information is used for purposes that are different from the original purpose .
choice/consent
The __________ fair information practice ensures that information practices are disclosed to individuals before information is collected.
notice
The __________ fair information practice ensures that information is accurate and is accessed for authorized purposes and by only authorized persons.
security
When installing a new third-party app, a social media platform asks the user what user profile and social network information may be shared with the third-party. This is an example of the ___________ fair information practice.
choice/consent
A patient at a medical practice is asked to sign a HIPAA (Health Insurance Portabaility and Accountability ACT) release form which describes how the practice will use subsequently collected medical information. This is an example of the ____________ fair information practice.
notice
A state provides a process for its citizens to check and correct court records about themselves. This is an example of the __________ fair information practice.
access/participation
A company that provides an online marketplace experienced a cyber attack in which hackers gained access to the personal information of more than 100 million users. The company was fined $7 million. This is an example of the _________ fair information practice
enforcement
A bank does criminal background checks on all job applicants who will be accessing customer data. This is an example of the ______________ fair information practice.
security
_____________ makes it illegal to break anti-piracy measures built into software.
The Digital Millennium Copyright Act of 1998
_______________ requires that a probable-cause warrant be obtained from a judge before conducting electronic eavesdropping in a criminal investigation.
The Wiretap Act of 1968
____________ gave consumers rights to access information about themselves that companies use to make loan and insurance decisions and to correct inaccuracies.
The Fair Credit Reporting Act of 1970
______________ requires Internet Service Providers to take down content once they have been notified of copyright infringement.
The Digital Millennium Copyright Act of 1998
____________ provides the right to access records from U.S federal agencies subject to certain exemptions which protect personal privacy, national security, and law enforcement interests.
The Freedom of Information Act of 1967
_______________ prevents unfair and deceptive business practices.
The Federal Trade Commission Act of 1914
______________ extended the Wiretap Act provisions to also include communication over the Internet.
The Electronic Communications Privacy Act of 1986
_______________ granted broad authority to U.S. domestic law enforcement and intelligence agencies to investigate terror-related crimes in response to the 9/11 terrorist attacks.
The Patriot Act of 2001
_____________ permits surveillance of foreign actors engaged in terrorism and espionnage for up to one year without a warrant unless a U.S. person is involved.
The Foreign Intelligence Surveillance Act of 1978
______________ helps to ensure that a company adheres to its published privacy policy.
The Federal Trade Commission Act of 1914
___________________ creates fair information practices regarding data collected by U.S. federal agencies about U.S. persons.
The Privacy Act of 1974
The item below an example of intellectual property:
a pound of sugar
True or False
False
The item below an example of intellectual property:
a movie
True or False
True
The item below an example of intellectual property:
a sculpture
True or False
True
The item below an example of intellectual property:
an eye retina
True or False
False
The item below an example of intellectual property:
a biographical book
True or False
True
The item below an example of intellectual property:
a 12 ounce filet mignon
True or False
False
The item below an example of intellectual property:
an ounce of gold
True or False
False
The item below an example of intellectual property:
a software program
True or False
True
_________ is a protected identifier of a brand or company that may consist of words, phrases, symbols, sounds, scents and/or color schemes.
a trademark
__________ is the illegal copying of intellectual property.
Piracy
__________ protects only the manifestation or expression of a creative work and NOT the underlying idea of a that work.
A copyright
__________ excludes others from using an idea behind an invention for a period of time.
A patent
___________ is intellectual property of a company that is NOT in the public domain.
A trade secret
Colonel Sanders kept the original recipe for Kentucky Fried Chicken in a safe. Only a few employees who were bound by confidentiality agreements had access to the recipe. This is an example of _________.
a trade secret
A hair styler created vidoes demonstrating how to do different hair updoes such as a french twist. The best way for the hair styler to protect his videos is ______________.
a copyright
The jingle "Liberty, Liberty, Liberty ... Liberty!" created by Liberty Mutual Insurance Company is an example of ___________.
a trademark
A person who records a new movie and shares the recording with friends has most likely engaged in an illegal act known as __________.
piracy
An engineer created the design for a 3D printer. The design would be protected using __________.
a patent
Using a system audit trail, a company was able to determine who processed an improper transaction. This is an example of _______________.
accountability
An employee acknowledged his large number of absences from work and agreed to a demotion. This is an example of _______________.
responsibility
The institutional mechanisms used to identify parties who chose and followed a course of action is called ___________.
accountability
A person damaged a neighbor's lawn by driving an all-terrain vehicle on the lawn in muddy conditions. The driver was ordered by a court to repair the lawn. This is an example of __________.
liability
The mechanism which enables individuals to recover damages for harm done is called ___________.
liability
Accepting the consequences of one’s actions is called _____________.
responsibility
An airbag inflated when it shouldn't have and caused a passenger to sustain broken ribs. The appropriate legal remedy would fall under ______________.
strict product liability
Legal protection against products that do not function in ways that their creators described they would function and that doesn't require showing harm done is called _____________.
a warranty
Showing that harm was caused by creators who did not use a reasonable standard of care when creating the product is called _____________.
negligence
A legal mechanism to protect against defective products which requires showing only that the product caused harm to a person or property is ____________.
strict product liability
The keys on the keyboard of a laptop began falling off soon after purchasing the laptop. The appropriate legal remedy would be _____________.
a warranty
A patient who suffered irreparable harm from a delayed cancer diagnosis showed that the physician did not follow generally accepted medical procedures. The appropriate legal remedy would fall under the category of ____________
negligence
Incorrect information that is deliberately disseminated with intent to manipulate people's attitudes and behavior is called _________.
disinformation
To counter efforts to increase government oversight, the high-tech industry ran advertisements touting their own importance for global competitiveness while ignoring the negative consequences of the industry’s concentrated market power. This is an example of ____________.
propaganda
In order to profit from increased social media followers, a person knowingly promoted a false story that the Apollo 11 moon landing in 1969 was faked. This is an example of ___________.
disinformation
Persuasive speech common in politics and advertising which promotes one point of view while ignoring or discounting other points of view is called ___________.
propaganda
Incorrect information that is disseminated with neutral intent is called ____________.
misinformation
A political party deliberately portrayed a group of people as subhuman animals in order to prime the citizenry to subsequently treat this group with prejudice and cruelty. This is an example of ___________.
disinformation
A foreign government deliberately created the false impression of two opposing grassroots movements in order to create chaos in another country’s political institutions. This is an example of ___________.
disinformation
A journalist accidentally reported that a political candidate likes to spend his time reading Toy Story instead of Tolstoy. The news outlet ran a correction the following day. This is an example of __________.
misinformation