Regulation and Control of Personal Information Quiz

AbundantField avatar
AbundantField
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is data protection?

Data protection refers to how your personal information is used by the organization or being an organization, how you would make sure to protect data of your customers, employees etc

Define privacy.

Privacy refers to the privilege provided to an individual by law or by the organizational policy where the individual can keep the information secret to or from a specific group

How has the development of global information networks affected privacy protection?

The development of global information networks has changed and intensified the character of the privacy protection problem

What was the original challenge of data protection law?

The original challenge of data protection law was to provide a suitable mechanism for dealing with the perceived threat to individual privacy of large centralized data banks

What are the factors affecting the regulation of data processing?

The issues are complicated by rapidly advancing technology, the global nature of the activities to be regulated, and the variety of possible regulatory approaches found in the various legal traditions within the world

What has resulted in a convergence of the rules made to ensure good data management?

At the level of international agreements and national legislation, the requirements imposed by this particular type of technology have resulted in a convergence of the rules made to ensure good data management

What is defamation?

Defamation refers to the dissemination of untrue and unwarranted statements about others, which may damage their reputation

What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?

Publication of such material might attract an action for defamation

What is the impact of increasing computerization on the handling and processing of information?

The data itself has become a commodity with commercial value and can be traded on the market.

What does data protection refer to?

Data protection refers to how personal information is used by the organization or how an organization protects data of its customers, employees, etc.

What privilege does privacy refer to?

Privacy refers to the privilege provided to an individual by law or organizational policy where the individual can keep information secret to or from a specific group.

How has the development of global information networks changed the character of the privacy protection problem?

The development of global information networks has changed and intensified the character of the privacy protection problem.

What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?

Formidable problems of policy and implementation are presented by the attempt to regulate systems and practices that are technologically advanced, widely dispersed, rapidly changing, and employed by powerful economic and government interests.

What has resulted in a convergence of the rules made to ensure good data management?

The requirements imposed by technology have resulted in a convergence of the rules made to ensure good data management.

What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?

At the level of international agreements and national legislation, the requirements imposed by technology have resulted in a convergence of the rules made to ensure good data management.

What does defamation and protection of reputation concern?

Defamation and protection of reputation concern the various methods available for the dissemination of information on computer networks and the redress available for those who feel that untrue and unwarranted statements have been circulated about them.

What does the original challenge of data protection law concern?

The original challenge of data protection law concerned providing a suitable mechanism for dealing with the perceived threat to individual privacy of large centralized data banks.

What question is inevitably being asked about the original formulation of data protection law?

The question which is inevitably being asked is whether the original formulation of data protection law is capable of controlling the amorphous decentralized activities which occur through the medium of the Internet and World Wide Web.

What does the publication of defamatory material attract?

Publication of defamatory material might attract an action for defamation.

What are the factors affecting the regulation of data processing?

The factors affecting the regulation of data processing are complicated issues due to rapidly advancing technology, the global nature of activities to be regulated, and the variety of possible regulatory approaches found in various legal traditions within the world.

What is the process of recovering secret passwords from data stored in a computer system called?

Password cracking

What is the term used for unauthorized access to an email account or email correspondence?

Email hacking

What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?

Software Hacking

What is the term for the legal attempt to break into a company’s network to find its weakest link?

Penetration test

What should be done immediately after a computer system has been hacked?

Shut down / Turn off the system, Separate the system from network, Restore the system with backup or reinstall all programs, Call the police

What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?

hacking

What is the primary goal of a computer hacker?

developing, changing, or attempting to circumvent computer security hardware or software

What type of hacking involves taking control of a website from the website owner?

Website Hacking

Define Ethical Hacking.

The process of attempting to gain or successfully gaining unauthorized access to computer resources is called hacking

What does a criminal hacker develop to gain access to confidential information?

computer malware or spyware

Test your knowledge about the regulation and control of personal information including data protection, defamation, and related issues in the context of increasing computerization. Explore the impact of computerization on the storage, processing, retention, and release of information and data.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Data Protection and Consent Quiz
10 questions
Data Protection Products for AWS
7 questions
Data Protection Principles
10 questions
Use Quizgecko on...
Browser
Browser