Regulation and Control of Personal Information Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is data protection?

Data protection refers to how your personal information is used by the organization or being an organization, how you would make sure to protect data of your customers, employees etc

Define privacy.

Privacy refers to the privilege provided to an individual by law or by the organizational policy where the individual can keep the information secret to or from a specific group

How has the development of global information networks affected privacy protection?

The development of global information networks has changed and intensified the character of the privacy protection problem

What was the original challenge of data protection law?

<p>The original challenge of data protection law was to provide a suitable mechanism for dealing with the perceived threat to individual privacy of large centralized data banks</p> Signup and view all the answers

What are the factors affecting the regulation of data processing?

<p>The issues are complicated by rapidly advancing technology, the global nature of the activities to be regulated, and the variety of possible regulatory approaches found in the various legal traditions within the world</p> Signup and view all the answers

What has resulted in a convergence of the rules made to ensure good data management?

<p>At the level of international agreements and national legislation, the requirements imposed by this particular type of technology have resulted in a convergence of the rules made to ensure good data management</p> Signup and view all the answers

What is defamation?

<p>Defamation refers to the dissemination of untrue and unwarranted statements about others, which may damage their reputation</p> Signup and view all the answers

What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?

<p>Publication of such material might attract an action for defamation</p> Signup and view all the answers

What is the impact of increasing computerization on the handling and processing of information?

<p>The data itself has become a commodity with commercial value and can be traded on the market.</p> Signup and view all the answers

What does data protection refer to?

<p>Data protection refers to how personal information is used by the organization or how an organization protects data of its customers, employees, etc.</p> Signup and view all the answers

What privilege does privacy refer to?

<p>Privacy refers to the privilege provided to an individual by law or organizational policy where the individual can keep information secret to or from a specific group.</p> Signup and view all the answers

How has the development of global information networks changed the character of the privacy protection problem?

<p>The development of global information networks has changed and intensified the character of the privacy protection problem.</p> Signup and view all the answers

What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?

<p>Formidable problems of policy and implementation are presented by the attempt to regulate systems and practices that are technologically advanced, widely dispersed, rapidly changing, and employed by powerful economic and government interests.</p> Signup and view all the answers

What has resulted in a convergence of the rules made to ensure good data management?

<p>The requirements imposed by technology have resulted in a convergence of the rules made to ensure good data management.</p> Signup and view all the answers

What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?

<p>At the level of international agreements and national legislation, the requirements imposed by technology have resulted in a convergence of the rules made to ensure good data management.</p> Signup and view all the answers

What does defamation and protection of reputation concern?

<p>Defamation and protection of reputation concern the various methods available for the dissemination of information on computer networks and the redress available for those who feel that untrue and unwarranted statements have been circulated about them.</p> Signup and view all the answers

What does the original challenge of data protection law concern?

<p>The original challenge of data protection law concerned providing a suitable mechanism for dealing with the perceived threat to individual privacy of large centralized data banks.</p> Signup and view all the answers

What question is inevitably being asked about the original formulation of data protection law?

<p>The question which is inevitably being asked is whether the original formulation of data protection law is capable of controlling the amorphous decentralized activities which occur through the medium of the Internet and World Wide Web.</p> Signup and view all the answers

What does the publication of defamatory material attract?

<p>Publication of defamatory material might attract an action for defamation.</p> Signup and view all the answers

What are the factors affecting the regulation of data processing?

<p>The factors affecting the regulation of data processing are complicated issues due to rapidly advancing technology, the global nature of activities to be regulated, and the variety of possible regulatory approaches found in various legal traditions within the world.</p> Signup and view all the answers

What is the process of recovering secret passwords from data stored in a computer system called?

<p>Password cracking</p> Signup and view all the answers

What is the term used for unauthorized access to an email account or email correspondence?

<p>Email hacking</p> Signup and view all the answers

What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?

<p>Software Hacking</p> Signup and view all the answers

What is the term for the legal attempt to break into a company’s network to find its weakest link?

<p>Penetration test</p> Signup and view all the answers

What should be done immediately after a computer system has been hacked?

<p>Shut down / Turn off the system, Separate the system from network, Restore the system with backup or reinstall all programs, Call the police</p> Signup and view all the answers

What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?

<p>hacking</p> Signup and view all the answers

What is the primary goal of a computer hacker?

<p>developing, changing, or attempting to circumvent computer security hardware or software</p> Signup and view all the answers

What type of hacking involves taking control of a website from the website owner?

<p>Website Hacking</p> Signup and view all the answers

Define Ethical Hacking.

<p>The process of attempting to gain or successfully gaining unauthorized access to computer resources is called hacking</p> Signup and view all the answers

What does a criminal hacker develop to gain access to confidential information?

<p>computer malware or spyware</p> Signup and view all the answers

More Like This

Data Protection and Consent Quiz
10 questions
Data Protection Products for AWS
7 questions
Data Protection Principles
10 questions
Use Quizgecko on...
Browser
Browser