US Federal Laws on Data, Copyrights, and Cybercrime
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one of the essential pieces of information that a personal information controller must provide to a data subject?

  • The method of encryption used to store personal information
  • The email address of the data protection officer
  • The identity and contact details of the personal information controller (correct)
  • The identity and contact details of the personal information controller's legal counsel

What is the purpose of a privacy impact assessment?

  • To assess the potential risks and impact of processing personal information (correct)
  • To determine the appropriate method of encryption for personal information
  • To create a privacy knowledge management program
  • To identify the data protection officer of the organization

What is the consequence of non-compliance with the Data Privacy Act?

  • A suspension of business operations for one month
  • A fine of not less than One hundred thousand pesos (PHP 100,000)
  • A fine of not less than Five hundred thousand pesos (PHP 500,000) and imprisonment up to six years (correct)
  • A warning letter from the National Privacy Commission

What is one of the rights of a data subject under the Data Privacy Act?

<p>The right to request the correction of inaccurate personal information (D)</p> Signup and view all the answers

What is the term for the government-controlled Internet in China?

<p>The Great Firewall of China (B)</p> Signup and view all the answers

Which Act regulates the collection and use of personal information by the Internal Revenue Service?

<p>Tax Reform Act of 1976 (A)</p> Signup and view all the answers

What is protected under Article III, Section 3 of the 1987 Constitution of the Republic of the Philippines?

<p>The right to privacy of communication and correspondence (C)</p> Signup and view all the answers

What does the Freedom of Information Act of 1970 primarily ensure?

<p>Access to government activities in federal agency files (B)</p> Signup and view all the answers

Which Act holds companies responsible for cross-referencing computer files between federal agencies?

<p>Computer Matching and Privacy Act of 1988 (D)</p> Signup and view all the answers

What is the primary purpose of the Children's Online Privacy Protection Act of 1998?

<p>To establish standards for collecting information from children online (D)</p> Signup and view all the answers

What does the Cable Act of 1992 primarily regulate?

<p>Wireless communication services (C)</p> Signup and view all the answers

What is the main goal of the Education Privacy Act?

<p>To protect personal data in educational institutions (C)</p> Signup and view all the answers

What is a crucial aspect of privacy in the workplace?

<p>Employees' right to keep personal information private (B)</p> Signup and view all the answers

What is the primary concern regarding data collection by federally funded educational institutions?

<p>Type of data collected and access by parents and students (A)</p> Signup and view all the answers

What is the main objective of the Fraud and False Statements Law in relation to computers?

<p>To prevent fraud and related activity in connection with access devices and computers (B)</p> Signup and view all the answers

What is the essence of the right to privacy?

<p>The right to keep personal information private (C)</p> Signup and view all the answers

What is a key issue in the context of company responsibilities towards employees' privacy?

<p>Employees' right to privacy in the workplace (A)</p> Signup and view all the answers

What is a potential consequence of companies monitoring their employees?

<p>Raised concerns about privacy (D)</p> Signup and view all the answers

More Like This

Cybercrime Quiz
5 questions

Cybercrime Quiz

TruthfulParadise avatar
TruthfulParadise
Cybercrime and Digital Footprints Quiz
13 questions
Cybercrime and Identity Theft Overview
10 questions
Use Quizgecko on...
Browser
Browser