• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
The concept of privacy is ____.
protected by a number of amendments in the Bill of Rights
The Supreme Court has ruled that ____.
without a reasonable expectation of privacy, there is no privacy right
The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained.
Fair Credit Reporting Act
The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions.
Gramm-Leach-Bliley Act
Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records.
written consent
The Children’s Online Privacy Protection Act ____.
does not cover the dissemination of information to children
The Foreign Intelligence Surveillance Act ____.
Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party
The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public.
Electronic Communications Privacy Act
Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.
Communications Assistance for Law Enforcement Act
The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records.
USA PATRIOT Act
A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored.
roving wiretap
Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation.
National Security Letter
A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law.
sunset provision
The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt.
Fair Information Practices
The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Union’s.
European Union Data Protection Directive
The ____ seal program identifies online businesses that honor their own stated privacy protection policies.
BBBOnLine
For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organization’s oversight and consumer resolution process, and pay an annual fee.
BBBOnLine
The ____ prohibits the government from concealing the existence of any personal data record-keeping systems.
Privacy Act
____ is one of the fastest growing forms of fraud in the United States, directly impacting over 4% of the overall U.S. adult population in 2008 with a resulting loss of $48 billion.
Identity theft
____ is keystroke-logging software downloaded to users’ computers without the knowledge or consent of the user.
Spyware
____ is information gathered by monitoring a consumer’s online activity
Click-stream data
____ uses business rules tied to customer-supplied preferences or online behavior to determine the most appropriate page views and product information to display when a user visits a Web site.
Rules-based personalized software
A screening technology called ____ helps shield users from sites that do not provide the level of privacy protection they desire.
Platform for Privacy Preferences
The ____ protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees.
Fourth Amendment
In order to avoid Fourth Amendment issues with the use of advanced surveillance technology to track people in public places, advocates of such technology argue that people ____.
have no legitimate expectation of privacy in public