Which of the following
statements is true regarding data privacy laws?
|
No European country has a unified
data privacy law at the national level.
|
|
|
The United States has a unified data
privacy law at the national level.
|
|
|
The
Health Insurance Portability and Accountability Act (HIPAA) only protects
consumers in a single industry.
|
|
|
The Gramm-Leach-Bliley Act (GLBA)
protects consumers in all industries.
|
1.
States with no security
breach law include:
|
New York, Ohio, and Pennsylvania.
|
|
|
Alabama,
New Mexico, and South Dakota.
|
|
|
Illinois, Indiana, and Michigan.
|
|
|
California, Colorado, and Kansas.
|
1.
Mississippi’s security
breach law is:
|
Miss. Code § 23-62-31.
|
|
|
Miss. Code § 51-42-19.
|
|
|
Miss.
Code § 75-24-29.
|
|
|
Miss. Code § 82-71-13.
|
1.
Which of the following
statements is true regarding codified law?
|
A
whole section might exist simply to explain a single prior word.
|
|
|
It is not specific when it comes to
the definition of particular words.
|
|
|
Definitions for particular words are
provided in a glossary at the end of the law.
|
|
|
Definitions of particular words are
unimportant.
|
1.
The best approach to
reading codified law is to be aware of the __________ to know when you are
going deeper into a definition or rising back out of one.
|
section
|
|
|
numbering
|
|
|
previous laws
|
|
|
timeframe of the drafting of the law
|
10 points
Question
6
1.
Codified law is very
structured and organized, laid out logically in nested divisions just as:
|
a
software developer would develop “code.”
|
|
|
a surveyor would map a geographic
area.
|
|
|
an artist would paint a portrait.
|
|
|
a musician would write a musical
score.
|
1.
Each Title, Chapter, Part,
Section, Paragraph, and Clause:
|
can be considered separate laws.
|
|
|
is independent of one another.
|
|
|
can
be broken into subdivisions.
|
|
|
is complete with no subdivisions.
|
1.
Virginia law 32.1-127.1:05
provides a detailed definition of:
|
“financial information.”
|
|
|
“medical
information.”
|
|
|
“credit card information.”
|
|
|
“accounting practices.”
|
1. Delaware’s security breach law is:
|
Del.
Code tit. 6, § 12B-101 et seq.
|
|
|
Del. Code tit. 7, § 13B-102 et
seq.
|
|
|
Del. Code tit. 8, § 14B-103 et
seq.
|
|
|
Del. Code tit. 9, § 15B-101 et
seq.
|
1.
Laws are broken down into
increasingly narrow divisions starting from the top as Titles, Chapters, Parts,
Sections, Paragraphs, and down to Clauses to provide the reader with:
|
vague and evolving definitions of a
broad topic.
|
|
|
vague and evolving definitions of a
narrow topic.
|
|
|
clearer and clearer definitions of a
broad topic.
|
|
|
clearer
and clearer definitions of a narrow topic.
|
1.
The purpose of the
__________ is, according to its Web site, to provide “access to current state
and federal legislation and a comprehensive list of state documents, including
state statutes, constitutions, legislative audits, and research reports.”
|
Federal Trade Commission (FTC)
|
|
|
National
Conference of State Legislatures (NCSL)
|
|
|
The Gramm-Leach-Bliley Act (GLBA)
|
|
|
The State Documents Commission (SDC)
1.
Virginia’s law
32.1-127.1:05 was signed in:
|
|
1990.
|
|
|
2000.
|
|
|
2010.
|
|
|
2015.
|
1.
The National Conference of
State Legislatures (NCSL) Web site tracks and organizes __________ state
legislation.
|
banking and financial
|
|
|
health care
|
|
|
accounting and securities exchange
|
|
|
telecommunication
and information technology
|
1.
Arizona’s security breach
law is:
|
Ariz. Rev. Stat. § 33-6490.
|
|
|
Ariz.
Rev. Stat. § 44-7501.
|
|
|
Ariz. Rev. Stat. § 55-8612.
|
|
|
Ariz. Rev. Stat. § 66-9723.
|
1.
Currently, __________
states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have
data and security breach notification laws that define what organizations must
do if they have had data or security breached that impact citizen privacy data.
|
47
|
|
|
48
|
|
|
49
|
|
|
50
|
1.
Which of the following
statements is true?
|
Statutory law is usually written in a
narrative form.
|
|
|
Statutory law is rarely structured or
formulaic.
|
|
|
Legal text is easy to understand.
|
|
|
Legal
text is jokingly known to be challenging to read.
|
1.
Virginia has __________
breach notification law(s).
|
zero
|
|
|
one
|
|
|
two
|
|
|
three
|
1.
Which of the following
statements is true regarding what happens when a company discovers its data has
been compromised?
|
Without
an overarching federal mandate in effect, the company is not compelled to
notify all the affected individuals.
|
|
|
The GLBA requires the company to
notify the affected individuals regardless of the company’s industry.
|
|
|
HIPAA prohibits the company from
notifying the affected individuals unless the data compromise might endanger
the health of the individual.
|
|
|
Few states have enacted their own
privacy laws that would require the company to notify the affected individuals.
|
1.
Which of the following
statements is true regarding Virginia’s law 32.1-127.1:05?
|
It is identical to HIPAA.
|
|
|
It is unrelated to HIPAA.
|
|
|
It is relevant in all states to those
entities that are not already covered by HIPAA.
|
|
|
It
is relevant in the state of Virginia to those entities that are not already
covered by HIPAA.
|
1.
Virginia’s law
32.1-127.1:05 is specific to:
|
banking.
|
|
|
health
care.
|
|
|
retail.
|
|
|
publicly traded organizations.
|
1.
If you design a graphic,
slogan, or symbol for your company and its product, then you would file for
a(n):
|
trademark.
|
|
|
copyright.
|
|
|
patent.
|
|
|
exception.
|
1.
Which of the following is
an example of intellectual property?
|
Artwork
that an individual created.
|
|
|
A house that one individual
purchased from a previous owner who did not design the house.
|
|
|
Land that one individual purchased
from a previous owner.
|
|
|
A car that one individual
purchased from a previous owner who did not design the car.
1.
For more than 200 years
prior to March 2013, a patent was awarded to the:
|
|
company that produces the
invention.
|
|
|
person with the best idea for
a product or process.
|
|
|
person
who first came up with the invention.
|
|
|
person who files first for the
patent.
|
1.
The Digital Millennium Copyright
Act addresses treaties signed in 1996 at the:
|
World Intellectual Property
Organization (WIPO) Geneva conference.
|
|
|
World Music
Organization (WMO) London conference.
|
|
|
World United
Songwriters Association (WUSA) Nashville conference.
|
|
|
We Are the World
concert.
|
1.
RIAA claimed that Napster
made a(n):
|
“indirect” infringement on its
patent.
|
|
|
“direct” infringement on its
trademark.
|
|
|
“direct”
infringement on its copyright.
|
|
|
“indirect” infringement on its
copyright.
1.
Which of the following
legal terms means assisting in or inducing people to engage in infringement
activity?
|
|
Material
contribution
|
|
|
Principal use
|
|
|
Substantial use
|
|
|
Probable cause
|
1.
In December 1999, the
Recording Industry Association of America (RIAA) took legal action against
Napster for:
|
copyright infringements.
|
|
|
patent
infringements.
|
|
|
trademark
infringements.
|
|
|
identity
theft.
|
1.
If you write a song,
produce a film, sculpt a piece of art, or write a mobile phone application and
wish to protect it, then you will claim a(n):
|
trademark.
|
|
|
copyright.
|
|
|
patent.
|
|
|
exception.
|
1.
Which of the following
supported the Digital Millennium Copyright Act?
|
Librarians
|
|
|
Academics
|
|
|
Scientists
|
|
|
Software
and entertainment industries
|
1.
To help protect
intellectual property, the United States used established treaties from
__________ to extend its own copyright law in the online realm.
|
the European Union (EU)
|
|
|
the National Conference of
State Legislatures (NCSL)
|
|
|
Napster
|
|
|
the
World Intellectual Property Organization (WIPO)
|
1.
RIAA, the plaintiff,
represented __________ in its legal action against Napster.
|
Bruce Springsteen and Billy
Joel
|
|
|
the Black Keys
|
|
|
the Smashing Pumpkins
|
|
|
all
major record labels
|
1.
The primary difference
between a copyright, a trademark, and a patent is the:
|
profession of the individual
applying for intellectual property protection.
|
|
|
industry in which the
intellectual property is used.
|
|
|
type
of intellectual property being protected.
|
|
|
length of protection the
intellectual property owner desires.
|
1.
Under the Digital
Millennium Copyright Act, which of the following are protected from copyright
infringement liability for the act of transmitting information over the
Internet?
|
Libraries
|
|
|
Higher education institutions
|
|
|
Internet
service providers
|
|
|
Individuals
|
1.
The law that stopped
Napster from continuing its operations is the __________ that was enacted in
1998.
|
Napster Act (NA)
|
|
|
Digital
Millennium Copyright Act (DMCA)
|
|
|
Intellectual Property Act
(IPA)
|
|
|
Gramm-Leach-Bliley Act (GLBA)
|
1.
Since March 2013, a patent
is awarded to the:
|
company that produces the
invention.
|
|
|
person with the best idea for
a product or process.
|
|
|
person who first came up with
the invention.
|
|
|
person
who files first for the patent.
1.
The Digital Millennium
Copyright Act makes it a crime to:
|
|
crack copyright protection
devices to assess product interoperability.
|
|
|
crack copyright protection
devices for the purpose of testing security systems.
|
|
|
crack copyright protection
devices for the purpose of encryption research.
|
|
|
circumvent
antipiracy measures in commercial software.
|
|
iTunes
|
|
|
Napster
|
|
|
Soundz
|
|
|
Pandora
|
1.
If you invent a machine or
design a special process, you may wish to file for a(n):
|
trademark.
|
|
|
copyright.
|
|
|
patent.
|
|
|
exception.
|
1.
Under the Digital Millennium
Copyright Act, which of the following must pay licensing fees to record
companies?
|
Libraries
|
|
|
“Webcasters”
|
|
|
Higher education institutions
|
|
|
Nonprofit “public” radio
stations
|
1.
The result of the United
States copyright extension is now known as the:
|
Napster Act (NA).
|
|
|
Digital
Millennium Copyright Act (DMCA).
|
|
|
Intellectual Property Act
(IPA).
|
|
|
Gramm-Leach-Bliley Act (GLBA).
The courts have ruled in favor of using reverse engineering
enable interoperability
|
Thank you so much my friend. Please let us know if there's anything we can help from our side. Your service is really amazing. Thank you again
ReplyDelete