Question 10 / 2 points
Which of these laws sets standards for collective bargaining?
Question options:
The Occupational Safety and Health Act (OSHA)
The National Labor Relations Act (NLRA)
The Fair Credit Reporting Act (FCRA)
The
Fair Labor Standards Act
(FLSA)
View FeedbackQuestion 22 / 2 points
Defamation can be claimed if an employer
Question options:
Reading a private email sent by an employee to an outside individual.
Discloses correct and relevant information about an employee while giving a reference.
Conducts surveillance in employee restrooms and break rooms to track abuse of the facilities.
Discloses factually incorrect information when providing a reference for an employee.
View FeedbackQuestion 32 / 2 points
The employer-employee relationship is governed primarily by what type of law?
Question options:
Contract Law
Criminal Law
Administrative Law
Common Law
View FeedbackQuestion 42 / 2 points
Which federal organizations oversee telemarketing?
Question options:
FTC
and DoT
FTC and
OMB
FTC and
FCC
FCC and OMB
View FeedbackQuestion 52 / 2 points
Which of the following is an example of the FTC’s Telemarketing Sales Rule (
TSR
)?
Question options:
Customer Proprietary Network Information (CPNI)
Junk Fax Prevention Act
The U.S. National DNC Registry
Controlling the Assault of Non-Solicited Pornography and Marketing (
CAN-SPAM
) Act
View FeedbackQuestion 62 / 2 points
What entity primarily enforces the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003?
Question options:OMBFTC
DOT
FCCView FeedbackQuestion 70 / 2 points
Which of the following are examples of
IoT
devices?
Question options:
Tablets and Smart Thermostats
Connected Cars and Smart Cities
Wearables and Computers
Smartphones and Smart Homes
View FeedbackQuestion 82 / 2 points
What technology principle, commonly referred to as a “law” is understood to say that computing power doubles every 18 months?
Question options:
Fair Information Privacy Practices
Asimov’s Law of Robotics
Law of
Big Data
Moore’s Law
View FeedbackQuestion 92 / 2 points
Which of the following CISA provisions state “Sharing information with federal government does not waive privilege”?
Question options:
A company is authorized to monitor and operate defensive measures on its own information system or, with written authorization, another party’s system for cybersecurity purposes.
A company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and that the company is aware at the time relates to a specific individual.
Does not waive privileges, such as attorney-client privilege. Importantly, there is no similar provision for sharing with state and local governments or other companies.
A company is authorized to share with the federal government, state and local governments, and other companies and private entities cyber threat indicators and defensive measures for a cybersecurity purpose or to receive such information from these entities.
View FeedbackQuestion 100 / 2 points
What privacy related information is OSHA required by law to disclose?
Question options:
Routinely required to produce emails, documents and other company records containing substantial personal information.
Compilation and reporting of information about certain workplace injuries and illnesses.
Serious adverse events, product problems or medication errors suspected to be associated with the use of regulated drug, biologic, device or dietary supplement.
Protected health information.
View FeedbackQuestion 110 / 2 points
Which law has been important to the last century of Fourth Amendment jurisprudence?
Question options:
Telephone Wiretap Law
Communications Assistance to Law Enforcement Act
Stored Communications Act
Electronic Communications Privacy Act
View FeedbackQuestion 120 / 4 points
There are three emerging areas associated with technologies to monitor employees. Which of the following is one of those emerging areas?
Question options:
How companies ban the use of social media.
How companies implement technology loss prevention programs.
How companies cope with BYOD.
How companies cope with employee misconduct.
View FeedbackQuestion 130 / 4 points
HIPAA, COBRA, ERISA, and FLMA are examples of what?
Question options:
Laws Protecting Employee Privacy
Laws Establishing Fair Pay
Laws Regulating Employee Background Checks
Laws Regulating Workplace Safety
View FeedbackQuestion 140 / 4 points
These two statements are reasons for what? 1) Limit liability for unlicensed transmission of copyrighted material and other confidential company information and 2) Protect trade secrets
Question options:
BYOD Monitoring
Monitoring in the Workplace
Social Media Monitoring
Lifestyle Monitoring
View FeedbackQuestion 150 / 4 points
E-discovery implicates both domestic privacy concerns and issues arising in transborder data flows. Electronically stored information (ESI) takes not only obvious forms such as email or word processing documents, but can also manifest itself as databases, web pages, server logs, instant messaging transcripts, voicemail systems, social networking records, thumb drives or even the microSD cards found in smartphones. Managing e-discovery and privacy begins with a well-managed what?
Question options:
Cyber threat indicators.
Transborder data flows.
Database Design.
Data retention program.
View FeedbackQuestion 160 / 4 points
The
Cybersecurity Information Sharing Act
(CISA) became law in 2015. The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out. Which CISA provisions is this statement? “For sharing to qualify for protections under CISA, the company’s actions must be done in accordance with certain requirements. For example, a company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and relates to a specific individual.”
Question options:
Authorization for a company to share or receive cyber threat indicators or defensive measures.
Sharing information with federal government does not waive privileges.
Prohibition on government using shared information to regulate or take enforcement actions against lawful activities.
Requirement for company to remove personal information before sharing.
View FeedbackQuestion 174 / 4 points
Which of the following provides an extra layer of protection for members of the media and media organizations from government searches or seizures in the course of a criminal investigation?
Question options:Communications Assistance to Law Enforcement ActCybersecurity Information Sharing ActElectronic Communications Privacy Act
Privacy Protection Act
View FeedbackQuestion 180 / 4 points
The threat from IoT is not so much that an individual device will be compromised, but that IoT will allow an avenue for attack of a network. IoT devices should follow security and encryption best practices and IoT devices should communicate with restrictive rather than permissive protocols best practices recommended by what organization?
Question options:FCCFTC
BITAG
NHTSA
View FeedbackQuestion 190 / 4 points
In the early 1980s, individuals dealt with desktop computers. Later, people adapted to laptops and eventually smartphones. What represents a new development in the ways that individuals interact with computing devices?
Question options:
AI
Robots
Big DataIoTView FeedbackQuestion 204 / 4 points
There are many challenges related to wearable’s data that focus on users’ privacy concerns. One concern is lack of control of the data collected by wearables. Which of the following best describes this concern?
Question options:
Users are concerned that tracking data daily will make it difficult for them to get rid of documentation of actions that they would rather forget.
Users are concerned that government and organizations may use the data without their consent or knowledge.
Users are concerned that some devices sync instantaneously with social media, without providing an effective opportunity to restrict such sharing.
Users pointed out that many devices, such as smart watches, have a display that can be read by those who are near the user.
View FeedbackQuestion 210 / 4 points
Which of the following applies to anyone who advertises products or services by electronic mail directed to or originating from the United States. It also covers the transmission of commercial email messages whose primary purpose is advertising or promoting a product or service.
Question options:CAN-SPAMTSR
JFPA
TCPA
View FeedbackQuestion 224 / 4 points
The Video Privacy Protection Act of 1988 (VPPA) was passed in response to the disclosure and publication of then-Supreme Court nominee Robert Bork’s video rental records. The act applies to video tape service providers. Videotape service providers are prohibited from disclosing customer PII unless an enumerated exception applies. Which of the following is an enumerated exception?
Question options:
The disclosed PII includes only names, addresses, and subject matter descriptions.
The disclosed PII includes only the names and addresses of consumers.
The disclosed PII is made to law enforcement.
The disclosed PII is released to a family member.
View FeedbackQuestion 230 / 4 points
This statement is an example of what rule governing telemarketing calls? “If a consumer tells one division of a company not to call again, a distinct corporate division of the same company may still make calls to that consumer. If the divisions are not distinct, however, the seller may not call the consumer even to offer different goods or services.”
Question options:
Transmission of Caller ID Information
Misrepresentations and Material Omissions
Required Disclosures
Entity-Specific Suppression Lists
View FeedbackQuestion 246 / 6 points
When Red Clay performs renovations because of a medical condition or disability, the company works with health insurance companies, Medicare/Medicaid, and medical doctors to plan appropriate modifications to the home and to obtain reimbursement from insurers. This sometimes requires Red Clay to receive, process, store, and transmit Protected Health Information (PHI) generated by medical practitioners or as provided by the customer. Red Clay received a request to share the collect PHI as part of a state-wide research project into smart homes? Why can Red Clay not release this information?
Question options:
Attorney-Client Privilege
The Privacy Rule
Freedom of Information Act (FOIA)
Electronic Communication Privacy Act
View FeedbackQuestion 250 / 6 points
Red Clay’s Customer relations and Marketing departments use big data analytics applications when analyzing company data for decision making. The employees doing data analytics often have no need to see the customers’ names and full account numbers. Identifiers are not needed for many Big Data applications, so the benefits of analytics can be achieved while reducing the privacy and security risks. This is an example of which Fair Information Privacy Practice?
Question options:
Data Minimization
Collection Limitation
Use Limitation
De-identification
View FeedbackQuestion 260 / 6 points
Red Clay Renovations has uncovered an insider theft that resulted in the unauthorized disclosure of personal information about the company’s executives and senior managers that was stored in digital form in the personnel office. Outrage has ensued in the executive offices especially since the stolen and leaked information included health conditions that were on file in the company’s personnel records as part of the “in case of emergency” register. Red Clay’s CEO has decided that the company will hire a professional polygraph firm to interview all employees who had access to the data center servers where the files were stored. Which of the following laws or regulations provides guidance for the use of polygraphs in the planned employee interviews?
Question options:
Employee Polygraph Protection Act of 1988
HIPAA Security Rule
Fair Labor Standards Act
Whistleblower Protection Act
View FeedbackQuestion 270 / 6 points
Red Clay uses digital advertising, which is composed of desktop/laptop and mobile advertising, as an integral part of their marketing strategy. To avoid FTC and state attorney general enforcement actions, Red Clay voluntarily agreed to be bound by self-regulatory principles. Which of the following principles includes an important feature allowing consumers to opt-out?
Question options:
Broadband Privacy Rule
The U.S. National Do Not Call Registry
Digital Advertising Alliance
Network Advertising Initiative
View FeedbackQuestion 280 / 6 points
Red Clay Renovations needs to update its privacy policies to ensure that it is not violating federal laws about telemarketing. The team is working on the section of policy which covers when the company is allowed to use telephone calls to contact consumers. Which of the following are allowed exceptions to the Do Not Call registry?
Question options:
The consumer’s phone number was obtained using a sweepstakes entry.
The consumer’s email address and phone number were obtained from a Facebook page.
The company has an existing business relationship with the consumer.
The consumer made an inquiry about the company’s products within the past 24 months.