Which entities must comply with the Telemarketing Sales Rule?
Which entities must comply with the Telemarketing Sales Rule?A . For-profit organizations and for-profit telefunders regarding charitable solicitationsB . Nonprofit organizations calling on their own behalfC . For-profit organizations calling businesses when a binding contract exists between themD . For-profit and not-for-profit organizations when selling additional services to establish customersView...
What is the most likely risk of Fitness Coach, Inc. adopting Janice’s first draft of the privacy policy?
SCENARIO Please use the following to answer the next QUESTION: Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and...
In what way does the “Red Flags Rule” under the Fair and Accurate Credit Transactions Act (FACTA) relate to the owner of a grocery store who uses a money wire service?
In what way does the “Red Flags Rule” under the Fair and Accurate Credit Transactions Act (FACTA) relate to the owner of a grocery store who uses a money wire service?A . It mandates the use of updated technology for securing credit recordsB . It requires the owner to implement...
The Video Privacy Protection Act of 1988 restricted which of the following?
The Video Privacy Protection Act of 1988 restricted which of the following? A. Which purchase records of audio visual materials may be disclosed B. When downloading of copyrighted audio visual materials is allowed C. When a user’s viewing of online video content can be monitored D. Who advertisements for videos...
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?A . Determine which bodies will be involved in adjudicationB . Decide if any enforcement actions are justifiedC . Adhere to its industry’s code of conductD . Appeal decisions made against itView AnswerAnswer: C...
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?A . 7 daysB . 10 daysC . 15 daysD . 21 daysView AnswerAnswer: B Explanation: According to the CAN-SPAM Act of 2003, a federal law that regulates commercial...
What was the original purpose of the Federal Trade Commission Act?
What was the original purpose of the Federal Trade Commission Act?A . To ensure privacy rights of U.S. citizensB . To protect consumersC . To enforce antitrust lawsD . To negotiate consent decrees with companies violating personal privacyView AnswerAnswer: C Explanation: The Federal Trade Commission Act (FTCA) was adopted in...
Which jurisdiction must courts have in order to hear a particular case?
Which jurisdiction must courts have in order to hear a particular case?A . Subject matter jurisdiction and regulatory jurisdictionB . Subject matter jurisdiction and professional jurisdictionC . Personal jurisdiction and subject matter jurisdictionD . Personal jurisdiction and professional jurisdictionView AnswerAnswer: C Explanation: In order for a court to hear a...
What is the most effective kind of training CloudHealth could have given its employees to help prevent this type of data breach?
SCENARIO Please use the following to answer the next QUESTION: You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth,...
The rules for “e-discovery” mainly prevent which of the following?
The rules for “e-discovery” mainly prevent which of the following?A . A conflict between business practice and technological safeguardsB . The loss of information due to poor data retention practicesC . The practice of employees using personal devices for workD . A breach of an organization’s data retention programView AnswerAnswer:...