Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?
Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?A . They prescribe working environments that are safe and comfortable.B . They limit the amount of time a potential employee can be interviewed.C . They promote a workforce of employees...
Based on the scenario, what is the most likely way Declan’s supervisor would answer his question about the hospital’s use of a billing company?
SCENARIO Please use the following to answer the next QUESTION: Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse. Before taking this career path, Declan was vaguely familiar with the Health...
Based on Felicia’s Bring Your Own Device (BYOD) plan, the business consultant will most likely advise Felicia and Celeste to do what?
SCENARIO Please use the following to answer the next QUESTION Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security...
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?A . 7 daysB . 10 daysC . 15 daysD . 21 daysView AnswerAnswer: B Explanation: Reference: https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business
In which situation is a company operating under the assumption of implied consent?
In which situation is a company operating under the assumption of implied consent?A . An employer contacts the professional references provided on an applicant’s resumeB . An online retailer subscribes new customers to an e-mail list by defaultC . A landlord uses the information on a completed rental application to...
Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?
SCENARIO Please use the following to answer the next QUESTION Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years. One potential employer, Arnie’s Emporium, recently called to...
For what specific practice did students sue the company?
In 2014, Google was alleged to have violated the Family Educational Rights and Privacy Act (FERPA) through its Apps for Education suite of tools. For what specific practice did students sue the company?A . Scanning emails sent to and received by studentsB . Making student education records publicly availableC ....
Which was NOT one of these principles?
In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?A . Simplifying consumer choice.B . Enhancing security measures.C . Practicing Privacy by Design.D . Providing greater transparency.View AnswerAnswer: B Explanation: Reference: https://www.ftc.gov/news-events/press-releases/2012/03/ftc-issues-final-commission-report-protecting-consumer-privacy
In a case of civil litigation, what might a defendant who is being sued for distributing an employee’s private information face?
In a case of civil litigation, what might a defendant who is being sued for distributing an employee’s private information face?A . Probation.B . Criminal fines.C . An injunction.D . A jail sentence.View AnswerAnswer: C
What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?
A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data. What law did ACME violate by designing the service...