Which of the following pieces of legislation is a law that defines a person’s right to privacy regarding the information a financial organization can maintain and disseminate.
Dodd-Frank, 2010
The Home Ownership and Equity Protection Act, 2013 Revisions
Graham-Leach-Bliley
The Pension Protection Act of 2006
Graham-Leach-Bliley
TF: Any organization within the government can be held responsible if information they store about an individual is found to be incorrect.
True
There are two subsets of the Electronic Communications Privacy Act that cover stored communications. These were _____ and ______.
Electronic Communications Services and Remote Computing Services
TF: The Work Product Doctrine is a legally defined category of privileged information.
True
Under the fair credit reporting act a person can obtain a copy of their report from any of the reporting agencies – at no charge – under which of the following circumstances?
A credit report is always free.
There is always a charge for credit reports, regardless of the circumstances.
Any time the person is the victim of an adverse action taken as a result of their credit report.
If the person applies for and is granted an exemption from charges by the Federal Credit Control Agency.
Any time the person is the victim of an adverse action taken as a result of their credit report.
TF: It is a common misconception that privacy is not protected under the Constitution. In fact, it is covered under the Fourth Amendment in the third paragraph.
False
TF: The Wiretap Act originally passed as a method of controlling data moving over a network, but was subsequently revised to include telephone communications.
False
Under which circumstances may a student’s private information be released?
To any organization involved with issuing accreditation to the school.
State officials conducting legal audits of a school’s or a student’s performance.
Other officials within the school system with an academic interest in the student.
Any organization that is considering offering financial aid to the student or the student’s parents.
All of the above qualify.
All of the above qualify.
Competitive Internet Solutions provides web hosting services for a wide variety of clients. You are assigned to investigate one of those subscribers because they are suspected of ilegally distributing copyrighted information over the Internet. In order to assure the integrity of evidence what is the first thing you should do?
Collect the transaction logs.
Get a judge to issue a preservation order.
Request a search warrant for the ISP.
Get authorization from the executive management of the ISP to search their server logs.
Get a judge to issue a preservation order.
There are several different categories of privileged information. Which of the following is not an example of privileged information?
Notes taken by an investigator at the scene of an investigation
Doctor/Patient privilege
Work Product
Protected intellectual property
Notes taken by an investigator at the scene of an investigation