Established rules on how consumers and their information should be handled during an e-commerce transaction is called ___.
CONSUMER RIGHTS
The laws that set expectations on how your personal information should be protected and limits place on how the data should be shared is called ___.
DATA PRIVACY
___ is defined as 1. Information that supports a conclusion or 2. Material presented to a regulator to show compliance.
EVIDENCE
A formal process to identify threats, potential attacks, and impacts to an an organization is called ___.
INFORMATION SECURITY RISK ASSESSMENT
A framework that contains a comprehensive list of concepts, practices, and processes for managing IT services is called ___.
INFORMATION TECHNOLOGY AND INFRASTRUCTURE LIBRARY (ITIL)
Software that blocks access to specific sites on the Internet is called ___.
INTERNET FILTERS
The practice of agreeing to use of personal information beyond its original purpose is called ___.
OPT-IN
The practice of declining persuasion to use personal information beyond its original purpose is called ___.
OPT-OUT
A worldwide information security standard that describes how to protect credit card information is called ___.
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
In e-commerce, broadly deals with how personal information is handled and what it is used for is called ___.
PERSONAL PRIVACY
A formal process to identify threats, potential attacks, and impacts to an organization is called ___.
RISK ASSESSMENT
When related to compliance, it’s the mapping of regulatory requirements to policies and controls is called ___.
SECURITY CONTROL MAPPING
A person who buys stock in a company (investor) is called ___.
SHAREHOLDER
A widely accepted auditing standard created by the American Institute of Certified Public Accountants and examines an organizations control environment is called ___.
STATEMENT ON AUDITING STANDARD 70 (SAS 70)
FALSE
Shareholder value
Regulations
Technology vulnerabilities and limitations
All the above
HIPAA
GLBA
FERPA
All the above
Maintain an information security policy
Protect cardholder data
1 & 2 only
Control environment
FALSE
CIPA
TRUE
FALSE
A SAS 70 Type II audit