100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 267 Final || Already Passed. £9.70
Add to cart

Exam (elaborations)

ITN 267 Final || Already Passed.

 6 views  0 purchase
  • Module
  • ITN 267
  • Institution
  • ITN 267

In ________________ there is a two-part test to see if notification is required. First, a breach is an unauthorized acquisition of personal information, and second, the acquisition must cause, or be likely to cause, substantial economic loss to a person. correct answers Arizona Indiana law requi...

[Show more]

Preview 2 out of 10  pages

  • December 19, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 267
  • ITN 267
avatar-seller
ITN 267 Final || Already Passed.
In ________________ there is a two-part test to see if notification is required. First, a breach is
an unauthorized acquisition of personal information, and second, the acquisition must cause, or
be likely to cause, substantial economic loss to a person. correct answers Arizona

Indiana law requires that a state agency may not disclose a person's Social Security number to
anyone. There are limited exceptions to this law. Which of the following situations is not among
those in which a SSN can be disclosed? correct answers the disclosure is required by a collection
agency

In 2002, Washington State created a data disposal law that requires an entity to take reasonable
steps to destroy records that contain health and financial data when it determines that it no longer
needs those records. Which of the following entities is specifically excluded from following this
law? correct answers the federal government

Which of the following is included in a law's legislative history? correct answers any materials
generated in the course of creating legislation; this includes committee reports, hearings, and
transcripts of debate and reports issued by legislatures

Nevada's Security of Personal Information Law requires protection of personal information in a
number of ways and applies to which of the following? correct answers data collectors

What was the first state to have a breach notification law? correct answers California

Because Congress can't usually interfere in state matters, it can't create a uniform federal law in
areas legislated by the states unless there's a compelling reason to do so. Thus, there is no
existing federal law on information security. correct answers True

After the ChoicePoint breach, 46 states, including the District of Columbia, have created breach
notification laws. Although, most states used the California law as a model, there are some
differences. Which of the following is not one of the differences? correct answers maximum
requirements for encryption

Congress can create laws in areas where the________________ allows it. correct answers U.S.
Constitution

Which of the following may be exempt from state breach notification laws because they are
already subject to other laws with specific data security requirements? correct answers Both A
and B. GLBA financial institutions and entities covered by HIPAA

The __________________ was created after a security breach at a state-operated data facility.
correct answers California Database Security Breach Notification Act

Massachusetts' "Standards for the Protection of Personal Information of Residents of the
Commonwealth" was released in September 2008 and is known for being "unique" in terms of its

, data protection standard. Which of the following statements best captures that uniqueness?
correct answers It attempts to regulate businesses outside of Massachusetts by requiring
businesses to encrypt the personal data of Massachusetts residents.

What is a legal concept that protects an entity from legal liability and is written into the law?
Entities that encrypt the personal information that they own or maintain do not have to follow the
notification requirements of this concept if they have a data breach. correct answers safe harbor

What is considered to be personal information by most states? correct answers Both A and B.
Social Security numbers and account numbers

Which of the following conditions is not taken under consideration by Congress when
determining if an area is ripe for federal legislation? correct answers what the greatest economic
advantage will be to the national market as it relates to the area under consideration

Which of the follow does not count as personal information, as designated by California's
Database Security Breach Notification Act? correct answers student ID

Which of the following statements best captures the difference between civil law and criminal
law? correct answers In civil law, a defendant isn't sent to jail as a punishment. Instead, civil law
imposes fines.

The purpose of the ______________________ was to give state residents timely information
about a breach so that they can protect themselves. correct answers California Database Security
Breach Notification Act

In 2007 Minnesota created the Plastic Card Security Act, which is the first state law that
attempted to codify certain parts of the PCI DSS. It forbids businesses from storing cardholder
information for more than 48 hours after the credit card transaction is approved. Which of the
following lists of information can't be stored? correct answers card verification number, PIN
number, and contents of the card magnetic stripe

Which of the following statements summarizes why a breach notification is hard for entities?
correct answers States have different laws about what constitutes a breach.

_____________ are used to protect words, logos, and symbols that identify a product or services.
correct answers trademarks

In 1998, Congress passed the _________________________.This law helps protect copyrights
in the multimedia world. It also contains provisions that help insulate Internet service providers
from the actions of their customers. correct answers Digital Millennium Copyright Act

A ______________ protects the formulas, processes, methods, and information that give a
business a competitive edge. correct answers trade secret

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £9.70. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£9.70
  • (0)
Add to cart
Added