The Privacy Rule - Answer The HIPAA _________________ dictates how covered
entities must protect the privacy of personal health information
Trade Secrets - Answer A ______________ protects the formulas, processes, methods,
and information that give a business a competitive edge
Admissible Evidence - Answer A judge or jury can consider only _______________
evidence when deciding cases
Property Interest - Answer A legal owner of property has the right to use that property in
any way they want to, and the power to give those rights to another. This is called
_____________.
Trademark - Answer _____________ are used to protect words, logos, and symbols
that identify a product or services
HIPAA "Health Insurance Portability and Accountability Act" - Answer - Before
____________________, many workers experienced "job lock" and were afraid that
they would lose health care benefits if they changed jobs.
- ____________________was created by Congress to make health insurance portable.
- ___________________ forbids a new employer's health plan from denying health
coverage for some reasons and prohibits discrimination against workers based on
certain conditions such as pregnancy.
protected health information (PHI) - Answer PHI refers to:
Federal Rules of Evidence - Answer At the federal level, what is the name of the main
guidance regarding the submission of evidence at trial
computer forensic examiner certifications - Answer CCE, CCFE, CFCE, and GCFA are
all examples of:
COBRA benefits - Answer 18 months
California's Database Security Breach Notification Act - Answer The
__________________ was created after a security breach at a state-operated data
facility.
Federal Information Security Management Act (FISMA) - Answer Congress created the
_____________ in response to the September 11, 2001, terrorist attacks.
, FISMA "Federal Information Security Management Act " - Answer Congress created the
______________ in response to the September 11, 2001, terrorist attacks.
guilt beyond a reasonable doubt
- If a criminal case goes to trial, the government must prove the defendant's guilt
beyond a reasonable doubt. Though reasonable doubt doesn't mean that a juror is 100
percent convinced of the defendant's guilt, it does mean that a juror must be fully
satisfied that the prosecution has eliminated reasonable doubt about the defendant's
guilt. - Answer TRUE
Digital Millennium Copyright Act - Answer In 1998, Congress passed the
_________________________.This law helps protect copyrights in the multimedia
world. It also contains provisions that help insulate Internet service providers from the
actions of their customers
OMB - Answer - In May 2007, the _________________________________ required all
federal agencies to create a breach notification plan. This instruction was issued in
response to a large data breach at the Department of Veterans Affairs.
Computer Fraud and Abuse Act - Answer - In a situation where phishing attackers
attempt to steal personal information, which of the following federal acts can be used to
prosecute such a crime?
- What is the first piece of federal legislation that identified computer crimes as distinct
offenses
Intentional torts
- Intentional torts most often occur when the defendant intended to commit the tort.
Most torts involving _______________________ are intentional torts. - Answer
Computers and cyberspace
Arraignment
- Once a grand jury returns an indictment, the next step in the criminal process is the
arraignment. After this hearing, a court must inform the defendant about the charges
and advise the defendant about his or her legal and constitutional rights. - Answer
TRUE
intellectual property - Answer Patents, trademarks, and copyrights are all types of
_________________.
SOX section 302 - Answer SOX ______________ requires CEOs and CFOs to certify a
company's SEC reports