CHAPTER 5 Flashcards
(26 cards)
………………refers to activities that gather personal information
Information collection
………………….refers to activities that store, manipulate, and use personal in-
formation that has been collected
Information processing
……………. refers to activities that spread personal information
Information dissemination
……………….refers to activities that intrude upon a person’s daily life, interrupt a person’s
solitude, or interfere with someone’s decision making.
Invasion
T/F An employer may not require or even request a job applicant
or employee to take a lie detector test, and an employee who
refuses to take a lie detector test cannot suffer any retaliation
T
……………..Prohibits most private employers from using lie detector tests under most situations.
The Employee Polygraph Protection Act of 1988 (EPPA)
Note : Children’s Online Privacy Protection Act
It is designed to reduce the amount of information gathered
from children using the Internet
According to COPPA, online services must obtain parental
consent before collecting any information from children 12
years old and younger.
…………..is supposed to
keep confidential the information it collects.
Census Bureau
T/F However, in times of national emergency, the Census Bureau has revealed its information to other agencies
T
T/F Your income tax form may reveal a tremendous amount of
personal information about your income, your assets, the
organizations to which you give charitable contributions, your medical expenses, and much more.
T
T/F Federal Administration Aviation rules
require that drones used by the police
weigh no more than 25 pounds, fly no
higher than 400 feet, and be flown
during daylight within view of the
operator.
T
………….. refers to the interception of a telephone
conversation.
Wiretapping
………… is a hidden microphone used for surveillance
bug
T/F Citizens should also be protected from all electronic surveillance
conducted without warrants, including bugs
T
The September 11, 2001, attacks on the World Trade Center and the Pentagon spawned new, secret intelligence-gathering operations:
NSA WIRETAPPING
TALON DATABASE
…………….This act allows the US government to wiretap communications beginning or ending in a foreign country without oversight by the FISA Court.
Foreign Intelligence Surveillance Act
………………allows police to attach two kinds of surveil- lance devices to a suspect’s phone line.
If the suspect makes a phone call, a pen register displays the
number being dialed.
If the suspect gets a phone call, a trap-and-trace device
displays the caller’s phone number
Electronic Communications Privacy Act(ECPA)
Under this law, the government does not need a search warrant to obtain from an Internet ser- vice provider email messages more than 180 days old.
In other words, when a computer user allows an Internet service provider to store his or her email messages, the user is giving up the expectation of privacy of that information
Stored Communications Act
Code of Fair Information Practices: 5 things
- There must be no personal data record-keeping
systems whose very existence is secret. - There must be a way for a person to find out what
information about the person is in a record and how it is
used. - There must be a way for a person to prevent
information about the person that was obtained for one
purpose from being used or made available for other
purposes without the person’s consent. - There must be a way for a person to correct or amend
a record of identifiable information about the person. - Any organization creating, maintaining, using, or
disseminating records of identifiable personal data must
assure the reliability of the data for their intended use and
must take precautions to prevent misuses of the data.
T/F To identify taxpayers who have paid less in taxes than they
owe, the Internal Revenue Service (IRS) uses computer
matching and data-mining strategies.
T
……………is a computerized system
that analyzes 911 calls, visits to the emergency room,
school absenteeism, purchases of prescription drugs, and Internet searches to find patterns that might indicate the onset of an epidemic, an environmental problem leading to
illnesses, or bioterrorism.
syndromic surveillance system
…………. is the use of data mining to deploy police
officers to areas where crimes are more likely to occur.
Predictive policing
…………provides students 18 years of age and older the right to review their educational records and to request changes to records that contain erroneous information.
Students also have the right to prevent information in these
records from being released without their permission,
except under certain circumstances.
For students under the age of 18, these rights are held by
their parents or guardians.
Family Education Rights and Privacy Act (FERPA)
T/F According to this law, video providers (including providers
of online videos) cannot disclose rental records without the
written consent of the customer.
T