CHAPTER 5 Flashcards

(26 cards)

1
Q

………………refers to activities that gather personal information

A

Information collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

………………….refers to activities that store, manipulate, and use personal in-
formation that has been collected

A

Information processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

……………. refers to activities that spread personal information

A

Information dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

……………….refers to activities that intrude upon a person’s daily life, interrupt a person’s
solitude, or interfere with someone’s decision making.

A

Invasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F An employer may not require or even request a job applicant
or employee to take a lie detector test, and an employee who
refuses to take a lie detector test cannot suffer any retaliation

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

……………..Prohibits most private employers from using lie detector tests under most situations.

A

The Employee Polygraph Protection Act of 1988 (EPPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Note : Children’s Online Privacy Protection Act

A

It is designed to reduce the amount of information gathered
from children using the Internet

According to COPPA, online services must obtain parental
consent before collecting any information from children 12
years old and younger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

…………..is supposed to
keep confidential the information it collects.

A

Census Bureau

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F However, in times of national emergency, the Census Bureau has revealed its information to other agencies

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F Your income tax form may reveal a tremendous amount of
personal information about your income, your assets, the
organizations to which you give charitable contributions, your medical expenses, and much more.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F Federal Administration Aviation rules
require that drones used by the police
weigh no more than 25 pounds, fly no
higher than 400 feet, and be flown
during daylight within view of the
operator.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

………….. refers to the interception of a telephone
conversation.

A

Wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

………… is a hidden microphone used for surveillance

A

bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F Citizens should also be protected from all electronic surveillance
conducted without warrants, including bugs

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The September 11, 2001, attacks on the World Trade Center and the Pentagon spawned new, secret intelligence-gathering operations:

A

NSA WIRETAPPING
TALON DATABASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

…………….This act allows the US government to wiretap communications beginning or ending in a foreign country without oversight by the FISA Court.

A

Foreign Intelligence Surveillance Act

17
Q

………………allows police to attach two kinds of surveil- lance devices to a suspect’s phone line.

If the suspect makes a phone call, a pen register displays the

number being dialed.
If the suspect gets a phone call, a trap-and-trace device
displays the caller’s phone number

A

Electronic Communications Privacy Act(ECPA)

18
Q

Under this law, the government does not need a search warrant to obtain from an Internet ser- vice provider email messages more than 180 days old.

In other words, when a computer user allows an Internet service provider to store his or her email messages, the user is giving up the expectation of privacy of that information

A

Stored Communications Act

19
Q

Code of Fair Information Practices: 5 things

A
  1. There must be no personal data record-keeping
    systems whose very existence is secret.
  2. There must be a way for a person to find out what
    information about the person is in a record and how it is
    used.
  3. There must be a way for a person to prevent
    information about the person that was obtained for one
    purpose from being used or made available for other
    purposes without the person’s consent.
  4. There must be a way for a person to correct or amend
    a record of identifiable information about the person.
  5. Any organization creating, maintaining, using, or
    disseminating records of identifiable personal data must
    assure the reliability of the data for their intended use and
    must take precautions to prevent misuses of the data.
20
Q

T/F To identify taxpayers who have paid less in taxes than they
owe, the Internal Revenue Service (IRS) uses computer
matching and data-mining strategies.

21
Q

……………is a computerized system
that analyzes 911 calls, visits to the emergency room,
school absenteeism, purchases of prescription drugs, and Internet searches to find patterns that might indicate the onset of an epidemic, an environmental problem leading to
illnesses, or bioterrorism.

A

syndromic surveillance system

22
Q

…………. is the use of data mining to deploy police
officers to areas where crimes are more likely to occur.

A

Predictive policing

23
Q

…………provides students 18 years of age and older the right to review their educational records and to request changes to records that contain erroneous information.

Students also have the right to prevent information in these
records from being released without their permission,
except under certain circumstances.
For students under the age of 18, these rights are held by
their parents or guardians.

A

Family Education Rights and Privacy Act (FERPA)

24
Q

T/F According to this law, video providers (including providers
of online videos) cannot disclose rental records without the
written consent of the customer.

25
T/F organizations must destroy personally identifiable information about rentals within a year of the date when this information is no longer needed for the purpose for which it was collected.
T
26
The regulations attempt to limit the exchange of information among health care providers to that information necessary to care for the patient. They forbid health care providers from releasing information to life insurance companies, banks, or other businesses without specific signed authorization from the person being treated. Health care providers must provide their patients with a notice describing how they use the information they gather. Patients have the right to see their medical records and to request corrections to errors they find in those records
Health Insurance Portability and Accountability Act