Reading 5 Flashcards

(10 cards)

1
Q

Q1: Who wrote that every violation of a “privacy right” is also a violation of another right?
* Stanley Benn
* Louis Brandeis
* Judith Jarvis Thomson
* Morton Levine

A

Judith Jarvis Thomson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2: Who wrote an influential paper in the 1890s urging that privacy rights be enacted into law?
* Warren and Brandeis
* Benn and Brandeis
* Benn and Thomson
* Levine and Benn

A

Warren and Brandeis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q4: A public record contains information about an incident or action reported to a government agency for the purpose of:
* Enhancing public safety.
* Informing the public.
* Protecting the innocent.
* Regulating the economy.

A

Informing the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3: Most commentators cite the benefits of privacy as a reason why people ought to have some privacy rights. A right that benefits society is called a:
* Constitutional right.
* Prudential right.
* Natural right.
* Social right.

A

Prudential right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q5: An example of a public record is:
* A record of a criminal conviction.
* A marriage license.
* A birth certificate.
* All of the above.

A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q7: When information collected for one purpose is put to another purpose, that is called a:
* Backdoor exploit.
* Secondary use of the data.
* Collaborative filter.
* Data leveraging opportunity.

A

Secondary use of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q9: The practice of mailing advertisements only to the most likely prospects is called:
* Targeted direct mail.
* Mail list trimming.
* Focused mailing.
* Predatory mailing.

A

Targeted direct mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6: Flash cookies are controversial, in part, because:
* They are commonly used by identify thieves to steal credit card numbers.
* They are not controlled by the privacy controls of most web browsers.
* They consume huge amounts of hard disk space.
* All of the above.

A

They are not controlled by the privacy controls of most web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q8: A policy that requires the consumer to explicitly give permission before an organization can share information with another organization is called:
* Fair use.
* Full disclosure.
* Nondisclosure.
* Opt-in.

A

Opt-in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q10: The OnStar system allows:
* An OnStar representative to disable the gas pedal of the vehicle without the driver’s permission.
* The vehicle to automatically send a message to an OnStar representative after an accident.
* A vehicle owner to initiate a conversation with an OnStar representative.
* All of the above.

A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly