Deck 2: Privacy

Full screen (f)
exit full mode
Question
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of

A) secondary use
B) invisible information gathering
C) data spillage
D) data mining
Use Space or
up arrow
down arrow
to flip the card.
Question
The Privacy Act of 1974 established rules to regulate

A) private sector databases only
B) all databases that contain personal information
C) all personal information, including surveillance data
D) Federal government databases only
Question
A cookie is

A) a feature of a Web site designed to attract children
B) an illegal use of information about a customer
C) a file that a Web site stores on a visitor's computer
D) a small reward that can be redeemed on a Web site
Question
If a business follows an "opt-in" policy for handling personal data, information about a customer

A) may not be released under any conditions
B) may not be released unless the customer gives permission
C) may be released unless the customer requests that the information be kept private
D) may be released for any legitimate business purpose
Question
The Communications Assistance for Law Enforcement Act (CALEA) said that

A) international electronic communications must be filtered through a single hub.
B) agents of a foreign power may be wiretapped with authorization from a secret court
C) telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
D) email should have the same degree of legal protection as telephone calls
Question
Two approaches to the problem of protecting personal information are

A) the free market view and
B) the consumer protection view. How do these points of view differ on the issue of a company disclosing personal information about its customers? How do they differ on the issue of errors in the data about an individual that is distributed by a credit bureau?
Question
Briefly describe what an "opt-in"
policy is and an "opt-out"
policy is. Let's say you were filling out a survey for an online magazine. Give an example of what you'd see that would distinguish an opt-in from an opt-out policy.
Question
Consider the European Union and the United States. Which one of these cultures has historically placed a higher value upon privacy? Explain.
Question
Why did the United States try to restrict strong encryption? What effect did that attempt at restriction have on U.S. businesses?
Question
What are some "pros" and "cons" to having a national ID card that can access all of one's financial and medical information?
Question
Would the Social Security Number be good to use as a national ID for U.S. citizens? Why or why not?
Question
In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.
Question
In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
Question
The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.
Question
The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.
Question
In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to "see"
things it could not without intrusion, that is a "search"
and requires a warrant.
Question
U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
Question
Explain why the United States has historically placed less value than the European Union on the right to privacy.
Question
Describe three of the Fair Information Principles.
Question
MATCHING

-FISA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-FTC

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-FCC

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-computer matching

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-targeted marketing

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-COPPA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-data mining

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-computer profiling

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-RFID

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-CALEA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-GPS

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-encryption

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Question
MATCHING

-ECPA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Privacy
1
When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of

A) secondary use
B) invisible information gathering
C) data spillage
D) data mining
invisible information gathering
2
The Privacy Act of 1974 established rules to regulate

A) private sector databases only
B) all databases that contain personal information
C) all personal information, including surveillance data
D) Federal government databases only
Federal government databases only
3
A cookie is

A) a feature of a Web site designed to attract children
B) an illegal use of information about a customer
C) a file that a Web site stores on a visitor's computer
D) a small reward that can be redeemed on a Web site
a file that a Web site stores on a visitor's computer
4
If a business follows an "opt-in" policy for handling personal data, information about a customer

A) may not be released under any conditions
B) may not be released unless the customer gives permission
C) may be released unless the customer requests that the information be kept private
D) may be released for any legitimate business purpose
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The Communications Assistance for Law Enforcement Act (CALEA) said that

A) international electronic communications must be filtered through a single hub.
B) agents of a foreign power may be wiretapped with authorization from a secret court
C) telecommunications equipment must be designed to allow the interception of telephone calls (with a court order)
D) email should have the same degree of legal protection as telephone calls
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Two approaches to the problem of protecting personal information are

A) the free market view and
B) the consumer protection view. How do these points of view differ on the issue of a company disclosing personal information about its customers? How do they differ on the issue of errors in the data about an individual that is distributed by a credit bureau?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Briefly describe what an "opt-in"
policy is and an "opt-out"
policy is. Let's say you were filling out a survey for an online magazine. Give an example of what you'd see that would distinguish an opt-in from an opt-out policy.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Consider the European Union and the United States. Which one of these cultures has historically placed a higher value upon privacy? Explain.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
Why did the United States try to restrict strong encryption? What effect did that attempt at restriction have on U.S. businesses?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
What are some "pros" and "cons" to having a national ID card that can access all of one's financial and medical information?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Would the Social Security Number be good to use as a national ID for U.S. citizens? Why or why not?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
In Olmsted v. United States (1928), the U.S. Supreme Court interpreted the Fourth Amendment to apply only to physical intrusion.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
In Katz v. United States (1967), the U.S. Supreme Court determined that the government needs a court order to intrude where a reasonable person has a reasonable expectation of privacy.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
The Omnibus Crime Control and Safe Streets (1968) explicitly allowed wiretapping and electronic surveillance by law enforcement agencies with a warrant.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
The USA PATRIOT Act (2001) gives individuals more protection from governmental intrusion.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
In Kyllo v. United States (2001), the U.S. Supreme Court ruled that when the government uses a device that's not in use by the general public to "see"
things it could not without intrusion, that is a "search"
and requires a warrant.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
U.S. v. Jones (2012) was the first major case of digital technology surveillance and involved police attaching a GPS tracking device to a person's vehicle without a search warrant.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
Explain why the United States has historically placed less value than the European Union on the right to privacy.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Describe three of the Fair Information Principles.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
MATCHING

-FISA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING

-FTC

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING

-FCC

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING

-computer matching

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING

-targeted marketing

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING

-COPPA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING

-data mining

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING

-computer profiling

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING

-RFID

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING

-CALEA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING

-GPS

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING

-encryption

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING

-ECPA

A) the Act which establishes oversight rules for the NSA
B) the federal commission that regulates trade
C) the federal commission that regulates communications
D) combining and comparing information from different databases using a single identifier
E) advertising based on demographics, purchasing history, or other specific aspects of people
F) a law passed to protect children's privacy online
G) combing through large amounts of data for patterns and information
H) analyzing data to determine characteristics of people most likely to engage in a certain behavior
I) tags that use radio frequencies to communicate with devices
J) the law that requires communications companies to design equipment so that it is capable of being tapped
K) uses satellite signals and triangulation to determine location
L) a technology that transforms data into a form that is meaningless to anyone who might intercept it
M) a law which prohibits interception of email and reading of (some) stored email without a court order
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.