GOF Q2 1. When a person visits a Web site, his or her IP address and the links he or she clicked on are automatically recorded. This is an example of (a) secondary use (b) invisible information gathering (c) data spillage (d) data mining 2. The Privacy Act of 1974 established rules to regulate (a) private sector databases only (b) all databases that contain personal information (c) all personal information, including surveillance data (d) Federal government databases only 3. A cookie is (a) a feature of a Web site designed to attract children (b) an illegal use of information about a customer (c) a file that a Web site stores on each visitor's computer (d) a small reward that can be redeemed on a Web site 4. If a business follows an "opt-in" policy for handling personal data, information about a customer (a) may not be released under any conditions (b) may not be released unless the customer gives permission (c) may be released unless the customer requests that the information be kept private (d) may be released for any legitimate business purpose 5. A Trap and Trace logs (a) the phone numbers dialed from a telephone (b) the phone number from which an incoming call was made (c) the key used to encrypt an e-mail message (d) the content of a cell phone conversation 6. The Communications Assistance for Law Enforcement Act (CALEA) said that (a) a key escrow system must be provided so that communications can be decrypted (with a court order) (b) agents of a foreign power may be wiretapped with authorization from a secret court (c) telecommunications equipment must be designed to allow the interception of telephone calls (with a court order) (d) e-mail should have the same degree of legal protection as telephone calls 8. Personal data, including credit histories, for over 160,000 people were stolen from ChoicePoint. What technique did the thieves use? (a) Hackers exploited a vulnerability in the server's operating system that gave them root access (b) An employee downloaded a screen saver from the Internet that had a Trojan Horse (c) A fraud ring posing as legitimate businesses set up dozens of accounts with ChoicePoint and bought the data (d) All of the above 9. Which of the following are examples of invisible information gathering? a) b) c) d) e) Satellite surveillance Caller Id Loyalty cards Cookies All of the above 10. Combining and comparing information from more than one database is called __________. 11. Using data in computer tiles to predict likely behaviors of people is called_____. 12. Which statement best characterizes the relationship of the World Wide Web (WWW) to the Internet? a. The WWW is a subset of the Internet. b. The WWW is a collection of computers on the Internet that allow transmission of distributed hypermedia documents. c. The Internet provides a network upon which the WWW protocol and programs can run. d. The WWW provides a network upon which TCP/IP is implemented. 13. A policy that requires a potential customer to self-select services they wish to subscribe to and how that information will be used is called a ______________. 14. A policy where an existing customer receives electronic communications without providing express permission is called a ________. 15. Social Security numbers are unique identifiers (true or false) 16. Which is not one of the key aspects of privacy as discussed in A Gift of Fire a. b. c. d. Freedom from intrusion Freedom to communicate with others Control of information about oneself Freedom from surveillance 17. The computer system keeps track of each access to a database, including the particular person accessing the record. This describes a. audit trail b. encryption c. data locking d. relational verification 18. What is a pen register used for? a. b. c. d. to determine what phone number is called to identify a person through motions recorded when signing his/her name it is a database used to identify people through their handwriting to record a person’s voice 19. The Fourth Amendment to the U.S. Constitution deals with a. b. c. d. 20. Freedom of Speech Discrimination Self-Incrimination Search and Seizure Give a definition according to Sara Basse of privacy.