Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 10.5, Problem 1EGDQ
Program Plan Intro
U.S. privacy law:
The U.S. government maintains the individual records regarding financial institutions, bank record, and government records.
- This law is defined in the year of 1974 and it is named as “Privacy Act of 1974”. But the data given by customer to online retailer is not protected by the U.S. privacy law.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Step-By-Step Assignment Instructions
Assignment Topic:
How data breaches occur and are discovered.
Setup instructions:
Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches.
Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side.
How to submit:
Submit a summary of each data breach and answer the following questions in your response:
What was the data breach?
How was the data breach found out?
What were the threats?
What were the vulnerabilities and how did the threats interact with them?
Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach?
Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.
Identity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished.
1. List three steps an individual should take to avoid identity theft.
2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data.
3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?
Find out where your personal information has been stored. How often and from which databases can you acquire a hard copy of your information? Tell me about your fears about the protection of your information.
Chapter 10 Solutions
Using MIS (10th Edition)
Ch. 10.4 - Prob. 1NFBQCh. 10.4 - Prob. 2NFBQCh. 10.4 - Prob. 3NFBQCh. 10.4 - Prob. 4NFBQCh. 10.4 - Prob. 5NFBQCh. 10.4 - Prob. 6NFBQCh. 10.5 - Prob. 1EGDQCh. 10.5 - Prob. 2EGDQCh. 10.5 - Prob. 3EGDQCh. 10.5 - Prob. 4EGDQ
Ch. 10.5 - Prob. 5EGDQCh. 10.5 - Prob. 6EGDQCh. 10.5 - Prob. 7EGDQCh. 10.9 - Prob. 1SGDQCh. 10.9 - Prob. 2SGDQCh. 10.9 - Prob. 3SGDQCh. 10.9 - Prob. 4SGDQCh. 10.9 - Prob. 10.1ARQCh. 10.9 - Prob. 10.2ARQCh. 10.9 - Prob. 10.3ARQCh. 10.9 - Prob. 10.4ARQCh. 10.9 - Prob. 10.5ARQCh. 10.9 - Prob. 10.6ARQCh. 10.9 - Prob. 10.7ARQCh. 10.9 - Prob. 10.8ARQCh. 10.9 - Prob. 10.9ARQCh. 10 - Prob. 10.1UYKCh. 10 - Prob. 10.2UYKCh. 10 - Prob. 10.3UYKCh. 10 - Prob. 10.4CE10Ch. 10 - Prob. 10.5CE10Ch. 10 - Prob. 10.6CE10Ch. 10 - Prob. 10.7CE10Ch. 10 - Prob. 10.8CS10Ch. 10 - Prob. 10.9CS10Ch. 10 - Prob. 10.1CS10Ch. 10 - Prob. 10.11CS10Ch. 10 - Prob. 10.12CS10Ch. 10 - Prob. 10.13CS10Ch. 10 - Prob. 10.14CS10Ch. 10 - Prob. 10.15MMLCh. 10 - Prob. 10.16MML
Knowledge Booster
Similar questions
- When it comes to data, how do you define privacy? How many steps should you take to protect your private data?arrow_forwardWhat exactly does the term "privacy" imply? Is there a way to keep your personal data safe?arrow_forwardWhen it comes to data, how do you define privacy?In what ways can you ensure the safety of your private data?arrow_forward
- How would each of the security factors (confidentiality, integrity, and availability) affect your use of your bank's website?arrow_forwardIf you used your bank's website, how would confidentiality, integrity, and availability affect you?arrow_forwardMaintain vigilance with regard to any databases that could include your personal information. For how much longer will you be able to receive copies of your data records from each database, and how often will you be able to print them? What kinds of concerns do you have about your privacy while utilizing the internet?arrow_forward
- If your information is stored in a database, be sure to keep track of it. Assuming you have access to many databases, how long will it take to get a copy of your data records, and how frequently will you be able to print them? How concerned are you about your personal information being compromised while you're online?arrow_forwardOver the last three years, a security breach of personal information has resulted in some identity theft. What can you do to avoid becoming a victim of identity theft? Give a concrete example of what you're referring to.arrow_forwardIs there a precise explanation of what the noun "privacy" means? Create a list of the top five things you can do to protect the confidentiality of your personal information.arrow_forward
- Maintain vigilance with regard to any databases that could include your personal information. How long will you be able to get copies of your data records from each database, and how often will you be able to print them out? When you use the internet, what kind of concerns do you have about your privacy?arrow_forwardWhat methods are there for enhancing data privacy?arrow_forwardWhy do we have to be aware about the Data Privacy Act?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education