Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Question
Book Icon
Chapter 10.5, Problem 1EGDQ
Program Plan Intro

U.S. privacy law:

The U.S. government maintains the individual records regarding financial institutions, bank record, and government records.

  • This law is defined in the year of 1974 and it is named as “Privacy Act of 1974”. But the data given by customer to online retailer is not protected by the U.S. privacy law.

Blurred answer
Students have asked these similar questions
Hi, I need help witht the following HW..   Recent changes in privacy laws have disallowed organizations from usingSocial Security numbers to identify individuals unless certain restrictionsare satisfied. As a result, most U.S. universities cannot use SSNs as primarykeys (except for financial data). In practice, Student_id, a unique identifierassigned to every student, is likely to be used as the primary key rather thanSSN since Student_id can be used throughout the system.a. Some database designers are reluctant to use generated keys (also knownas surrogate keys) for primary keys (such as Student_id) because they areartificial. Can you propose any natural choices of keys that can be used toidentify the student record in a UNIVERSITY database?b. Suppose that you are able to guarantee uniqueness of a natural key thatincludes last name. Are you guaranteed that the last name will not changeduring the lifetime of the database? If last name can change, what solu tions can you propose for…
Is there a precise explanation of what the noun "privacy" means? Create a list of the top five things you can do to protect the confidentiality of your personal information.
INSTRUCTIONS:  Conduct some independent research using scholarly or practitioner resources that will answer the following  statements below. Exercises: 1. Describe one method of multi-factor authentication that you have experienced and discuss the pros and  cons of using multi-factor authentication. 2. What are some of the latest advances in encryption technologies? 3. What are some of the password policy you have encountered? Do you have to change passwords every  so often? What are the minimum requirements for a password? 4. How are you doing on keeping your own information secure?
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
  • Text book image
    MIS
    Computer Science
    ISBN:9781337681919
    Author:BIDGOLI
    Publisher:Cengage
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage