1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
15

As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w

ere working for a company in IT, and had the ability to access every employee's personal data, and one of your best friends asks you for the phone number and address of one of the girls that works with you - would you give that friend the information? Why or why not?
Computers and Technology
1 answer:
Travka [436]3 years ago
4 0

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

You might be interested in
Compare the two types of formatting that IDE devices must go through. What is the primary difference between the two?
Andrei [34K]
A quick format<span> changes the file system while the </span>full format<span> also checks the </span>drive for bad sectors.  <span>The scan for bad sectors is the reason why the Full </span>format<span> takes twice as long as the </span>Quick format<span>. If you choose the </span>Quick format<span> option, the </span>format<span> removes address files from the partition, but does not scan the disk for bad sectors.</span>
7 0
3 years ago
Read 2 more answers
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
2 years ago
Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an
Goshia [24]

Answer:

Privacy Policy

Explanation:

A privacy policy is a written a document which  tells visitors to company's website what information will be collected and what the information will be used for. Simply put, it is a short statement of what you are doing to observe visitors to your website through use of cookies and other third parties like google ads.

5 0
3 years ago
Data collection begins only after completing the research design process. after determining whether there are any objections. wh
Ivahew [28]

Answer:

Data collection begins only

after completing the research design process.

Explanation:

The nature of the research problem and design process provides the basis for data collection.  Data collection can be carried out from primary or secondary sources or both.  The collection system will indicate if the research is exploratory, descriptive, or conclusive.  Data collection provides an important way to understand the characteristics of the research interest.  A clear definition of the research interest is provided by a correct research question, which also provides focus and direction for the study.

8 0
3 years ago
Applying a bug fix:
viktelen [127]
Applying a bug fix: software update (patch)

Addressing a security flaw: software update (patch)

Improve ease of use: Software Update (new version)

Adding features: Software Update (new version)

This is what I believe the answer is! Hope this helped!
7 0
2 years ago
Read 2 more answers
Other questions:
  • How do the search methods differ for primary and secondary data?
    10·2 answers
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • A "start transaction" is set to be the system's first screen displayed once you log in to GCSS-Army. Setting up a start transact
    14·1 answer
  • What are Manuscript signs​
    8·1 answer
  • Could you give me Aidan Gallagher's wuasp number​
    5·2 answers
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    13·2 answers
  • Lol fortnite really going UwU and anime
    12·2 answers
  • ____ the most popular word processing applications software<br><br>​
    12·1 answer
  • Which code snippet could be used to print the following series?
    6·1 answer
  • Hi. I'm a beginner in python. Can anyone tell me what I'm missing or doing wrong, because I can't figure out why my messages in
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!