1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
7

The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a

nticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information. What is this rule called
Computers and Technology
2 answers:
ValentinkaMS [17]4 years ago
7 0

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

ryzh [129]4 years ago
4 0

Answer:

THE SAFEGUARDS RULE.

Explanation:

The Safeguards Rule requires financial institutions under FTC (financial trade commission) jurisdiction to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the rule are responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care.

The rule requires financial institutions to develop, implement, and maintain a comprehensive information security program. The implementations made by financial institutions protect against threats and unauthorized access or use of customer informations.

Therefore, the rule in Gramm-Leach-Bliley Act that ensures security and confidentiality of customer information, protects against anticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information is called THE SAFEGUARDS RULE.

You might be interested in
Just a smol question how do i change my username on this?
strojnjashka [21]

Answer:

If you want to change your username, you have to contact them and tell them that you want to change. That is the only way.

Explanation:

7 0
3 years ago
Read 2 more answers
List three things that scientists learned about earth beginning in the 1800s
Nataly [62]
They learned the earth was much older than they had previously thought.
Gradual processes changed the earth's surface.
Fossils could tell the age they came from.
8 0
4 years ago
1. You are the network manager for a computer training center that allows students to bring their own laptops to class for learn
Eduardwww [97]

Answer:

The lease duration for student computers .

Explanation:

The computer training center network manager which give permission to students to get his separate laptop to both the training and note-taking classes. Students require an internet connection because they have installed the DHCP server in their network to instantly give IP's.  

So, The length of the lease for student computers which should be changed to ensure that they do not waste addresses used by learners who left for that day.

4 0
3 years ago
Write a script called fact.sh that is located in your workspace directory to calculate the factorial of a number n; where n is a
ira [324]

Answer:

hope this helps

Explanation:

7 0
3 years ago
Wireless internet is an example of telecommunications.
lawyer [7]
Anything is telecommunication if it has a <span>transmitter</span> and receiver. If you're a Host, then you're hosting (Transmitting) a connection. If you have a router as a customer or service, then you're receiving their signal (transmitting). You're the receiver. 
7 0
3 years ago
Other questions:
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • What is the most effective way to demonstrate being prepared for an interview?
    8·2 answers
  • True or false? any webb app can be accessed and run on any computing
    12·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • Which statement regarding killers is true?
    12·2 answers
  • To remove any hidden data from your document before sharing it you should:
    8·2 answers
  • Major characteristics of the bus in computer architecture​
    8·1 answer
  • Which of the following devices can be connected to a network? Check all of the boxes that apply.
    9·1 answer
  • When it comes to game mechanics, what is the most universal mechanic that is present in virtually every computer game that you c
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!