1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
7

The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a

nticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information. What is this rule called
Computers and Technology
2 answers:
ValentinkaMS [17]4 years ago
7 0

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

ryzh [129]4 years ago
4 0

Answer:

THE SAFEGUARDS RULE.

Explanation:

The Safeguards Rule requires financial institutions under FTC (financial trade commission) jurisdiction to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the rule are responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care.

The rule requires financial institutions to develop, implement, and maintain a comprehensive information security program. The implementations made by financial institutions protect against threats and unauthorized access or use of customer informations.

Therefore, the rule in Gramm-Leach-Bliley Act that ensures security and confidentiality of customer information, protects against anticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information is called THE SAFEGUARDS RULE.

You might be interested in
14. Write a program that accepts or rejects applicants for admission at Fictional University. To qualify, an applicant must be a
Gala2k [10]

The required program for applicant selection written in python 3 is :

age = int(input())

grade12_avg = int(input())

ps = int(input())

cs = int(input())

def status(age, grade12_avg, ps, cs):

msg = 'sorry you are not admitted'

if (age >=16) and (grade_avg >=60):

if (ps>=65) or (cs>=50):

message = 'congratulations'

print(message)

else :

print(message)

else:

print(message)

Run through of the codeblock :

age = int(input())

grade12_avg = int(input())

ps = int(input())

cs = int(input())

# input values provided by users

.

def status(age, grade12_avg, ps, cs):

#Define a function named status

msg = 'sorry you are not admitted'

# display message for recepients

if (age >=16) and (grade_avg >=60):

#First condition ; the and keyword means both must be True

if (ps>=65) or (cs>=50):

2nd condition, or statement means only one or both can be true

message = 'congratulations'

#content of message if both conditions are met

print(message)

#Display newly defined content of message

else :

print(message)

#Display initial content of message

else:

print(message)

#Display initial content of message.

Learn more :brainly.com/question/24672775

7 0
3 years ago
PLEASE HURRY!!<br> Look at the image below
levacccp [35]
Answer is power and base

Explanation: both power and base are number variables
8 0
3 years ago
Word includes a variety of document ____ to assist you with coordinating visual elements in a document.
Bumek [7]
Layouts is probably it
4 0
3 years ago
A portable document format (PDF) requires Adobe Acrobat Reader <br> True <br> False
MA_775_DIABLO [31]
I'm pretty sure its true not 100% thoe
3 0
3 years ago
Read 2 more answers
Code a call to function aNonclassFunction passing co.
Doss [256]

Answer:

a)aNonclassFunction (co);

Explanation:

When we call a function we just have to write the name of the variable that we are passing to the function.We don't have to write any operator.

So the function call is like this:-

function_name(var_name);

In our case it is

aNonclassFunction(co);

Hence the answer is option a.

6 0
4 years ago
Other questions:
  • Find a, b, and c<br> A a=4 square root of 6 b= 8 square root of 2 ; c= 4 square root of 2
    12·1 answer
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • Elena is used to kissing her friends on both cheeks as a form of greeting in her native country. She notices that her new friend
    6·1 answer
  • ---------------is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the f
    11·1 answer
  • Give me at least five main characteristic of irrigation equipment​
    8·1 answer
  • I’m so lost. which username do i do.
    5·2 answers
  • Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram
    6·2 answers
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    13·2 answers
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • Global visibility is: Group of answer choices A visibility type where an object A has a semi-permanent reference to another obje
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!