1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
7

The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a

nticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information. What is this rule called
Computers and Technology
2 answers:
ValentinkaMS [17]3 years ago
7 0

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

ryzh [129]3 years ago
4 0

Answer:

THE SAFEGUARDS RULE.

Explanation:

The Safeguards Rule requires financial institutions under FTC (financial trade commission) jurisdiction to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the rule are responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care.

The rule requires financial institutions to develop, implement, and maintain a comprehensive information security program. The implementations made by financial institutions protect against threats and unauthorized access or use of customer informations.

Therefore, the rule in Gramm-Leach-Bliley Act that ensures security and confidentiality of customer information, protects against anticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information is called THE SAFEGUARDS RULE.

You might be interested in
PLEASE HELP!!!
tino4ka555 [31]

Answer:

C or D

Explanation:

If he has previous experience, C might be better answer, otherwise, D is right.

not sure with my answer either lol

6 0
2 years ago
47. Which of these examples demonstrates good netiquette?
Masteriza [31]

Answer:

typing it, on a video detailing how boring and poorly made it is

Explanation:

this is an example of good netiquette because they are criticizing the video game and what good netiquette is is making a comment relevant to the original message. the original message being the video game

3 0
3 years ago
How to start learning c++?
ololo11 [35]
Learning C++ is one of the best languages to learn accounting to many people I know. But to learn C++, it is a good Idea to find a mentor or friends who know it to teach you, join programming clubs and read computer forums and books. Especially books because that Is actually one of the best ways to learn. I have learned this and many of my friends would also agree. But perhaps the best way I know is programming language schools or free classes. These are the ways to jump start. If you have more questions, ask me in private chats. I have some contacts/sites that you can learn from.
7 0
2 years ago
The Task Manager can be used ot track running _________________ .
Nikitich [7]

Answer:

Processes

Explanation:

The Windows Task Manager helps us track processes running on the system.

It can be invoked by pressing Ctrl+Alt+Delete and selecting the 'Task Manager' option or by right clicking on the status bar and choosing 'Task Manager' menu item. Besides the running process name it also provides supplementary information about the process such as :

  • CPU
  • Memory
  • Disk
  • Network
5 0
3 years ago
Jeff types a sentence She wore a new dress yesterday. He erroneously typed w instead of e in the word dress. What is the accurac
antoniya [11.8K]
96 i believe i'm not too certain on this one
6 0
3 years ago
Read 2 more answers
Other questions:
  • The rubric given to them by their teacher requires that
    14·1 answer
  • Clep allows students to do all of thw following except which?
    11·2 answers
  • Predictive coding software leverages .............................when experts review a subset of documents to teach the softwar
    15·1 answer
  • Should I download RAM on my computer?
    11·2 answers
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • Which of these is an example of gathering secondary data?
    15·1 answer
  • . Let F(X, Y, Z)=(X + Y + Z)(X + Y + Z)(X + Y + Z)(X + Y + Z). Use a 3-variable K-Map to find the minimized SOP form of this fun
    15·1 answer
  • Please help it’s timed
    13·1 answer
  • What does a computer use long-term memory, or ROM, for?
    13·1 answer
  • Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!