1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
7

The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a

nticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information. What is this rule called
Computers and Technology
2 answers:
ValentinkaMS [17]4 years ago
7 0

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

ryzh [129]4 years ago
4 0

Answer:

THE SAFEGUARDS RULE.

Explanation:

The Safeguards Rule requires financial institutions under FTC (financial trade commission) jurisdiction to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the rule are responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care.

The rule requires financial institutions to develop, implement, and maintain a comprehensive information security program. The implementations made by financial institutions protect against threats and unauthorized access or use of customer informations.

Therefore, the rule in Gramm-Leach-Bliley Act that ensures security and confidentiality of customer information, protects against anticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information is called THE SAFEGUARDS RULE.

You might be interested in
Which of the following are results of technological advancements and increased automation?
vivado [14]

Answer:

increased productivity

Explanation:

sorry if i am not correct

3 0
3 years ago
Read 2 more answers
There is a concern to be had about the quality of information found on the internet.
Vlad1618 [11]
Yes there is because there are people who willingly put false, and potentially dagnerous information on the internet to make money. In recent events, "Fake news" is very popular on social media sites such as Facebook. These fake news links post shockingly fake headlines such as the death of a celebrity. People peruising their feeds will click on the fake link and either be taken to a different website, or a virus can even be gotten from the link. The people who posted the news can make money off of how many people click on their article.
4 0
4 years ago
Read 2 more answers
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Sally thought of adding a new paragraph after the
hram777 [196]

Answer:

1) press the enter key

2) start typing the new paragraph

Explanation:

did it on edg

7 0
4 years ago
Assume that name has been declared suitably for storing names (like "Amy" , "Fritz" and "Moustafa") Write some code that reads a
taurus [48]

Answer:

cin >> name;

cout << "Greetings, " << name << "!!!" << '\n';

Explanation:

6 0
4 years ago
Other questions:
  • PLEASE HELP
    12·2 answers
  • A field that will always have a unique value is
    15·2 answers
  • You will write a program that generates random drawings that can be drawn using the shape painter.
    5·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • Write a program that accepts a time as an hour and minute. Add 15 minutes to the time, and output the result. Example 1: Enter t
    11·1 answer
  • 3.
    5·1 answer
  • How do web bugs invade a person's privacy?
    7·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • In your own words discuss 4 major strength and weakness<br> of<br> computer
    13·1 answer
  • 1.Which thematic group uses technology to direct the behavior of dynamical systems, ensuring that they behave in a predictable m
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!