Answer:
a. People have the right to know what information about them is stored and how it is being used.
b. Personal information collected for one purpose can be used for another purpose without the person's consent.
c. There must be no personal data record-keeping systems whose very existence is secret.
d. People have the right to correct errors in the information about them.
Explanation:
All of these are part of the guidelines that are included in the Code of Fair Information Practices.
The Code of Fair Information Practices was created by the HEW (Health, Education, Welfare) Advisory Committee on Automated Data Systems established in 1972. The principles stated in this code guide the behaviour of information technology. Their main purpose is to protect the user of such systems, while granting them control over their own information.
Answer:
a. allowing employees in an organization to create policies for self-governance documents to comply with legal or regulatory requirements at the employees' discretion
Explanation:
Of the options provided, a. is the one that sticks out as non-compliant. Compliance has to do with the establishment of rules and regulations by an organisation or a government on how to operate.
Allowing employees to create self-governance documents to comply with legal or regulatory requirements at their own discretion would lead to a system of non-uniformity and people would act as they please. That would not be recommended in a system that wants to demonstrate compliance.
Explanation:
The Founders always mistrusted the power of government. They wrote the Constitution to make a strong government, but to limit its authority. One way they did this was to create a federal republic. Specific powers were given to the national government, and others remained with the states or the people. These two separate powers, the national government and the state governments, could co-exist because the national government was only given the powers specified in the Constitution. Among these were the powers to regulate trade between states, coin money, raise armies, and collect taxes. This type of political system is defined as federalism. States have their laws, but they are also subject to the laws of the federal government. This separation gives the states greater autonomy to create laws based on the will of their citizens.
Answer:
I assume you want to know what computer-based crimes are against the law and have consequences.
Explanation:
Online Identity Theft, Obtaining information concerning a person, Obtaining information for free that costs the public a fee, Encrypting or decrypting data, etc. In certain states like Alaska these are considered as a Class C felony.
(P.S. FindLaw is a good website to help with subjects like this)