1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
4 years ago
13

Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina

ncial institutions deal with private information of individuals. B. Provides privacy for educational records C. protects investors from fraudulent accounting activities. D. International agreement that controls the export of encryption technologies. E. Provides data privacy for safeguarding medical information F. Provides safeguards for credit card tr
Computers and Technology
1 answer:
3241004551 [841]4 years ago
8 0

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

You might be interested in
Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri
Schach [20]

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

4 0
4 years ago
What is the difference between hardware and software?
alina1380 [7]
A Hardware is any physical device used in. You can touch hardware, but you cannot touch software. Hardware is physical, and software is virtual. (brainliest) ??
4 0
4 years ago
URL stands for Uniform Resource
Nataliya [291]
Universal Resource Locator<span>It's not on your computer. URL stands for Universal Resource Locator, and has come to mean Web address more or less. hope it works</span>
4 0
4 years ago
Read 2 more answers
Please you will get branlest for all cerect and awser first
FromTheMoon [43]

Answer:

b

Explanation:

I believe that is correct

6 0
3 years ago
Read 2 more answers
Jamie takes part in a quiz competition. she is asked to name the total number of combinations that the bits 1 and 0 will have in
dalvyx [7]
The answer is A 

I hope this help
6 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
    10·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • What is the function of the following shape? display result to user get input from user make a decision process information
    7·1 answer
  • What will you see on the next line?
    6·2 answers
  • Deb needs to add borders on the cells and around the table she has inserted into her Word document.
    11·2 answers
  • Which of the following processes demonstrates that matter is made up of minute particles? (A) Difussion (B) Capillarity (C) Dist
    15·1 answer
  • You can not give an exact size for a height for column width true or false
    14·1 answer
  • Analyze the sentence below . choose your answer on the box below write your answer in your quiz notebook
    5·1 answer
  • Regarding k-NN algorithm which of the following statements is true?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!