1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
12

Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the

consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Computers and Technology
1 answer:
Tom [10]3 years ago
7 0

Answer:

Gramm-Leach-Bliley Act

Explanation:

Under the Gramm-Leach-Bliley Act, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

The law stipulates that for any consumer with a financial institution, the financial institution should make provision of a privacy notice. This privacy notice outlines in explicit details the following; what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

This was done in order to protect the consumer right and the right of the financial institution.

You might be interested in
In the center pane of the __________, the direction of each arrow indicates the direction of the TCP traffic, and the length of
7nadin3 [17]

Answer:

The answer is B (Flow Graph Analysis results)

Explanation:

Flow Graph Analysis results is a graphical representation of control flow which is process oriented, it shows all the paths through a program during its execution.

4 0
4 years ago
Complete the method, isPerfectSquare(). The method takes in a positive integer, n. It returns a boolean that is true if n is a p
ratelena [41]

Answer:

  1. public class Square {
  2.    public static boolean isPerfectSquare(int n){
  3.        int sqrt_n = (int) Math.sqrt(n);
  4.        if(sqrt_n * sqrt_n == n ){
  5.            return true;
  6.        }else{
  7.            return false;
  8.        }
  9.    }
  10. }

Explanation:

Firstly, use sqrt method from Math package to calculate the square root of input n (Line 3). Cast the result to integer and assign it to sqrt_n variable.

Next, square the sqrt_n and check if it is equal to input n (Line 4). If so, return true, if not, return false (Line 4-8).

7 0
3 years ago
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
salantis [7]
The correct answer is letter b
8 0
3 years ago
Read 2 more answers
Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
Afina-wow [57]

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

7 0
4 years ago
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a
Anna11 [10]

Answer: vulnerability

Explanation:

3 0
3 years ago
Other questions:
  • ? Assessment
    10·1 answer
  • What kind of digital certificate is typically used to ensure the authenticity of a web server to a client?
    7·1 answer
  • Help!!! Who is this? Who is it from?
    14·2 answers
  • Write a Python program where the user enters the number of elements in a list ‘n’ and those ‘n’ numbers that form the list. The
    13·1 answer
  • In a stream channel what is deposited first?
    7·1 answer
  • While saving her word-processed academic documents, Ashley includes the subject, title, and the author's name in the properties.
    7·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • Which example task should a developer use a trigger rather than a workflow rule for?
    11·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
  • What is word processing program,Give 3 types of word processing program​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!