Fill This Form To Receive Instant Help
Homework answers / question archive / FPT University BUE 201 CHAPTER 7 1)Two general and connected understandings of privacy have been identified
FPT University
BUE 201
CHAPTER 7
1)Two general and connected understandings of privacy have been identified. Privacy as a right to be ‘let alone' within a personal zone, and privacy as the:
A. right to understand one's emotions.
B. fundamental duty of every citizen.
C. right to control information about others. D. right to control information about oneself.
2. Values that are fundamental across culture are called:
a. authentic norms. B. hypernorms.
C. global norms.
D. executive norms.
3. According to Donaldson and Dunfee, examples of hypernorms include:
a. right to a safe workplace.
b. right to public information. C. right to personal freedom.
D. right to vote.
4. Privacy can be legally protected by all of the following except:
a. the constitution.
b. affirmative action.
c. federal and/or state statutes.
d. common law.
5. refers to the body of law comprised of the decisions handed down by courts, rather than specified in any particular statutes or regulations.
a. Statutory law B. Common law
C. Civil law
D. Constitutional law
6. The Constitution's Fourth Amendment protection against an unreasonable search and seizure governs only the public sector workplace because:
a. unions exist only in private sector organizations.
b. the private organization does not cater to appeals of unreasonable search or seizure. C. the Constitution applies only to state action.
D. it is illegal by common law to trespass on private property.
E. The Constitution's Fourth Amendment protection against an unreasonable search and seizure governs only the public sector workplace because the Constitution applies only to state action.
7. Which of the following prohibits the "interception" or unauthorized access of stored communications?
a. Electronic Communications Privacy Act of 1986
b. Computer Security Act of 1987
c. Privacy Act of 1974
d. Computer Fraud and Abuse Act of 1986
8. The impact of the ECPA is to punish electronic monitoring only by third parties and not by employers because courts have ruled that "interception" applies only:
a. to messages that have actually reached company computers.
b. when monitoring is done without consent.
c. when employees file a case. D. to messages in transit.
9. Identify the correct statement about Electronic Communications Privacy Act of 1986 (ECPA).
a. Courts have ruled that the "interception" of stored communications applies only to messages that have actually reached company computers.
b. A firm that secures employee consent to monitoring at the time of hire is immune from ECPA liability.
c. The impact of the ECPA is to punish electronic monitoring only by employers.
d. The ECPA does not allow interception even when consent has been granted.
10. This legal violation occurs when someone intentionally interferes on the private affairs of another when the interference would be "highly offensive to a reasonable person."
a. Calumny
b. Vilification
c. Intrusion into seclusion
d. Defamation
11. If the basis for finding an invasion of privacy is often the employee's legitimate and reasonable expectation of privacy, then a situation where there is no real expectation of privacy occurs when the:
a. employee has actual notice.
b. employer is covered under the ECPA.
c. work requires transference of sensitive data.
d. employee belongs to a minority group.
12. Which of the following states in the U.S. is the only one that requires employers to notify workers when they are being monitored?
a. Ohio
b. Illinois
c. Michigan D. Connecticut
13. Why did the U.S. Department of Commerce negotiate a ‘Safe Harbor exception?'
a. U.S. needed to qualify as having adequate protection as per the EU directive on personal data protection.
b. Because it's naval fleet is the best in the world.
c. U.S. wanted to collaborate with EU's free market profits.
d. The law required that all imports to the European Union meet the Safe Harbor standards.
14. Google scans user e-mail in order to target advertisements based on the contents. If one's personal information on e-mails is respected as property, it can be said that:
a. firms that store external information also have the right to monitor them.
b. users are aware that personalized advertisements are possible only through scanning.
c. Google can use individual property rights because it stores all the e-mails. D. Google uses individual property rights without consent.
15. According to economist Antonio Argandona, identify the element that would include issues relating to company secrets, espionage, and intelligence gathering?
a. Truthfulness and accuracy
b. Respect for property and safety rights C. Respect for privacy
D. Accountability
16. (p. 351-352) Identify the incorrect statement about technology and its usage.
a. It allows access to information that was never before possible.
b. It allows one to work from almost anywhere on this planet.
c. Facelessness that results from its usage is a challenge. D. It allows us to be careful with our communications.
17. When we do not get to know someone because we do not have to see that person in order to do our business, we often do not take into account the impact of our decisions on him or her. This is the challenge posed by:
a. the facelessness that results from the use of new technology accessible in the workplace.
b. the knowledge gap that exists between people who do understand the technology and others do not understand it.
c. lack of knowledge about how technology really works.
d. the assumption by users of technology that the Internet is safe.
18. The definition of ‘should have known' expanding to include an expectation of monitoring is attributed to businesses:
a. protecting proprietary information and guarding against thefts.
b. protecting their investment in equipment and bandwidth. C. protecting against legal liability.
D. administering workplace benefits.
19. From a utilitarian perspective, individual rights to privacy or right to control information about oneself may be outweighed by in cases where:
a. public safety is at risk.
b. the employee compensation package is very high.
c. the proposed benefit to the employer is high.
d. productivity of employees directly depends on the number of hours they put in.
20. Which of the following stipulates that employers cannot use "protected health information" in making employment decisions without prior consent?
a. Personal Information Protection and Electronic Documents Act
b. Federal Information Security Management Act
c. Personal Information and Health Documents Act D. Health Insurance Portability and Accountability Act
21. Identify the correct statement about The Genetic Information Non-Discrimination Act of 2009 (GINA).
a. Under GINA, an employer can collect genetic information in order to monitor the biological effects of toxic substances in the workplace.
b. GINA mandates that employers be extremely careful because they are subject to similar conditions to the Health Insurance Portability and Accountability Act (HIPAA).
c. Under GINA, an employer cannot collect genetic information in order to comply with the Family Medical Leave Act.
d. Under GINA, an employer cannot release genetic information about an employee to a public health agency.
22. Identify a situation prohibited by The Genetic Information Non-Discrimination Act of 2009 (GINA).
a. An employer releases genetic information about an employee in response to a court order.
b. An employer releases genetic information about an employee in connection with the employee's compliance to the certification provisions of the Family and Medical Leave Act.
c. An employer releases genetic information about an employee to a health researcher. D. An employer releases genetic information about an employee to a government official investigating the accounting practices of the company.
23. Which of the following statements is true about monitoring?
a. It reduces workers' right to control their environment without reducing the level of worker autonomy and respect.
b. It has the potential to cause physical disorders such as carpal tunnel syndrome.
c. It does not have a negative impact on performance.
d. It can lead to mental pressures, but health problems have not been reported.
24. Employees will be on their best behavior during calls if they know that those calls are being monitored. Identify this effect of employee monitoring.
a. Placebo effect
b. Observer-expectancy effect C. Hawthorne effect
D. Halo effect
25. An employer can resolve the "Hawthorne Effect" through:
a. notified, random monitoring.
b. consented, selective monitoring.
c. selective, notified monitoring. D. random, anonymous monitoring.
26. Ann Svendsen, director of the Center for Innovation in Management, has ascertained that in the bigger picture, appears to minimize shareholder risk, enhance reputation, and deepen brand loyalty.
a. Employee Stock Option Plan
b. monitoring
c. higher salaries D. social capital
27. If an employee's weight is evidence of or results from a disability, the employer must explore whether the worker is otherwise qualified for the position. Under the American with Disabilities Act (ADA), the individual is considered "otherwise qualified" if she or he:
a. has prior work experience of the position, even if they are not able to perform the functions of the position due to the disability.
b. can perform the normal daily activities like taking a bath, eating etc.
c. can perform the functions of the position with or without reasonable accommodations.
d. has a good academic record and good conduct.
28. Some companies have a(n) policy under which an employer refuses to hire or terminates a worker on the basis of the spouse's working at the same firm.
a. anti-nepotism
b. conflict-of-interest
c. anti-fraternization
d. antitrust
29. Identify the policy under which employer refuses to hire or terminates a worker whose spouse works at a competing firm.
a. Anti-nepotism policy
b. Antitrust policy
c. Synopsis policy
d. Conflict-of-interest policy
30. Most statutes or common law decisions, provide for employer defenses for all of the following except:
a. those rules that are reasonable and rationally related to the employment activities of a particular employee.
b. those rules that treats one group differently from another considering lifestyle practices.
c. those rules that are necessary to avoid a conflict of interest or the appearance of conflict of interest.
d. those rules that constitute a ‘bona fide occupational requirement.'
31. Identify the act that expanded states' rights with regard to Internet surveillance technology, including workplace surveillance, and amended the Electronic Communications Privacy Act. A. USA PATRIOT Act
B. Sarbanes-Oxley Act
C. Federal Information Security Management Act
D. Personal Information Protection and Electronic Documents Act
32. Which of the following act grants access to sensitive data with only a court order rather than a judicial warrant and imposes or enhances civil and criminal penalties for knowingly or intentionally aiding terrorists?
a. Federal Information Security Management Act
b. Sarbanes-Oxley Act C. USA PATRIOT Act
D. Personal Information Protection and Electronic Documents Act
33. Title II of the USA PATRIOT Act provides roving surveillance authority under the:
a. Federal Information Security Management Act to track website access of individuals. B. Foreign Intelligence Surveillance Act to track individuals.
C. Electronic Communications Surveillance Act to track business transactions.
D. International Surveillance of Terrorists Act to track individuals in countries with diplomatic relations.