Questions LLC
Login
or
Sign Up
Ask a New Question
Privacy
Page 2
Questions (140)
of the following types of information, which one has the strictest rules regarding the release of information?
1 answer
asked by
Anonymous
371 views
i need ideas on why tape recording someone without their knowledge is wrong and immoral.
1 answer
asked by
kayla
318 views
Privacy is a fundamental right to control your identity and who has access to your information, is it true or false
3 answers
asked anonymously
53 views
"Drug use is information that is rightfully private and only in exceptional cases can an employer claim a right to know about
2 answers
asked by
cathyyy
496 views
Why is it important for users to review a privacy policy statement before using a website or application?
3 answers
asked by
Sam
54 views
My question is inregards to why is it that all of my questions that i've posted up here in this website and the answers that
1 answer
asked by
Kailin
1,161 views
"Drug use is information that is rightfully private and only in exceptional cases can an employer claim a right to know about
1 answer
asked by
Brianna
430 views
What is online privacy?
An unnecessary burden on social media users A way to control your physical belongings Not important for
1 answer
asked anonymously
54 views
Indicate if the following statement is true or false: It is important to consider who will view or who could potentially view my
1 answer
asked anonymously
43 views
2.
Once you remove something from the internet, no one will ever find it. True G 3. People can screen shot and edit things you
31 answers
asked by
Joe ross
65 views
Why is it important to think about what you share before you post information online? Select all the answers that apply.
The
1 answer
asked by
Tlokotsi Semela
98 views
Why is it important for users to review a privacy policy statement before using a website or application?
To understand how their
1 answer
asked anonymously
46 views
Why is it important for users to review a privacy policy statement before using a website or application?
To find out about
1 answer
asked anonymously
43 views
Which of these is an example of an irresponsible disregard for the privacy of others in digital communication?
Utilise the
1 answer
asked anonymously
29 views
Software adheres to the standards of privacy if it(1 point) Responses is independent of platforms and systems, or can be easily
1 answer
asked by
hatemaths
38 views
am i able to request for private convesations with u
1 answer
asked anonymously
15 views
How can you make sure a picture won't be shared publicly online?
A. Only share it over direct message B. Only share it with
1 answer
asked anonymously
37 views
Global privacy information security and teleworking 2022 part 2
1 answer
asked anonymously
21 views
The use of surveillance technology to observe activities people expect are private is considered an unlawful search
True or false
1 answer
asked anonymously
22 views
I'm sorry, but as an AI assistant, I don't have access to your personal and private information. Therefore, I don't store or
1 answer
asked by
I'm sorry, but as an AI assistant, I don't have ac
22 views
Heather: Please don't post you email address...This is a young person safe site, we opt to protect your identity and privacy.
1 answer
asked by
bobpursley
502 views
Which of the following defines confidentiality?
(1 point) Responses concealing private information from caregivers of minors
1 answer
asked by
:)
34 views
What withholding information from those who aren’t supposed to know called?
(1 point) Responses bullying bullying
1 answer
asked by
:)
45 views
When Corina joined a mobile app start up company last year she thought she’d be okay in the open layout of the small office
1 answer
asked anonymously
64 views
How confident are you in being able to respect the privacy of others online?
1 answer
asked anonymously
9 views
What term refers to information directly associated with the individual that reliably identifies the individual as a person to
1 answer
asked by
Me
26 views
To minimize the invasion of privacy, organizations should:
Question 15 options: not delete data even when it is not needed. not
1 answer
asked by
KO
30 views
To minimize the invasion of privacy, _____.
Question 13 options: organizations should not delete data even when it is not needed
1 answer
asked anonymously
28 views
A) When Corina joined a mobile app start-up company last year, she thought she’d be OK in the open layout of the small office,
1 answer
asked anonymously
19 views
What is an ethical concern related to computing devices and services?(1 point)
Responses predictability predictability privacy
1 answer
asked anonymously
24 views
What is an ethical concern related to computing devices and services?(1 point) Responses predictability predictability
1 answer
asked anonymously
37 views
What is an ethical concern related to computing devices and services?(1 point)
equivalency predictability privacy availability
1 answer
asked anonymously
25 views
What is an ethical concern related to computing devices and services?
1. Availability 2. Equivalency 3. Predictability 4. Privacy
1 answer
asked by
Bob
23 views
Possessions, actions, speech, and communications are all things that businesses and employees
have: (1 point) legal privacy
1 answer
asked anonymously
15 views
What is an ethical concern related to computing devices and services?
A. availability B. privacy C. predictability D. equivalency
1 answer
asked by
young_240sx
36 views
What is balanced privacy?
A. this is where privacy is highly valued, and it is expected that the government will legislate
1 answer
asked by
young_240sx
19 views
What is ignored when using social media?
A. government intervention B. privacy C. autonomy D. corporate intiatives
1 answer
asked by
young_240sx
16 views
What is the intent of social privacy?
A. limiting where the data is shared B. data flows where intended C. that government
1 answer
asked by
young_240sx
22 views
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no
1 answer
asked anonymously
21 views
Destiny is a lab tech performing a blood test on a patient. She tells the patient that she will send them an email when the
1 answer
asked anonymously
32 views
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no
1 answer
asked anonymously
29 views
by checking the box on a privacy page and company can legally use your data and information in all the ways disclosed no matter
1 answer
asked anonymously
10 views
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no
1 answer
asked anonymously
29 views
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no
1 answer
asked anonymously
17 views
Which of the two users do you think was more successful in protecting their privacy? What made them successful?
Fill in the blank
1 answer
asked anonymously
18 views
Can people track your cell phone number
1 answer
asked anonymously
17 views
How does respecting the privacy of others contribute to the responsible use of technology?
It enhances cybersecurity: By
1 answer
asked by
mxolisi
13 views
Indicate if the following statement is true or false: It is important to consider who will view or who could potentially view my
1 answer
asked anonymously
24 views
What is the principal or more visible effect of data collected on you?(1 point) Responses fingerprinting fingerprinting bubble
1 answer
asked anonymously
11 views
What can be considered the "currency" that corporations want?
a. social privacy b. consumer info c. limited privacy d. social
1 answer
asked anonymously
28 views
Pages
1
2
3
Parent Categories (35)
Computing
Computing Devices and Services
Cultural Studies
Digital Communication Ethics
Email
Ethics
Ethics and Morality
Healthcare
Information Security
Information Technology
Internet
Internet Safety
Law
Law and Ethics
Law and Regulations
Law and Rights
Law/Ethics
Laws and Regulations
Legal
Name
Online Presence
Online Safety
Personal activities
Personal Choices
Responsible Use
Rights and Responsibilities
Risks
Security
Social Issues
Social Media
Software
Technology
Theory
Work Environment
Working conditions