Which of the following is considered a client-side IT risk?
Correct Answer:
C
What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?
Correct Answer:
D
Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?
Correct Answer:
D
Granting data subjects the right to have data corrected, amended, or deleted describes?
Correct Answer:
D
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
Correct Answer:
A