SlideShare a Scribd company logo
1 of 7
Download to read offline
What was the most important holding of FTC v. Wyndham?
Question 4 options:
The FTC's role is to protect consumers against anticompetitive and fraudulent business practices.
The SEC's job is to maintain fair, orderly markets and enforce investor protection laws.
Section 5 of the FTC Act provides the FTC with the authority to regulate companies' data
security practices.
Wyndham was ordered to pay $49.4 million in cash which was distributed to qualifying students
who were harmed by the deceptive ads, as well as $50.6 million in debt relief.
The Computer Fraud and Abuse Act of 1986 applies to anyone who intentionally accesses a
Federal interest computer without authorization and alters, damages, or destroys information, or
prevents authorized use of any such computer or information and thereby causes loss.
How did the 11th Circuit's opinion in the LabMD case limit the FTC's ability to regulate data
security?
Question 5 options:
FTC orders must contain more specific requirements for data security than mere reasonableness.
FTC orders can be vague and ambiguous.
FTC orders must contain reasonableness.
None of the above.
Most state laws only require notification if there is a risk of harm. However, some states,
including California, require notification of the breach of covered personal information
regardless of whether there is a risk of harm.
Question 6 options:
Will compliance with the NIST Cybersecurity Framework allow a company to avoid an
enforcement action under Section 5 of the FTC Act?
Question 7 options:
No, but compliance with the SOC2 Framework will.
Not necessarily, but the FTC has suggested that evidence of a cybersecurity program that adopts
the NIST Framework is evidence of adequate security practices.
No, but compliance with the PCI Framework will.
Yes, the NIST Cybersecurity Framework allows a company to avoid enforcement action entirely
under Section 5 of the FTC Act.
Which data categories are included in all state data breach notification laws in the United States?
(Select all that apply)
Question 8 options:
First name only.
First initial and last name in combination with; social security number, drivers license, state ID
number, or account number.
First name and last name in combination with; social security number, drivers license, state ID
number, or account number.
Last name in combination with; social security number, drivers license, state ID number, or
account number.
Do any state breach notification laws require notice of the breach of encrypted information?
Question 9 options:
No, provided that PII data was not stolen.
No, provided that the encryption key was not accessed.
Yes, regardless of if the encryption key was accessed.
Yes, regardless of if PII data was stolen.
Some states only require notification as expediently as possible and without unreasonable delay,
while some require notification require notification within a specified period after discovering a
breach. The shortest time frame is 30 days (Colorado and Florida).
Question 10 options:
What information must breach notifications include, per state breach notice laws?
Question 11 options:
The requirements vary by state, and can include contact information for the company, a general
description of the breach, the categories of personal information compromised, the date of the
breach, contact information for regulators, advice to remain vigilant about breaches, and
information about identity theft protection services.
The requirements are company name and contact information for regulators.
The requirements are the same across the board due to states collaboration on the FTC Act.
Assume a company is based in New York and only has offices in New York, but has customers
in all 50 states and the District of Columbia. The company has a breach. Which breach
notification laws apply?
Question 12 options:
Only the New York breach notice laws apply, as the company is based in New York.
All 51 breach notice laws apply, as the requirements are based on the location of the data
subjects.
If a company has a data breach, is it only required to notify consumers?
Question 13 options:
It depends on the data type of those consumers.
It depends on the state. Many states require notification of credit bureaus and state regulators,
provided that the number of notified individuals reaches a certain threshold.
Yes.
No.
What are the penalties for violating state breach notification laws?
Question 14 options:
Penalties for violating state breach notifications laws are covered under Section 5 of the FTC
Act.
Penalties for state breach notification laws are covered under the Computer Fraud and Abuse Act
(CFAA).
It varies by state. In some states, the only remedy is an enforcement action by the state attorney
general, while other states allow individuals to bring private lawsuits.
There are no penalties.
Which state has the most detailed general data security law?
Question 15 options:
Ohio.
South Dakota.
Massachusetts.
New York.
What are the three elements required to establish Article III Standing? (Select all that apply)
Question 16 options:
Fairly traceable to the defendant's unlawful conduct.
Redressable via the lawsuit.
Injury in fact.
Vaguely traceable to the defendant's unlawful conduct.
The FTC's role is to protect consumers against anticompetitive and fraudulent business practices.
The SEC's job is to maintain fair, orderly markets and enforce investor protection laws.
Section 5 of the FTC Act provides the FTC with the authority to regulate companies' data
security practices.
Wyndham was ordered to pay $49.4 million in cash which was distributed to qualifying students
who were harmed by the deceptive ads, as well as $50.6 million in debt relief.
The Computer Fraud and Abuse Act of 1986 applies to anyone who intentionally accesses a
Federal interest computer without authorization and alters, damages, or destroys information, or
prevents authorized use of any such computer or information and thereby causes loss.

More Related Content

Similar to What was the most important holding of FTC v. WyndhamQuestion 4 o.pdf

Title 1. Jennings, M. (2018). Business Its legal, ethical, and g
Title 1. Jennings, M. (2018). Business Its legal, ethical, and gTitle 1. Jennings, M. (2018). Business Its legal, ethical, and g
Title 1. Jennings, M. (2018). Business Its legal, ethical, and gTakishaPeck109
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
What are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdfWhat are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdfamirajsharma
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?- Mark - Fullbright
 
Bshs 355 week 4 team assignment (social security act) 1
Bshs 355 week 4 team assignment (social security act) 1Bshs 355 week 4 team assignment (social security act) 1
Bshs 355 week 4 team assignment (social security act) 1storotgalo1978
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...Patton Boggs LLP
 
Information Sharing.ppt
Information Sharing.pptInformation Sharing.ppt
Information Sharing.pptJing252835
 
Advertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesAdvertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesTrine Medina
 
ETH 321 Final Exam Guide
ETH 321 Final Exam GuideETH 321 Final Exam Guide
ETH 321 Final Exam Guidecritter09
 
Eth 321 final exam guide new
Eth 321 final exam guide newEth 321 final exam guide new
Eth 321 final exam guide newash52393
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Uop eth 321 final exam guide new
Uop eth 321 final exam guide newUop eth 321 final exam guide new
Uop eth 321 final exam guide newlroselyn
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyIFLP
 

Similar to What was the most important holding of FTC v. WyndhamQuestion 4 o.pdf (20)

Title 1. Jennings, M. (2018). Business Its legal, ethical, and g
Title 1. Jennings, M. (2018). Business Its legal, ethical, and gTitle 1. Jennings, M. (2018). Business Its legal, ethical, and g
Title 1. Jennings, M. (2018). Business Its legal, ethical, and g
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
What are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdfWhat are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdf
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?
 
Cloud Security Law Issues--an Overview
Cloud Security Law Issues--an OverviewCloud Security Law Issues--an Overview
Cloud Security Law Issues--an Overview
 
Bshs 355 week 4 team assignment (social security act) 1
Bshs 355 week 4 team assignment (social security act) 1Bshs 355 week 4 team assignment (social security act) 1
Bshs 355 week 4 team assignment (social security act) 1
 
consumer protection
consumer protectionconsumer protection
consumer protection
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...
FTC Enforcement Against Individuals: Legal Standards Impacting Individual Lia...
 
Information Sharing.ppt
Information Sharing.pptInformation Sharing.ppt
Information Sharing.ppt
 
Advertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common MistakesAdvertising Laws: 5 Common Mistakes
Advertising Laws: 5 Common Mistakes
 
ETH 321 Final Exam Guide
ETH 321 Final Exam GuideETH 321 Final Exam Guide
ETH 321 Final Exam Guide
 
Eth 321 final exam guide new
Eth 321 final exam guide newEth 321 final exam guide new
Eth 321 final exam guide new
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Uop eth 321 final exam guide new
Uop eth 321 final exam guide newUop eth 321 final exam guide new
Uop eth 321 final exam guide new
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 

More from amirajsharma

What is a workflow a. Identify a process within your own business,.pdf
What is a workflow a. Identify a process within your own business,.pdfWhat is a workflow a. Identify a process within your own business,.pdf
What is a workflow a. Identify a process within your own business,.pdfamirajsharma
 
What is a difference between base excision repair BER and nucleotide.pdf
What is a difference between base excision repair BER and nucleotide.pdfWhat is a difference between base excision repair BER and nucleotide.pdf
What is a difference between base excision repair BER and nucleotide.pdfamirajsharma
 
What are the current assets and current liabilitiesWhat are the d.pdf
What are the current assets and current liabilitiesWhat are the d.pdfWhat are the current assets and current liabilitiesWhat are the d.pdf
What are the current assets and current liabilitiesWhat are the d.pdfamirajsharma
 
What is a major possible negative feedback for the climate system.pdf
What is a major possible negative feedback for the climate system.pdfWhat is a major possible negative feedback for the climate system.pdf
What is a major possible negative feedback for the climate system.pdfamirajsharma
 
What is a conjugate prior Discuss the advantages and disadv.pdf
What is a conjugate prior Discuss the advantages and disadv.pdfWhat is a conjugate prior Discuss the advantages and disadv.pdf
What is a conjugate prior Discuss the advantages and disadv.pdfamirajsharma
 
What factors enable small business innovation.pdf
What factors enable small business innovation.pdfWhat factors enable small business innovation.pdf
What factors enable small business innovation.pdfamirajsharma
 
What early retirement options does a person in their early 60s in th.pdf
What early retirement options does a person in their early 60s in th.pdfWhat early retirement options does a person in their early 60s in th.pdf
What early retirement options does a person in their early 60s in th.pdfamirajsharma
 
What are the most important issues that an HR team needs to consider.pdf
What are the most important issues that an HR team needs to consider.pdfWhat are the most important issues that an HR team needs to consider.pdf
What are the most important issues that an HR team needs to consider.pdfamirajsharma
 
what if i di t have a partner - Create your own publicprivate keys.pdf
what if i di t have a partner  - Create your own publicprivate keys.pdfwhat if i di t have a partner  - Create your own publicprivate keys.pdf
what if i di t have a partner - Create your own publicprivate keys.pdfamirajsharma
 
What financial statement would you find the following Limited use.pdf
What financial statement would you find the following Limited use.pdfWhat financial statement would you find the following Limited use.pdf
What financial statement would you find the following Limited use.pdfamirajsharma
 
What does compile-time type checking do [6 marks] a. Allow a sing.pdf
What does compile-time type checking do [6 marks] a. Allow a sing.pdfWhat does compile-time type checking do [6 marks] a. Allow a sing.pdf
What does compile-time type checking do [6 marks] a. Allow a sing.pdfamirajsharma
 
What does HSAM stand forWhat is the range of memory.pdf
What does HSAM stand forWhat is the range of memory.pdfWhat does HSAM stand forWhat is the range of memory.pdf
What does HSAM stand forWhat is the range of memory.pdfamirajsharma
 
What enterprise application integration and Web services are How th.pdf
What enterprise application integration and Web services are How th.pdfWhat enterprise application integration and Web services are How th.pdf
What enterprise application integration and Web services are How th.pdfamirajsharma
 
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdf
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdfWhat does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdf
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdfamirajsharma
 
Web Server Python Assignment You will develop a web server that ha.pdf
Web Server Python Assignment You will develop a web server that ha.pdfWeb Server Python Assignment You will develop a web server that ha.pdf
Web Server Python Assignment You will develop a web server that ha.pdfamirajsharma
 
What could be the reason for a very faint colorimetric result in two.pdf
What could be the reason for a very faint colorimetric result in two.pdfWhat could be the reason for a very faint colorimetric result in two.pdf
What could be the reason for a very faint colorimetric result in two.pdfamirajsharma
 
What complication arises in degrees of freedom What distribution .pdf
What complication arises in degrees of freedom What distribution .pdfWhat complication arises in degrees of freedom What distribution .pdf
What complication arises in degrees of freedom What distribution .pdfamirajsharma
 
What are the implications of the authors findings How can this info.pdf
What are the implications of the authors findings How can this info.pdfWhat are the implications of the authors findings How can this info.pdf
What are the implications of the authors findings How can this info.pdfamirajsharma
 
What are the strongest arguments for considering fraternal twins wit.pdf
What are the strongest arguments for considering fraternal twins wit.pdfWhat are the strongest arguments for considering fraternal twins wit.pdf
What are the strongest arguments for considering fraternal twins wit.pdfamirajsharma
 
What are the arguments for and against giving money to the people of.pdf
What are the arguments for and against giving money to the people of.pdfWhat are the arguments for and against giving money to the people of.pdf
What are the arguments for and against giving money to the people of.pdfamirajsharma
 

More from amirajsharma (20)

What is a workflow a. Identify a process within your own business,.pdf
What is a workflow a. Identify a process within your own business,.pdfWhat is a workflow a. Identify a process within your own business,.pdf
What is a workflow a. Identify a process within your own business,.pdf
 
What is a difference between base excision repair BER and nucleotide.pdf
What is a difference between base excision repair BER and nucleotide.pdfWhat is a difference between base excision repair BER and nucleotide.pdf
What is a difference between base excision repair BER and nucleotide.pdf
 
What are the current assets and current liabilitiesWhat are the d.pdf
What are the current assets and current liabilitiesWhat are the d.pdfWhat are the current assets and current liabilitiesWhat are the d.pdf
What are the current assets and current liabilitiesWhat are the d.pdf
 
What is a major possible negative feedback for the climate system.pdf
What is a major possible negative feedback for the climate system.pdfWhat is a major possible negative feedback for the climate system.pdf
What is a major possible negative feedback for the climate system.pdf
 
What is a conjugate prior Discuss the advantages and disadv.pdf
What is a conjugate prior Discuss the advantages and disadv.pdfWhat is a conjugate prior Discuss the advantages and disadv.pdf
What is a conjugate prior Discuss the advantages and disadv.pdf
 
What factors enable small business innovation.pdf
What factors enable small business innovation.pdfWhat factors enable small business innovation.pdf
What factors enable small business innovation.pdf
 
What early retirement options does a person in their early 60s in th.pdf
What early retirement options does a person in their early 60s in th.pdfWhat early retirement options does a person in their early 60s in th.pdf
What early retirement options does a person in their early 60s in th.pdf
 
What are the most important issues that an HR team needs to consider.pdf
What are the most important issues that an HR team needs to consider.pdfWhat are the most important issues that an HR team needs to consider.pdf
What are the most important issues that an HR team needs to consider.pdf
 
what if i di t have a partner - Create your own publicprivate keys.pdf
what if i di t have a partner  - Create your own publicprivate keys.pdfwhat if i di t have a partner  - Create your own publicprivate keys.pdf
what if i di t have a partner - Create your own publicprivate keys.pdf
 
What financial statement would you find the following Limited use.pdf
What financial statement would you find the following Limited use.pdfWhat financial statement would you find the following Limited use.pdf
What financial statement would you find the following Limited use.pdf
 
What does compile-time type checking do [6 marks] a. Allow a sing.pdf
What does compile-time type checking do [6 marks] a. Allow a sing.pdfWhat does compile-time type checking do [6 marks] a. Allow a sing.pdf
What does compile-time type checking do [6 marks] a. Allow a sing.pdf
 
What does HSAM stand forWhat is the range of memory.pdf
What does HSAM stand forWhat is the range of memory.pdfWhat does HSAM stand forWhat is the range of memory.pdf
What does HSAM stand forWhat is the range of memory.pdf
 
What enterprise application integration and Web services are How th.pdf
What enterprise application integration and Web services are How th.pdfWhat enterprise application integration and Web services are How th.pdf
What enterprise application integration and Web services are How th.pdf
 
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdf
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdfWhat does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdf
What does ln greater or equal to ft (LL-1 right) mean[lnft(L1L�rig.pdf
 
Web Server Python Assignment You will develop a web server that ha.pdf
Web Server Python Assignment You will develop a web server that ha.pdfWeb Server Python Assignment You will develop a web server that ha.pdf
Web Server Python Assignment You will develop a web server that ha.pdf
 
What could be the reason for a very faint colorimetric result in two.pdf
What could be the reason for a very faint colorimetric result in two.pdfWhat could be the reason for a very faint colorimetric result in two.pdf
What could be the reason for a very faint colorimetric result in two.pdf
 
What complication arises in degrees of freedom What distribution .pdf
What complication arises in degrees of freedom What distribution .pdfWhat complication arises in degrees of freedom What distribution .pdf
What complication arises in degrees of freedom What distribution .pdf
 
What are the implications of the authors findings How can this info.pdf
What are the implications of the authors findings How can this info.pdfWhat are the implications of the authors findings How can this info.pdf
What are the implications of the authors findings How can this info.pdf
 
What are the strongest arguments for considering fraternal twins wit.pdf
What are the strongest arguments for considering fraternal twins wit.pdfWhat are the strongest arguments for considering fraternal twins wit.pdf
What are the strongest arguments for considering fraternal twins wit.pdf
 
What are the arguments for and against giving money to the people of.pdf
What are the arguments for and against giving money to the people of.pdfWhat are the arguments for and against giving money to the people of.pdf
What are the arguments for and against giving money to the people of.pdf
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

What was the most important holding of FTC v. WyndhamQuestion 4 o.pdf

  • 1. What was the most important holding of FTC v. Wyndham? Question 4 options: The FTC's role is to protect consumers against anticompetitive and fraudulent business practices. The SEC's job is to maintain fair, orderly markets and enforce investor protection laws. Section 5 of the FTC Act provides the FTC with the authority to regulate companies' data security practices. Wyndham was ordered to pay $49.4 million in cash which was distributed to qualifying students who were harmed by the deceptive ads, as well as $50.6 million in debt relief. The Computer Fraud and Abuse Act of 1986 applies to anyone who intentionally accesses a Federal interest computer without authorization and alters, damages, or destroys information, or prevents authorized use of any such computer or information and thereby causes loss. How did the 11th Circuit's opinion in the LabMD case limit the FTC's ability to regulate data security? Question 5 options: FTC orders must contain more specific requirements for data security than mere reasonableness. FTC orders can be vague and ambiguous.
  • 2. FTC orders must contain reasonableness. None of the above. Most state laws only require notification if there is a risk of harm. However, some states, including California, require notification of the breach of covered personal information regardless of whether there is a risk of harm. Question 6 options: Will compliance with the NIST Cybersecurity Framework allow a company to avoid an enforcement action under Section 5 of the FTC Act? Question 7 options: No, but compliance with the SOC2 Framework will. Not necessarily, but the FTC has suggested that evidence of a cybersecurity program that adopts the NIST Framework is evidence of adequate security practices. No, but compliance with the PCI Framework will. Yes, the NIST Cybersecurity Framework allows a company to avoid enforcement action entirely under Section 5 of the FTC Act. Which data categories are included in all state data breach notification laws in the United States?
  • 3. (Select all that apply) Question 8 options: First name only. First initial and last name in combination with; social security number, drivers license, state ID number, or account number. First name and last name in combination with; social security number, drivers license, state ID number, or account number. Last name in combination with; social security number, drivers license, state ID number, or account number. Do any state breach notification laws require notice of the breach of encrypted information? Question 9 options: No, provided that PII data was not stolen. No, provided that the encryption key was not accessed. Yes, regardless of if the encryption key was accessed.
  • 4. Yes, regardless of if PII data was stolen. Some states only require notification as expediently as possible and without unreasonable delay, while some require notification require notification within a specified period after discovering a breach. The shortest time frame is 30 days (Colorado and Florida). Question 10 options: What information must breach notifications include, per state breach notice laws? Question 11 options: The requirements vary by state, and can include contact information for the company, a general description of the breach, the categories of personal information compromised, the date of the breach, contact information for regulators, advice to remain vigilant about breaches, and information about identity theft protection services. The requirements are company name and contact information for regulators. The requirements are the same across the board due to states collaboration on the FTC Act. Assume a company is based in New York and only has offices in New York, but has customers in all 50 states and the District of Columbia. The company has a breach. Which breach notification laws apply? Question 12 options: Only the New York breach notice laws apply, as the company is based in New York.
  • 5. All 51 breach notice laws apply, as the requirements are based on the location of the data subjects. If a company has a data breach, is it only required to notify consumers? Question 13 options: It depends on the data type of those consumers. It depends on the state. Many states require notification of credit bureaus and state regulators, provided that the number of notified individuals reaches a certain threshold. Yes. No. What are the penalties for violating state breach notification laws? Question 14 options: Penalties for violating state breach notifications laws are covered under Section 5 of the FTC Act. Penalties for state breach notification laws are covered under the Computer Fraud and Abuse Act (CFAA).
  • 6. It varies by state. In some states, the only remedy is an enforcement action by the state attorney general, while other states allow individuals to bring private lawsuits. There are no penalties. Which state has the most detailed general data security law? Question 15 options: Ohio. South Dakota. Massachusetts. New York. What are the three elements required to establish Article III Standing? (Select all that apply) Question 16 options: Fairly traceable to the defendant's unlawful conduct.
  • 7. Redressable via the lawsuit. Injury in fact. Vaguely traceable to the defendant's unlawful conduct. The FTC's role is to protect consumers against anticompetitive and fraudulent business practices. The SEC's job is to maintain fair, orderly markets and enforce investor protection laws. Section 5 of the FTC Act provides the FTC with the authority to regulate companies' data security practices. Wyndham was ordered to pay $49.4 million in cash which was distributed to qualifying students who were harmed by the deceptive ads, as well as $50.6 million in debt relief. The Computer Fraud and Abuse Act of 1986 applies to anyone who intentionally accesses a Federal interest computer without authorization and alters, damages, or destroys information, or prevents authorized use of any such computer or information and thereby causes loss.