FUNDAMENTALS OF COMPUTER

TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES

INFORMATION PRIVACY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How we use personal information?I) Easily give the financial information to insurance company II) By law we have the power to share information about complaint with a small number of organization III) Is the name age workplace or formal workplace is the personal information
A
II, I
B
I, III
C
II
D
II, III
Explanation: 

Detailed explanation-1: -Principle 5 of the Personal Information Protection and Electronic Documents Act (PIPEDA) states that “personal information that is no longer required to fulfil the identified purposes should be destroyed, erased, or made anonymous.

Detailed explanation-2: -Encryption is a common way to protect customer data from bad actors, and organizations have different types of encryption they can choose among. File-level encryption, which can protect data in transit and make it harder for hackers to access cloud-based software or resources. Providers include McAfee and Microsoft.

Detailed explanation-3: -Discrimination happens when people act on their stereotypes or prejudices. Discrimination refers to actual behaviour towards another individual or group. Refusing a job to a person due to the person’s religion or gender is discrimination.

There is 1 question to complete.