A more recently created area of law related to information security specifies a requirement for organizations to notify affected parties when they have experienced a specified type of information loss. This is commonly known as a __________ law.

A. notification
B. breach
C. spill
D. compromise


Answer: B

Computer Science & Information Technology

You might also like to view...

Explain the difference in semantics between the two versions of chaining discussed in the text.

What will be an ideal response?

Computer Science & Information Technology

Which utility can be used to disable the UAC in Windows 7?

A) DISABLE B) CHKDSK C) LISTSVC D) MSCONFIG

Computer Science & Information Technology

Which statement below about prototypes and headers is true?

A. Parameter names must be listed in the prototype, but not necessarily in the header. B. Prototypes end with a semicolon, but headers do not. C. Headers should come before prototypes. D. Headers end with a semicolon, but prototypes do not.

Computer Science & Information Technology

A good authentication technology should be platform and system dependent.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology