Which of the following is true of European Union DataProtection Directive?

a. It strengthens computer and network security within the European federalgovernment and affiliated parties (such as government contractors) bymandating yearly audits.
b. It protects the privacy of European Union citizens’ personal information byplacing limitations on sending such data outside of the European Union toareas that are deemed to have less than adequate standards for data security.
c. It identifiesEuropean taxpayers who hold financial assets in non-European financialinstitutions and offshore accounts so that they cannot avoid their taxobligations.
d. It protects against identity theft by imposing disclosure requirements forbusinesses and government agencies that experience security breaches thatmight put the personal information of European residents at risk.



b. It protects the privacy of European Union citizens’ personal information byplacing limitations on sending such data outside of the European Union toareas that are deemed to have less than adequate standards for data security.
The European Union DataProtection Directive protects the privacy of European Union citizens’ personal information. It protects byplacing limitations on sending such data outside of the European Union toareas that are deemed to have less than adequate standards for data security.

Computer Science & Information Technology

You might also like to view...

Write a procedure PathLookup(Pathname, Dir) ? UFID that implements Lookup for UNIX-like pathnames based on our model directory service.

What will be an ideal response?

Computer Science & Information Technology

When running a slide show, pressing + will zoom in

Indicate whether the statement is true or false

Computer Science & Information Technology

The common field between two tables in the Relationship window is indicated by a(n) ____.

A. key icon B. field name C. join line D. infinity symbol

Computer Science & Information Technology

Because of the weaknesses of _______________, the underlying protocol of the World Wide Web, Web designers often use other technologies with it to create more interactive pages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology