Bruce Byun, a teacher in a private school in Missouri, is ac…
Bruce Byun, a teacher in a private school in Missouri, is accused of embezzling money from the travel accounts of the school system. Despite the accusation by Bruce’s supervisor, there does not appear to be sufficient evidence for prosecution. Bruce’s supervisor schedules a polygraph for Bruce. Is this action by Bruce’s supervisor likely appropriate behavior?
Read DetailsGarrett Gamer, an experienced poker player, signs up to play…
Garrett Gamer, an experienced poker player, signs up to play in a national poker tournament at Wild Cougar Casino in Las Vegas, Nevada. After arriving at the casino, Garrett decides to participate in 3 smaller tournaments in addition to the national poker tournament. To cover the entry fees, Garrett pays the casino $20,000 in cash. Does this cash payment trigger a reporting requirement?
Read DetailsRun-Like-A-Rabbit, a company whose mission is to ensure that…
Run-Like-A-Rabbit, a company whose mission is to ensure that all of its customers get at least 120 minutes of exercise per week, starts a marketing campaign to promote its new app which has a $7.99 monthly subscription. The campaign involves employees of Run-Like-A-Rabbit calling prospective customers around the country. Run-Like-A-Rabbit’s Advertising Manager asks you, as the Privacy Officer, to review the campaign to double check that you believe Run-Like-A-Rabbit would be complying with the requirements of U.S. law. Which of the following parts of the campaign would you approve?
Read DetailsVirtual Armor, a company founded to assist businesses with a…
Virtual Armor, a company founded to assist businesses with addressing cybersecurity concerns, found itself the victim of a significant data breach. Fearing for the loss of trust by its customers, Virtual Armor’s top management chose to hide the evidence of the data breach. Approximately one year after the breach, the FTC informed Virtual Armor that the company and its top management were under investigation concerning the data breach. The results of the FTC investigation included both civil and criminal allegations against Virtual Armor and its top management. Which federal agency or agencies are able handle these civil and criminal allegations in court?
Read DetailsProactive Protection, a prominent threat analysis group, not…
Proactive Protection, a prominent threat analysis group, notified affiliated companies that it had identified an approach used for nation-state attacks. The hackers set up a cybersecurity blog in an attempt to build credibility with potential targets. In the blog, the hackers focused on vulnerabilities that were actually already public. The hackers then created a series of social media accounts linked to the blog. The hackers, posing as the authors of the blog, reached out to security researchers, asking them to collaborate on their work. When the security researchers responded, the hackers sent these researchers Visual Studio Projects software containing malware, which infect the researchers’ computers. This type of threat to online privacy is known as:
Read Details