Page 1517 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1517

6.  B. The Fourth Amendment to the U.S. Constitution sets the
                    “probable cause” standard that law enforcement officers must

                    follow when conducting searches and/or seizures of private
                    property. It also states that those officers must obtain a warrant
                    before gaining involuntary access to such property.

                7.  A. Copyright law is the only type of intellectual property protection
                    available to Matthew. It covers only the specific software code that
                    Matthew used. It does not cover the process or ideas behind the

                    software. Trademark protection is not appropriate for this type of
                    situation. Patent protection does not apply to mathematical
                    algorithms. Matthew can’t seek trade secret protection because he
                    plans to publish the algorithm in a public technical journal.

                8.  D. Mary and Joe should treat their oil formula as a trade secret. As
                    long as they do not publicly disclose the formula, they can keep it a
                    company secret indefinitely.

                9.  C. Richard’s product name should be protected under trademark

                    law. Until his registration is granted, he can use the ™ symbol next
                    to it to inform others that it is protected under trademark law.
                    Once his application is approved, the name becomes a registered
                    trademark, and Richard can begin using the ® symbol.

              10.  A. The Privacy Act of 1974 limits the ways government agencies
                    may use information that private citizens disclose to them under
                    certain circumstances.


               11.  B. The Privacy Shield framework, governed by the U.S. Department
                    of Commerce and Federal Trade Commission, allows U.S.
                    companies to certify compliance with EU data protection law.

               12.  A. The Children’s Online Privacy Protection Act (COPPA) provides
                    severe penalties for companies that collect information from young
                    children without parental consent. COPPA states that this consent
                    must be obtained from the parents of children younger than the

                    age of 13 before any information is collected (other than basic
                    information required to obtain that consent).

               13.  A. The Digital Millennium Copyright Act does not include any
                    geographical location requirements for protection under the
   1512   1513   1514   1515   1516   1517   1518   1519   1520   1521   1522