Page 1518 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1518
“transitory activities” exemption. The other options are three of the
five mandatory requirements. The other two requirements are that
the service provider must not determine the recipients of the
material and the material must be transmitted with no
modification to its content.
14. C. The USA PATRIOT Act was adopted in the wake of the
September 11, 2001, terrorist attacks. It broadens the powers of the
government to monitor communications between private citizens
and therefore actually weakens the privacy rights of consumers and
internet users. The other laws mentioned all contain provisions
designed to enhance individual privacy rights.
15. B. Shrink-wrap license agreements become effective when the user
opens a software package. Click-wrap agreements require the user
to click a button during the installation process to accept the terms
of the license agreement. Standard license agreements require that
the user sign a written agreement prior to using the software.
Verbal agreements are not normally used for software licensing but
also require some active degree of participation by the software
user.
16. B. The Gramm-Leach-Bliley Act provides, among other things,
regulations regarding the way financial institutions can handle
private information belonging to their customers.
17. C. U.S. patent law provides for an exclusivity period of 20 years
beginning at the time the patent application is submitted to the
Patent and Trademark Office.
18. C. The General Data Protection Regulation (GDPR) is a
comprehensive data privacy law that protects personal information
of EU residents worldwide. The law is scheduled to go into effect in
2018.
19. C. The Payment Card Industry Data Security Standard (PCI DSS)
applies to organizations involved in storing, transmitting, and
processing credit card information.
20. A. The Health Information Technology for Economic and Clinical
Health Act (HITECH) of 2009 amended the privacy and security

