__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

A. Availability B. System Integrity

C. Privacy D. Data Integrity

C. Privacy

Computer Science & Information Technology

You might also like to view...

Define each of the following: spyware, adware, cookie, spam, and phishing.

What will be an ideal response?

Computer Science & Information Technology

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

A. NT level security B. Share-level security C. User-level security D. CIF level security

Computer Science & Information Technology