answersLogoWhite

0

No; privacy law would be more involved with this.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What hardware inisde a personal computer provides the ability to acess data transmitted over a network?

To access a network, some type of network card must be installed in the computer.


Which of the following is something a network adapter does NOT do?

it verifies that all information transmitted from the computer is correctly received by the recipient.


What is the unit of information called when a network adapter adds the source and destination MAC address to the segment of data before it is transmitted on the network?

Packet


How can information be securely transmitted and received over a network?

Information can be securely transmitted and received over a network by using encryption techniques such as SSL/TLS, VPNs, and secure protocols like HTTPS. These methods help to protect data from unauthorized access and ensure that it remains confidential during transmission.


Information can be transmitted via of which siganlling methods?

Depends what sort of signalling - SS7 is used in telecomms networks. Different flavours in different networks and customer to network interface is different to network to network


Why should you protect your wireless network with wap?

Protecting your wireless network with WPA (Wi-Fi Protected Access) is essential for safeguarding your personal information and devices from unauthorized access. WPA encrypts the data transmitted over your network, making it difficult for intruders to intercept and steal sensitive information. Additionally, using WPA enhances the overall security of your network, helping to prevent malicious activities and ensuring a safer online experience for all connected devices.


What risks are posed by allowing guess access to your network?

Many risks are posed by allowing guests to access a personal network. A guest may invite a virus onto the network or even take down personal information from the network.


Is someones personal information secure over a network database?

It depends on how well the network database is protected. Measures such as encryption, access controls, and regular security audits can help ensure the security of personal information stored on a network database. However, no system can be 100% secure, so it's important to continually monitor and update security measures to minimize the risk of data breaches.


What is the differnece in how voice is transmitted over a PSTN and how voice is transmitted over an IP network?

The difference: With PSTN, the voice is transmitted through the network of cables. While with VoIP is transmitted through the internet. This is the main difference between the two communication systems.


The 2 security methods used on network?

There are two types of network security concerns: network infrastructure security and content security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them. Content security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.


What information can be gathered by using the command netstat?

The command netstat provides information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships. It can show all active network connections, listening ports, and the state of the connections. Additionally, it displays information about routing tables, interface statistics such as packets transmitted and received, and network protocol information.


What is a network standard that specifies no central computer or device on the network should control when data can be transmitted?

Ethernet.