Exam 2 - Records and Information: Creation and Use Flashcards Preview

CRM Exam > Exam 2 - Records and Information: Creation and Use > Flashcards

Flashcards in Exam 2 - Records and Information: Creation and Use Deck (70)
Loading flashcards...

A database containing proprietary information should be set up on:
a) an open portal system.
b) the company’s website.
c) an internal network behind a firewall.
d) a bulletin board.
e) a router maintained by the IT department.

c. an internal network behind a firewall


When assessing risk, the need for security must be balanced against the need for:
a) employee training programs.
b) policies and procedures.
c) communications equipment.
d) storage space expansion.
e) operational effectiveness.

e. operational effectiveness


Collaborative environments can reduce communication time, decrease travel costs, and encourage:
a) senior leadership support.
b) standardized work processes.
c) creativity.
d) ROI.
e) attendance.

c. creativity


From a judicial standpoint, a business record must be made:
a) only by the person whose job it is to create that records.
b) by or from information transmitted by a person who knowledge of the event.
c) in the source of a regularly conducted business activity.
d) on paper or on electronic media.
e) in the regular practice of that business activity.

e. in the regular practice of that business activity


Remote access to computer-stored records is a significant functional advantage but poses _____ problems.
a) security
b) back-up
c) mobility
d) server
e) viewing

a. security


_____ should be integrated into business rules for workflow and transaction systems.
a) Physical restrictions
b) Legal risks
c) Company archives
d) Records creation
e) Social networking

d. records creation


Web-based records are _____ in a browser-supported language such as HTML or XHTML.
a) collected
b) coded
c) managed
d) transferred
e) copied

b. coded


Records are generally introduced in evidence to support a case or point or view, or to:
a) illustrate the use of information technology.
b) review legal issues related to the records.
c) illustrate a “live” testimony.
d) respond to a subpoena.
e) present an organization’s policy.

d. respond to a subpoena


_____ is a crucial component of a RIM program designed to reduce the risk of privacy breaches.
a) Funding
b) Staffing
c) Leadership
d) Training
e) Reporting

d. training


A _____ is a catalog of an organization’s ESI by category, location, and custodian including how it is stored, its accessibility, and associated retention policies.
a) migration plan
b) disposition log
c) data dictionary
d) data map
e) data source

d. data map