211. Once a customer has opted out of telesales, that request must be given effect to. Such a request should be provided:
A. Whenever there is an opportunity to speak to the marketer
B. Through a third party organisation
C. Is not required be in writing to the particular marketer
D. By filling in a standard form

212. Principle 4 of the Data Protection Act 1998 provides that personal data must be accurate and where necessary kept up to date. For this purpose a database has to be:
A. Deleted regularly to ensure accuracy
B. Passed on to a third party organisation to be checked
C. Held until there is an objection from a customer
D. Regularly cleansed to remove errors and inaccuracies

213. For marketers to manage their email lists effectively they should:
A. Not send out any email marketing materials
B. Suppress the details of those that have opted out of email marketing
C. Delete the details of all those that have opted out
D. Send their staff on special email management courses

214. In a web-based contract, the contract is accepted by the marketer when:
A. It has actually been received
B. Online payment has been accepted
C. All the conditions of the contract have been fulfilled
D. When performance of the contract has been completed

215. An electronic signature identifies the originator of an electronic message. It ensures that the sender of an electronic message:
A. Is able to deny it in the future
B. Has complied with legal rules
C. Is linked directly with the message sent
D. Can have the message returned to him or her

216. Decryption, the reverse of encryption, is the transformation of encrypted data:
A. Using the secure electronic transactions systems
B. Back to its intelligible form which is called plain text
C. In the course of processing personal data
D. With the use of e-commerce linking mechanism

217. One of the ways of ensuring the security of e-marketing information is the use of:
A. Software piracy software
B. Hacking into the e-marketing system by using software tools
C. Secure electronic transactions protocol
D Spoofing to provide access to confidential areas of the network

218. Where communications networks are used to store personal information, the data subject should be offered the right:
A. To refuse such processing and storage of personal information
B. To carry out a risk assessment of the use of the stored data
C. To identify and authenticate all users of such personal information
D. To use cookies to determine the extent of misuse of the information

219. Before traffic data is processed, subscribers and users must be informed of the type of data processed.
A. Such data must be emailed to all existing customers
B. Such data must be erased or made anonymous when it is no longer needed
C. Consent is not necessary for the processing of such data
D. There is no obligation to inform subscribers and users of the data processing implications

220. An electronic cheque is a digital substitute for the paper cheque and follows the same payment stream as the paper counterpart.
A. Despite its electronic nature, handwritten signatures can still be used on electronic cheques to authenticate them
B. Electronic cheques are not normally issued from a customer’s existing cheque account
C. With electronic cheques, there is no verification process necessary as it is a secure system
D. Just like the paper cheque, an electronic cheque is a legally binding promise to pay