4. Data Assessments, Inventory, & Mapping Flashcards

1
Q

Data Inventory/Map - Record of all personal information your organization stores, uses, and processes.

A

Data Inventory Uses:
- Regulatory Risk & Compliance Analysis
- Assessing data, systems and processes
- Inform data assessments, priorities, data life cycle management and data classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to create an Inventory of PII being processed, what questions to ask?

A

Who creates the data inventory?

Which department my hold/use PII?

What questions should be asked?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Life Cycle (CUSAD)

A
  • Collection
  • Usage
  • Storage
  • Archiving
  • Destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a Gap Analysis?

A

Involves identifying gaps between standards & laws an organization is subject to and the the organization’s current compliance efforts. Best to involve the legal team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy Assessment vs Privacy Impact Assessment

A

Privacy Assessment - measures an organization’s compliance with laws, regulations, and standards. Involves use of subjective standards and objective standards.

Privacy Impact Assessment - Assesses privacy risks associated with processing PII in relation to a New project, product, or service, Requirements arounds PIA’s may be mandated by industry, organization policy, and laws & regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Triggers for a PIA

A
  • Preparing for the deployment of a project, product, or service that includes the collection of PII.
  • New or revised industry standards, organizational policies, or laws & regulations.
  • Organizational changes to methods in which PII is handled.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DPIA and what should be included in it?

A

is a PIA but rather is a mandatory compliance requirement under the General Data Protection Regulation (GDPR).

DPIA’s should include:
1. Description of Processing
2. Purpose of Processing
3. Legitimate Interest being pursued
4. Necessity of Processing
5. Risks to Data Subjects
6. Address Risks Identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Triggers for DPIA

A

Processing that is “likely to entail a high risk to the rights and freedoms of natural persons” and the use of new technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mergers, Acquisitions, and Diversities Should include a privacy checkpoint, a chance to evaluate:

A

Should include a privacy checkpoint, a chance to evaluate:
- New Compliance Requirements
- Existing Client Agreements
- New Resources, Technologies, & Processes
- Applicable Laws & Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vendor Management

A

Vendor Assessment - the evaluation of a vendor for privacy and info sec policies, access controls, where PII is being held, and who has access to it.

Assess Vendor Risk: Privacy/Security Questionnaires and PIAs

New Technology ALWAYS requires an assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What to focus on when Assessing Cloud Computing Vendors

A

Areas of Focus:
- Review Certifications and Standards
- Service Roadmap
- information security
- subcontractors
- service dependencies
- data policies and protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data governance levels (SMO)

A
  • Strategic: data steering committee, c-level
  • Managerial: data owners, functional leads
  • Operational: data stewards, SMEs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Article 30 (GDPR) - Privacy Records Detail Must Include

A

Records must include:
- Name and contact details of the controller or processor, DPO, and/or data protection rep
- Name and contact of details of any Joint Controllers
- Purpose for the processing (for controllers)
- Description of categories of personal data and subjects (controllers) or processing (processors)
- Categories of recipients (for controllers)
- International transfers to third countries or multinational orgs
- Where applicable, Safeguards in place for exceptional transfers
- Where possible, retention periods for various categories of personal data (for controllers)
- General description of technical and org security measures.

Must be disclosed to a data authority upon request
Company of 250 employees or more if occasional and not sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data inventory should include

A

What is the context and purpose of the repo?
Who is the owner?
Which legal entity?
How much data (personal and sensitive)?
Format (physical or electronic, structured or unstructured)
How is it used?
Data retention
Type of elements and data subjects
Where is it stored?
Where is it accessed?
International transfers
Third party disclosure or sharing?
Transfer mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly