Ch. 4 Information Management Quiz Flashcards
The role of a privacy professional includes:
a. Monitoring external environment for changes to regulations and laws
b. Alerting stakeholders to divergent perspectives within the industry and legal landscape
c. Identifying compliance challenges, and design policies to address ways to manage the risk
d. All of the above
d. All of the above
Which of the following BEST describes an element of reputational risk?
a. Compliance with contractual commitments, privacy promises and commitments to follow industry standards
b. Protecting the trust of consumers regarding the organization’s commitment to following through on its privacy policies
c. Compliance with applicable state, federal and international laws concerning the use of personal information
d. All of the above
b. Protecting the trust of consumers regarding the organization’s commitment to following through on its privacy policies
Which of the following BEST describes an element of operational risk?
a. Administrative efficiency of the organization’s privacy program
b. Ability of the organization to receive a return on investment in information and related activities.
c. Compliance with applicable state, federal and international laws concerning the use of personal information
d. All of the above
a. Administrative efficiency of the organization’s privacy program
Which of the following BEST describes an element of investment risk?
a. Administrative efficiency of the organization’s privacy program
b. Compliance with applicable state, federal and international laws concerning the use of personal information
c. Ability of the organization to receive a return on investment in information and related activities
d. All of the above
c. Ability of the organization to receive a return on investment in information and related activities
A good information management program
a. Uses a holistic approach in assessing the risks and benefits of processing personal information
b. Helps develop policies for important activities
c. Informs activities and processes used to comply with policies
d. All of the above
d. All of the above
Which of the following BEST describes the four basic steps for managing information?
a. Discover, analyze, build, and communicate
b. Discover, build, communicate, and evolve
c. Search, discover, communicate, and evolve
d. None of the above
b. Discover, build, communicate, and evolve
Which of the following occurs during the Discover phase of information management?
a. Issue identification and self-assessment
b. Procedure development and verification
c. Full implementation
d. All of the above
a. Issue identification and self-assessment
Which of the following occurs during the Discover phase of information management?
a. Issue identification
b. Self-assessment
c. Determination of best practices
d. All of the above
d. All of the above
Which of the following occurs during the Build phase of information management?
a. Procedure development and verification
b. Determination of best practices
c. Education
d. All of the above
a. Procedure development and verification
Which of the following occurs during the Build phase of information management?
a. Issue identification and self-assessment
b. Documentation
c. Full implementation
d. All of the above
c. Full implementation
Which of the following occurs during the Communicate phase of information management?
a. Adaptation
b. Procedure development and verification
c. Documentation
d. All of the above
c. Documentation
Which of the following occurs during the Communicate phase of information management?
a. Determination of best practices
b. Education
c. Full implementation
d. All of the above
b. Education
Which of the following occurs during the Evolve phase of information management?
a. Affirmation
b. Monitoring
c. Adaptation
d. All of the above
d. All of the above
A data inventory is required for businesses in some industries under:
a. Gramm-Leach-Bliley Act Privacy Rule
b. Gramm-Leach-Bliley Act Safeguards Rule
c. APEC Privacy Rule
d. None of the above
b. Gramm-Leach-Bliley Act Safeguards Rule
An organized and documented data inventory:
a. Identifies reputational and legal risks
b. Helps mitigate penalties
c. Should be reviewed and updated on a regular basis
d. All of the above
d. All of the above
Data classification:
a. Defines the level of protection needed for specific types of data based on its sensitivity
b. Identifies legal risks for data during a self-assessment
c. Determines which laws and regulations apply to the data flows occurring both internally and externally
d. All of the above
a. Defines the level of protection needed for specific types of data based on its sensitivity
Holding all data in one system:
a. Is a best practice for ensuring ease of management
b. May help reduce duplicate entries
c. May increase the impact of a single data breach
d. None of the above
c. May increase the impact of a single data breach
A documented well-organized data classification system helps an organization:
a. Respond to compliance audits for specific types of data
b. Respond more effectively to legal discovery requests
c. Efficiently use storage resources
d. All of the above
d. All of the above
Documenting data flows should include:
a. How to respond to legal discovery requests
b. Mapping of systems, applications and processes for handling data
c. A plan for responding to a data breach
d. All of the above
b. Mapping of systems, applications and processes for handling data
Which of the following is a PRIMARY consideration for addressing privacy risk in an organization as it relates to sensitive personal information?
a. Where, how, and how long the data is stored
b. Current laws for obtaining a search warrant
c. Number of team members in Human Resources
d. All of the above
a. Where, how, and how long the data is stored
Which of the following is a PRIMARY consideration for addressing privacy risk in an organization as it relates to sensitive personal information?
a. How a customer’s marital status is documented
b. Determining how sensitive the information is
c. Current laws for authenticating a customer
d. All of the above
b. Determining how sensitive the information is
Which of the following is a PRIMARY consideration for addressing privacy risk in an organization as it relates to sensitive personal information?
a. Whether or not the information should be encrypted
b. Whether or not the information will be transferred to other countries, and how it will be transferred
c. Data authorities who enforce the rules for the information
d. All of the above
d. All of the above
Which of the following is a PRIMARY consideration for addressing privacy risk in an organization as it relates to sensitive personal information?
a. Documenting a customer’s marital status
b. Best practices for providing personal information to law enforcement
c. How the information is processed and the activities performed to maintain the processes
d. All of the above
c. How the information is processed and the activities performed to maintain the processes
Which of the following is a PRIMARY consideration for addressing privacy risk in an organization as it relates to sensitive personal information?
a. Whether the use of the personal information is dependent upon other systems
b. Names of third parties processing data
c. Legal team’s knowledge in the area of privacy
d. All of the above
a. Whether the use of the personal information is dependent upon other systems
A limited retention period:
a. Is not considered a best practice when storing large amounts of personal data
b. Increases reputational risk
c. Reduces the risk of data being breached
d. All of the above
c. Reduces the risk of data being breached
Determining the level of sensitivity of personal data being held is directly dependent on which of the following?
a. Retention policies
b. Data classification
c. State tort laws
d. All of the above
b. Data classification
Which of the following provisions should be included in third party contracts to ensure an understanding of the data controller’s expectations for safeguarding consumer personal information?
a. Notification of arbitration
b. Notification of data breach
c. Notification of merger
d. All of the above
b. Notification of data breach
Which of the following information security provisions should be included in third party contracts, as applicable?
a. Specific security controls
b. Employee background checks
c. Audit rights
d. All of the above
d. All of the above
Which of the following provisions should be included in third party contracts to ensure an understanding of the data controller’s expectations for safeguarding consumer personal information?
a. Information security provisions
b. Indemnification provisions
c. Arbitration provisions
d. All of the above
a. Information security provisions
When evaluating vendors for processing data, which of the following is the least important consideration as part of the evaluation?
a. Reputation
b. Financial condition and insurance
c. Name and address of CEO
d. Information security controls
c. Name and address of CEO
Which of the following information security provisions should be included in third party contracts, as applicable?
a. Encryption of data
b. Network security
c. Access controls
d. All of the above
d. All of the above
When evaluating vendors for processing data, which of the following is the LEAST important consideration as part of the evaluation?
a. Disposal of information
b. Number of employees
c. Employee training
d. Vendor incident response
b. Number of employees
An information management program should effectively address:
a. Legal risk
b. Reputational risk
c. Meet the organization’s goals
d. All of the above
d. All of the above
Effective security risk management balances the potential for loss with what cost?
A. The cost of security protection and management.
B. The cost of statutory compliance and oversight.
C. The cost of notifications related to a data loss.
D. The cost of reduced efficiencies in operations.
A. The cost of security protection and management.
Effective security risk management balances the potential for loss with the cost of security protection and management. Information should be protected in accordance with the value of the asset - the higher the value, the greater the security needed. Foundations of Information Privacy and Data Protection, p. 92.
Role-based access controls are based on what basic security principle?
A. Access should be granted to employees on the basis of the lowest possible level.
B. Employees shall not be granted access without management approval from CIO or CEO.
C. Employees should be granted access when it is determined they may have a legitimate need to know.
D. Employees should not be able to access personal information unless it is from a public source.
A. Access should be granted to employees on the basis of the lowest possible level.
Role-based access controls are based on the basic security principle that access should be granted to employees on the basis of the lowest possible level.
No employee should have greater information access than is necessary to capably perform his or her job function. These types of precautions are known as “role-based access controls.” Foundations of Information Privacy and Data Protection, p. 94.
Use of a smart card would be identified as what type of safeguard?
A. Two-factor authentication.
B. Intrusion prevention systems.
C. Public key infrastructure.
D. Perimeter control.
A. Two-factor authentication.
Use of a smart card would be identified as a two-factor authentication safeguard.
A two- factor authentication process will combine a username and password with a token that generates a one-time password.
Smart cards use technology, such as a magnetic strip, to generate the password. Foundations of Information Privacy and Data Protection, p. 132.
What is the most likely purpose for which an organization creates a data inventory? A. showing the public which data is stored B. creating an overview of data, helpful for creating a compliance and security approach C. complying with a US legal requirement D. identifying storage size requirements
B. creating an overview of data, helpful for creating a compliance and security approach
Which of the following statements is not true regarding data classification? A. organizations are free to classify data elements a certain way to place it inside or outside of the scope of certain laws B. data classification can help identify applicable laws C. to assist in creating a security strategy D. help breach response
A. organizations are free to classify data elements a certain way to place it inside or outside of the scope of certain laws
What types of risk should an organization consider when designing and administering a privacy program? Select all that apply.
A. Legal
B. Reputational
C. Operational
D. Investment
E. Resources
A. Legal B. Reputational C. Operational D. Investment
Which step in the process for developing an incident response program involves permitting affected systems back into the production environment and ensuring no threat remains?
A. Containment
B. Eradication
C. Recovery
D. Lessons learned
C. Recovery
Who may need privacy training? Select all that apply.
A. Customer service representatives
B. Leaders at the executive level
C. Marketing managers
D. Sales executives
E. IT staff
A. Customer service representatives
B. Leaders at the executive level
C. Marketing managers
D. Sales executives
E. IT staff
Which is the best method to improve accountability for a system administrator who has security functions? include security responsibilities in the job description require them to obtain security certifications train them on pen testing and vulnerability assessment
include security responsibilities in the job description