Chapter 4 - Privacy Operational Lifecycle: Assess: Data Assessments Flashcards

1
Q

What is the Data Management Association (DAMA) International definition of Data Governance

A

Planning, oversight and control over management of data and the use of data and data related sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the ten spokes of the data management wheel according to DAMA

A

1 architecture
2 modelling and design
3 storage and operations
4 security
5 integration and interoperability
6 documents and content
7 reference and master data
8 warehousing and BI
9 metadata
10 quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are common organisational data governance roles

A

Strategic - Steering committee / c-level: steers and approves strategy, governance and policies.

Managerial - functional owners responsible for data assets. Responsible for delivering requirements.

Operational - stewards and day to day accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the elements of a data inventory

A
  1. The nature of the data repository
  2. The owner of the repository
  3. The legal entity of the processing
  4. Volume of information in the repository
  5. Format of the information
  6. The use of the information
  7. Data retention
  8. Types of data (e.g. email, ids)
  9. Location of storage
  10. Where is data accessed
  11. International transfers
  12. With whom is data shared
  13. Transfer mechanisms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Does the ROPA requirements under Article 30 apply to controllers or processors?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is a ROPA not required?

A

If less than 250 persons, processing is occasional, does not include sensitive personal information and is not likely to result in a risk to the rights and freedoms of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of assessments?

A
  1. Privacy assessments
  2. Privacy impact assessments
  3. Data privacy impact assessments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name on time a PIA is required by the US Government under the E-Gov Act of 2002

A

When developing or procuring IT systems that process PII of the public or when initiating an electronic collection of PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the ISO standard involved in determining a PIA

A

ISO 29134 which is a set of guidelines (not standards) for how to do conduct a PIA including the 4 steps of a PIA

  1. Threshold determination if PIA needed
  2. Preparing a PIA
  3. Performing a PIA
  4. Following up on a PIA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is a DPIA required?

A

Under GDPR a DPIA is required when the processing is likely to result in high risk to individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What examples does article 35(3) of GDPR give for when a DPIA is required

A
  1. Profiling
  2. Large scale processing
  3. Systematic processing on a large scale
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Article 29 Working Party Guidelines for when a DPIA is required?

A
  1. Evaluation or scoring
  2. ADM
  3. Systemic monitoring
  4. Sensitive data
  5. Large scale processing
  6. Matching or combining data sets
  7. Vulnerable data subjects
  8. New technology / new uses
  9. When processing restricts ability to exercise rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three key aspects of Information Security

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are information security controls designed to achieve

A

Prevent, detect or correct a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three types of information security controls?

A

Physical controls, administrative controls and technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are factors to consider for ensuring proper physical information security

A
  1. Quality of locks on document storage facilities
  2. Access control to premises
  3. Protection against man made and natural threats
  4. Disposal of physical and electronic files
  5. Methods for keeping IT assets secure
17
Q

What are the three ways that NIST 800 recommends for removing data from hardware devices

A

Clearing, purging or destroying

18
Q

What are the factors to consider when assessing vendors?

A
  1. reputation
  2. Financial condition and insurance
  3. IS controls / certifications
  4. Transfer mechanism with vendor
  5. Disposal of information
  6. Employee training and awareness
  7. Vendor incident response
  8. Audit rights
  9. Policies and procedures
  10. DPOs
19
Q

What are the three cloud computing models

A

IaaS - user responsible for software and applications
PaaS - user responsible for applications
SaaS - provider does all

20
Q

What factors should you consider when assessing a cloud service provider?

A
  1. Certifications and standard
  2. Technologies
  3. Service road map - how to stay up to date
  4. Data management - how is data stored accessed and managed
  5. Information security - auditable controls
  6. Sub processors
21
Q

What does Article 28 of GDPR require controllers to satisfy themselves of prior to appointing a processor?

A

processors who can provide “sufficient guarantees” about the implementation of appropriate technical and organizational measures for compliance with the GDPR and the protection of the rights of data subjects.

22
Q

What must a business do to shift liability to a vendor under the CCPA?

A

Ensure written contracts in place limiting the processing of the vendor to the business purpose of the contract. Attestations of compliance also required.

23
Q

Will a vendor always be considered a third party under the CCPA?

A

Not necessarily, however if a vendor uses personal information for its own purposes then it may be considered a third party and data subjects may have the right to receive written notice of such disclosees.