CIPM Flashcards
Exam preparation
What 2 things does DLM (Data Lifecycle Management) Establish?
- Data Handling Policy
- Employee Roles and Responsibilities.
- Whats the manner of how breaches occur?
- What percent does each account for?
- Negligent Insider 34%
- Outsourcing data to a third party 19%
- Malicious insider 16%
- Systems “glitch” 11%
- Cyber attack 7%
- Failure to shred documents 6%
What are the three types of audits?
- 1st Party - Internal
- 2nd Party - Supplier / Contractor
- 3rd Party - External.
What is a business case?
Defines a business need and describes a way to meet that goal.
How does a complaint handling procedure differ from a privacy question procedure?
it is more formal (required by some data protection laws) and should include: -
- Centralized intake
- Escalation process
- Mgmt from intake to resolution
- Flexibility to:-
- Involve stakeholders as needed
- Function between teams for privacy complaints embedded in ethics complaints.
What should a company do with regard to letter-drops (notifications by mail)?
Front load the work:
- Establish Secure data channel
- Create literature in advance
- Obtain content approvals
- Send logo & signature files to printer before andincident occurs
- Supply return address to printer.
With regard to improper use of metrics what is are: -
- Biased Sample
- Intentional deceit
- Measurement excluding relevant elements of data, cherry picking to get desired result.
- As the name suggests the intent is to deceive.
What’s the role of Union leadership in breach planning and response?
Planning - represent union members interests, plan to speak on behalf of members
Response - Work with other members of the response team re communication channels in their control for example - Union Social Media, Web, Intranet etc.
Contact workers on member rolls, if appropriate.
With regard to data integrity whats human error versus systemic error?
Human: - Miskeyed input
Systemic: - Database fields mismatched.
What are the requirements of PCI-DSS?
- Firewall
- Default Settings allowed
- Protect cardholder data
- Encrypt transmission
- Anti Virus
- Secure system and apps.
- Access control
- Unique ID’s
- Physical Access restricted
- Monitor and track access
- Test security of system
- Info sec policy.
What is the presidents or CEOs role in breach planning and response?
Planning -
- Oversee breach control
- Bears responsibility in a breach incident.
Response -
- Set tone for company & employees
- Allocates human and financial resources
- Makes public statement & coordinates PR.
Why should an organization or privacy professional use a privacy framework? (4 reasons)
- Reduce Risk
- Avoid data loss
- Sustain organization market value and reputation
- Comply with laws, regulations and standards.
What’s a privacy workshop?
Meeting where privacy professional, stakeholders are informed about legal & market expectations on privacy, answering questions, setting the baseline for privacy knowledge.
What are the four elements of a privacy response plan?
- Key Stakeholders assemble those responsible for plans design & implementation.
- Execution timeline - Plans execution schedule.
- Progress reporting - Determine who will need to know what and facilitate it.
- Response evaluation - Lessons learned from incidents documented and incorporated.
How should a company recover from the bad press or reputational damage following a breach?
Marketing internal or external consultants and public relations.