Data Classification Flashcards

1
Q

Data Categorization

A

Data owner usually categorizes the data because of SA

Org can have any number of categories or types of information; these might be clearly defined and reused throughout the organization, or they might be arbitrarily assigned by data owners during the Create phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List ways to categorize data?

A

Regulatory Compliance
Business Function
Functional Unit
By Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regulatory Compliance Categories

A

categories based on which regulations apply to a specific dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Function Categories

A

specific categories for different uses of data. e.g. billing, marketing, or operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Functional Unit Category

A

Categories defined by on department or office, so they own their own categories and keep all data it controls within its own category or categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By Project Categories

A

define datasets by the projects they are associated with as a means of creating discrete, compartmentalized projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should be true of the way an organization adopt categorization?

A

Whatever motif the organization uses, however, should be adopted and enforced uniformly throughout the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Labeling

A

Attaching labels, flags, or tags to data, identifying data element’s classification, categorization, sensitivity, location of data, department, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Classification

What is it? Who classifies? How is it classified? When is it Classified?

A

the responsibility of the data owner, takes place in the Create phase, and is assigned according to an overall organizational policy based on a specific characteristic of the given dataset.

Affixing security labels to objects in order to allow only people/subjects with the appropriate clearance level to have access to those objects

Classification or Sensitivity labels are applied to objects

Clearances or Privilege labels are applied to people/subjects

Data should be classified by the owner

can take any form defined by the organization and should be uniformly applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List items data classification may contain?

A

Sensitivity
Jurisdiction
Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Sensitivity in Classification

A

classification according to the sensitivity of the data, based on the negative impact an unauthorized disclosure would cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Jurisdiction in Classification

A

geophysical location of the source or storage point of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Criticality in Classification

A

Data that is deemed critical to organizational survival might be classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Mapping

A

Data between organizations (or sometimes even between departments) must be normalized and translated so that it conforms in a way meaningful to both parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where may data labels reside?

A

Header and Footers of document

Embedded in the filename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What information may labels include?

A
Date of creation 
Date of scheduled destruction/disposal 
Confidentiality level / Markings
Handling directions 
Dissemination/distribution instructions 
Access limitations 
Source 
Jurisdiction 
Applicable regulation
Descriptive terms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Discovery

A

Data discovery aka electronic discovery (e-discovery)

Used to understand the data we have created or aquired so that we may identify it, label it, and then successfully process it to derive value from data

e-discovery can be used for business analytics or even legal reasons (e.g. subpoena)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List different techniques to data discovery

A

Label based discovery
Metadata based discovery
Content based discovery

19
Q

Content Analysis

A

Analyzing data via pattern matching, hashing, statistical or other types of analysis

20
Q

Label Based Discovery

A

Labels can be especially useful when the discovery effort is undertaken in response to a mandate with a specific purpose, such as a court order or a regulatory demand

21
Q

Metadata Based Discovery

A

Data discovery can therefore use metadata in the same way labels might be used; specific fields of the metadata might be scanned for particular terms, and all matching data elements collected for a certain purpose.

22
Q

Content Based Discovery

A

discovery tools can be used to locate and identify specific kinds of data by delving into the content of datasets. This technique can be as basic as term searches or can use sophisticated pattern-matching technology.

23
Q

List types of Data Analytics

A

Data Mining
Real Time Analytics
Agile Business Intelligence

24
Q

Datamining

A

collected various data streams and can run queries across these various feeds, the organization can detect and analyze previously unknown trends and patterns

25
Q

Real Time Analytics

A

provide datamining functionality concurrently with data creation and use

26
Q

Agile Business Intelligence

A

Datamining involves recursive, iterative tools and processes that can detect trends in trends and identify even more oblique patterns in historical and recent data

27
Q

How is “rights management,” implemented?

A

Entails the use of specific controls that act in concert with or in addition to the organization’s other access control mechanisms to protect certain types of assets, usually at the file level.

28
Q

Intellectual Property

A

Valuable intangible assets of the mind

29
Q

How is intellectual property protected?

A

Patents
Trademarks
Copyright
Trade Secrets

30
Q

Copyright Description?

Is stealing a book a copyright infringement? Why or why not?

A

The legal protection for creative expression of IDEAS - usually involves literary works, film, music, software, and artistic works. Does not cover specific words, slogans, recipes, or formulae. Copyright protects tangible expression of ideas.

copyrights in the United States, in that protections for them exist upon creation, without any additional requirement for registration

No it is theft to steal a book, it is copyright infringement to illegally copy the books content.

31
Q

How long does a copyright last and who does it belong to?

A

TYPICALLY 70 years after the authors death or 95 years for software created by a company (after which the copyrighted material entered the public domain) or 120 years after the first publication of a work for hire, but it depends on the terms under which the copyright was created - individually or works created under contract.

In the US, the author or whomever the author sells or grants the copyrights to owns them. In other jurisdictions its the person who first registers the work

32
Q

What can the copyright holder do with the rights?

A
The creator is the only entity legally allowed to do the following: 
Perform the work publically. 
Profit from the work. 
Make copies of the work. 
Make derivative works from the original. 
Import or export the work. 
Broadcast the work. 
Sell or otherwise assign these rights.
33
Q

Another word for Copyright Infringement?

A

Piracy

34
Q

Trademarks

Examples

A

Trademark protection is intended to be applied to specific symbol, word, name, colors, musical tune, graphic, or design to identify a PRODUCT or SERVICE. Trademarks are representations of an organization—its brand.

Intended to protect the esteem and goodwill that an organization has built among the marketplace, especially in public perception.

A trademark can be the name of an organization, a logo, a phrase associated with an organization, even a specific color or sound, or some combination of these.

35
Q

Who can register trade marks?

Describe the symbol of items registered?

A

USPTO - US Patent and Trademark Office the federal entity for registering trademarks.
Superscript circle with an R in it

States/State Offices
Superscript TM

36
Q

How long do Trademarks last? Penalty for infringement?

A

Trademarks last in perpetuity as long as the owner continues to use them for commercial purposes

Owners can sue

37
Q

Patents - Description?
How long do they last?
Action owner can take if infringement is suspected?

A

Patents are the legal mechanism for protecting intellectual property in the form of inventions, processes, materials, decorations, and plant life; Strongest form of IP protection; Patent is a public domain document but another person can’t use the patent unless it expires or patent holder licenses use to them

Patents typically last for 20 years from the time of the patent application, but there are provisions for extensions.

Owners can sue if they suspect infringement

38
Q

What organizations are responsible for registering/approving Patents?

A

US Patent and Trade Office (US)
World Intellectual Property Office - WiPO - approves Patents under the Patent Cooperation Treaty which has 152 signatory member nations, where property will be protected in each member country

39
Q

What do patents limit or protect?

A

the patent owner gains exclusivity in the production, sale, and importation of the patented property.

40
Q

Trade secrets

A

Trade secrets are intellectual property that involve information, device, method, technique or process that derives ECONOMIC VALUE from not being generally known, and is kept SECRET (not in the public domain). Must continue to be kept secret. If they need to be disclosed, an NDA is used to enforce confidentiality of disclosed secrets.

Trade secrets protections exist upon creation, without any additional requirement for registration, as long as IP is secret.

Does not grant exclusivity, if others come up with

41
Q

What do trade secrets legally protect?

A

Illicit acquisition

acquire trade secrets by theft or misappropriation

42
Q

Actions if Trade secret protections are violated?

A

Sue in civil court

Prosecuted in federal court for crime

43
Q

Difference in Trade Secret and Copyright? What does Trade Secret have in common with TM?

A

Anyone other than the owner of the trade secret who discovers or invents the same or similar methods, processes, and information through legal means is justified and legally free to use that knowledge to their own benefit.

Last in perpetuity as long as owner is using commercially