Data Privacy Flashcards

1
Q

What is the information life cycle?

A

Creation and receipt - create data internally or receive data from a 3rd party
Distribution - Records are sorted and stored
Use - Make business decision, create products and services
Maintenance - Ongoing data retrieval and data transfers
Disposition - Archiving or disposal of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a PIA?

A

Privacy impact assessment.

This is a way of understanding how new processes or projects will affect customer and corporate data privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between proprietary information, PII, and PHI?

A

Proprietary information
Data that is the property of an organization. Such as trade secrets or other data unique to an organization.

PII - Personally identifiable information
Data that can be used to identify an individual, such as your name, address, phone number, biometric information, etc.

PHI - Protected health information
Health information associated with an individual, such as health status, health care records, payments for health care, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is tokenization?

A

This is a way of using your personal data….without actually using your personal data.
This replaces sensitive data with a non-sensitive placeholder.

SSN 266-12-1112 is now 691-61-8539

Common with credit card processing, you will use a temporary token during payment(especially if you are using NFC).
We are able to tie together tokens and credit card numbers because we have a single database that matches those up.

This isn’t hashing or encryption. The original data and token are not mathematically related.
Lightweight too because you don’t need to use the amount of CPU needed for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data minimization?

A

This is only collecting the data needed to perform the minimum function.

This is relevant in HIPAA and GDPR who both have a “minimum necessary” rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data masking?

A

Data masking is data obfuscation.
Shows the data exists, without being able to see any of it.
May only be hidden from view and exist in storage intact.

This is like when you get a receipt that has your credit card number as:
****2512”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is anonymization?

A

This is taking existing data and making it impossible to identify individual data in a dataset.

Allows for data use without privacy concerns.
Many different anonymization techniques: hashing, masking, etc.

An example of this would be if you were trying to analyze customer purchases and you changed the name phone number and address from the data, but left intact the product name, quantity, total, and sale date.

Anonymization cannot be reversed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is pseudo-anonymization? or pseudonymization.

A

Similar to anonymization but it may be reversible.

This would be done by replacing personal information with pseudonyms, and is often used to maintain statistical relationships in data.
Probably reversible.

One of the ways to do this would be to present a different name every time the record is accessed.
You might have a consistent replacement as well where a name is always changed to the same alternate name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Data owner?

A

This is a person in the organization that is responsible for specific data, often a senior officer.
For example, the VP of sales owns the customer relationship data.
Or the Treasurer owns the financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is a data controller?

A

Data controller are responsible for the purposes and means by which personal data is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is a data processor?

A

Data processors are the people who process data on behalf of the data controller.
Can be a third party.

Lets do an example:
At your company they outsource your payroll to a 3rd party company.
Payroll department at your company are the (data controllers) and define payroll amounts and timeframes.
The company you have hired are (data processors) because they process the payroll and store employee information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who is a data custodian?

A

Same as a data steward.
The words are interchangeable.

This is the name for people who are responsible for data accuracy, privacy, and security.
They associate sensitivity labels to the data.
They also keep your organization compliant with all applicable laws and standards related to the data.
They will also implement security controls and control who can access what information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is a DPO?

A

Data protection officer.
This is a higher seniority member in your company who is responsible for the organizations data privacy, in a managerial type role.
They will set policies, implement processes and procedures, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly