Data Privacy Flashcards

1
Q

refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information

A

Personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

concerns the collection and use of data about individuals

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three (3) primary privacy issues

A

Accuracy, Property, Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

relates to the responsibility of those who collect data to ensure that the data is correct

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

relates to who owns the data

A

Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

relates to the responsibility of those who have data to control who can use that data

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security protects the data, and privacy protects the identity

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a part of the data protection area that deals with proper handling of data, with the focus on compliance and data protection regulations

A

Data privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data privacy focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern the personal data of data subjects. It focuses on how to collect, process, share, archive, and delete the data under the law

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data security focuses on

A

Data breach
Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an unauthorized or unintentional disclosure of confidential information

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the stealing of data or confidential information by electronic means, including ransomware and hacking

A

Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a model designed to guide an organization’s policies on information security

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three (3) elements of data security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ensures that data is accessed only by authorized individuals

A

Confidentiality

17
Q

ensures that information is reliable as well as accurate

A

Integrity

18
Q

ensures that data is both available and accessible to satisfy business needs

A

Availability

19
Q

Data privacy encompasses three (3) elements

A
  • Right of an individual to be left alone and have control over their data
  • Procedures for proper handling, processing, collecting, and sharing of personal data
  • Compliance with data protection laws
20
Q

the process of ingesting, storing, organizing, and maintaining the data created and collected by an organization

A

Data management

21
Q

Data management is at the heart of …

A

Privacy

22
Q

Information privacy is considered an important aspect of ..

A

Information sharing

23
Q

Information privacy may be applied in numerous ways, including ..

A
  • Encryption
  • Authentication
  • Data masking
24
Q

Information privacy includes the regulations required for companies to protect data

A

True

25
Q

Information privacy also relates to different data types

A
  • Internet Privacy
  • Financial Privacy
  • Medical Privacy
26
Q

All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website’s intended use of collected online and/or offline collected data

A

Internet Privacy

27
Q

Financial information is particularly sensitive, as it may easily use to commit online and/or offline fraud

A

Financial Privacy

28
Q

All medical records are subject to stringent laws that address user access privileges. By law, security, and authentication systems are often required for individuals that process and store medical records

A

Medical Privacy