Data Privacy (Prelims) Flashcards

1
Q

Refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information.

A

Personal Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concerns the collection and use of data about individuals.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three (3) primary privacy issues?

A

Accuracy, Property, Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Relates to the responsibility of those who collect data to ensure that the data is correct.

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Relates who owns the data

A

Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Relates to the responsibility of those who have data to control who can use that data.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a part of the data protection area that deals with the proper handling of data, with the focus on compliance with data protection regulations.

A

Data Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Focuses on the rights of the individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern the personal data of data subjects.

A

Data Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure.

A

Data Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An unauthorized or unintentional disclosure of confidential information.

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The stealing of data or confidential information by electronic means, including ransomware, and hacking.

A

Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a model designed to guide an organization’s policies on information security.

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ensures that the data is accessed only by authorized individuals.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensures that information is reliable as well as accurate

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three (3) Key Elements of Data Privacy

A

-Right of an individual to be left alone and have control over their data.

-Procedures of proper handling, processing, collecting, and sharing of personal data.

-Compliance with data protection laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ensures that data is both available and accessible to satisfy business needs.

A

Availability

16
Q

The process of ingesting, storing, organizing, and maintaining the data created by an organization.

A

Data Management

17
Q

All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website’s intended use of collected online and/or offline collected data.

A

Internet Privacy

18
Q

Financial information is particularly sensitive, as it may easily use to commit online and/or offline fraud.

A

Financial Privacy

19
Q

All medical records are subject to stringent laws that address users access privileges. By law, security and authentication systems are often required for individuals to process and store medical records.

A

Medical Privacy

20
Q

It is considered an important aspect of information sharing. With the advancement of the digital age, personal information vulnerabilities have increased.

A

Information privacy