Domain 3:Compare and contrast concepts and strategies to protect data Flashcards
Personally Identifiable Information (PII):
PII is data that is unique to a person, for example, their social security number, biometric data, driving license number, employee records, mobile phone number, or email address.
Protected Health Information (PHI)
PHI is health data that is unique to a person, such as their medical history, including diseases and treatments and various test results, such as MRI scans or X-rays.
Financial data
This is data related to electronic payments, including bank account details, credit card information, and transaction records, and is subject to financial regulations and laws, such as those related to consumer privacy, anti-money laundering, and fraud prevention, including monitoring of payments and defaults.
Trade secrets
Trade secrets include confidential business dealings that provide a competitive advantage. Protecting trade secrets requires a combination of legal and technical measures, such as Non-Disclosure Agreements (NDAs) and employment contracts, while technical measures involve restricting access to trade secret information and monitoring data flows
Propriety data
Often overlapping with IP or trade secrets, propriety data is data generated by a company, and can also include research or product development work.
Human - readbale data
This is information that can be easily understood by humans, such as text, images, and audio. This data is then encrypted for security.
Non human readable
This data includes binary code, machine language, and encrypted data. To protect non-human-readable data, cryptographic algorithms, secure key management, and secure hardware modules are essential to safeguard sensitive information.
General Data Protection Regulation (GDPR)
EU laws guarding personal data rights and privacy in the digital realm
Health Insurance Portability and Accountability Act (HIPAA)
U.S. regulations securing the privacy of health information.
California Consumer Privacy Act (CCPA)
California legislation empowering consumer data rights and privacy.
Sarbanes-Oxley Act (SOX)
U.S. law ensuring financial transparency and accountability for public companies.
Gramm-Leach-Bliley Act (GLBA)
U.S. act imposing privacy and security rules on financial institutions.
Sensitive data
: Sensitive data, often referred to as “privileged information,” encompasses any information that, if exposed, could lead to harm or undesirable consequences for individuals or organizations. It is a treasure trove
Confidential data: Research and Development (R&D
confidential data as disclosure would cause damage to the company. They have strict legal protection, an example of which is attorney-client privilege. Access to confidential data typically requires authorization or special permission.
Critical data
This is data that is critical for the running of the organization, such as backups or encryption keys, that could cause operation failure if corrupted or lost. It could also be classified and encrypted to prevent an outside party from accessing it.