Info Management in US Flashcards
What is Data inventory and why does it matter?
Organizations need to know all of the data that they have access to, control over, etc. This is important to help classify the data and properly manage it.
What is data classification, and how is it usually determined?
The classification level assigned to data defines the clearance of individuals who can access or handle that data, as well as the baseline level of protection that is appropriate for that data.
Typically determined based on the sensitivity level of the data (higher sensitivity = more classified)
What are the four steps of information management program development?
Discovery
Build
Communicate
Evolve
What should organizations consider during the “Discovery” phase of info management program development?
Consider:
* Accountability
* Company policy goals
* PI data inventory
* Data locations
* Data sharing
* Data transfers
* Data flows
* Data classification
* Data risk
Tasks include:
* Self-assessing and identifying privacy risk
* Classifying PI according to sensitivity
* Developing and documenting best practices
What should organizations consider during the “Build” phase of info management program development?
building a privacy program that both facilitates and restricts the flow of personal information (as appropriate).
This includes:
* Internal privacy policies
o Enforceable legal documents (contracts)
o Policy reviews
- External privacy notices
o Common practices, sometimes required by law
o Promises to consumers
o Notices that accurately reflect policy and practices
o Version control
o Accessible online
What should organizations consider during the “Communicate” phase of info management program development?
Communication is key, as well as:
* Documenting and updating policies and procedures
* Conveying policies, procedures and goals to decision-makers and consumer-facing employees
* Training and awareness programs for staff and management
* Individual accountability for compliance
What should organizations consider during the “Evolve” phase of info management program development?
Once an information management program is established, there must be a process for review and update. Failure to do so can result in a company falling out of compliance with its public privacy promises or failing to meet other organizational goals.
Key actions include:
* Affirmation and monitoring
o Do policies and practices still comply with law, conform with company needs and support incident response programs?
- Adaptation
o What changes are necessary to comply with new laws, current company goals and industry practices?
What are the four primary roles of the privacy professional?
Researching laws, guidelines, common practices and tools;
Monitoring current events and changing guidelines to provide guidance to the organization;
Educating the organization about privacy laws, organizational policies, risks and recommended practices;
Designing and recommending policies and procedures for the organization
When designing and administering an privacy program, what types of risk should an organization consider?
Legal Risks - noncompliance with laws or contracts
Reputational Risks - damaging trust in the brand
Operational Risks- affecting efficiency, inhibiting innovative uses of personal data
Investment Risks- hampering org from receiving ROI in info, IT, info processing programs
How should organizations manage User Preferences when it comes to personal data?
Users should have the choice to opt in before data is used or collected and opt out of information being sold or shared with third parties. Users should also have access to personal information held about them as well as the ability to challenge accuracy of the data.
What are the steps to develop an Incident Response program?
Preparation- train, prepare
Identification- ID an incident
Containment: Limiting the damage of the incident and isolating affected systems to prevent further damage
Eradication Finding the root cause of the incident and removing affected systems from the production environment
Recovery Permitting affected systems back into the production environment and ensuring no threat remains
Lessons Learned: document, learn from it
Which members of an organization need to complete privacy training?
Everyone who handles personal information, including those who make decisions regarding it, such as leadership, should be trained in privacy.
What questions should privacy professionals ask to determine Accountability?
- Where, how and for what length of time should the data be stored?
- How sensitive is the information?
- Will the information be transferred to or from other countries, and if so, how will it be transferred?
- Who determines the rules that apply to the information?
- How will the information be processed, and how will these processes be maintained?
What is a privacy notice?
A statement made to a data subject that describes how an organization collects, uses, retains, and discloses PI. May be referred to as a privacy statement, a fair processing statement, or sometimes, a privacy policy.
IAPP states that notices are external and policies are internal?
What are key considerations when it comes to vendor management?
Vendor agreements should contain clear data ownership language
i. Data Ownership Provisions:
1. Customer retains uninhibited data ownership
2. Vendor’s right to use information is limited to activities performed on behalf of the customer
3. Vendor’s right to use information is limited o activities performed with the customer’s knowledge
4. Vendor must delete information at the end of the contract