Lesson 2: Summarizing Governance & Compliance Strategies Flashcards

1
Q

What do you understand by PII?

A

Personally identifiable information describes data that can be used to directly or indirectly identify an individual. This covers a very broad range of information and is further subcategorized to include Sensitive PII, which describes US social security numbers, biometrics, financial records, medical records, immigration identifiers, and criminal history. Sensitive PII requires stricter handling and protection than other types of PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PHI?

A

Protected Health Information (PHI) describes data that can be used to identify an individual and includes information about past, present, or future health, as well as related payments and data used in the operation of a healthcare business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PIFI?

A

Personal Identifiable Financial Information (PIFI) describes information about a consumer provided to a financial institution and includes information such as account number, credit/debit card number, personal information (such as name and contact information), and social security number. Generally, PIFI is used to obtain access to a financial product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Intellectual Property or IP?

A

IP describes intangible products of human thought and ingenuity. Intellectual property is protected by various laws such as copyrights, patents, trademarks, and trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is a data owner?

A

The data owner is the entity who is held accountable for the protection of the data under their control. The data owner is responsible for ensuring data is appropriately protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the data owner ensure that the data under their control is protected?

A

The data owner will need to classify the data first and then determine what controls should be implemented to protect it based on that classification level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data classification?

A

Data classification establishes the necessary controls, such as security configurations, encryption, access controls, procedures, and physical security required in order to adequately protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data retention?

A

Data retention defines the timespan for which data must be kept. Retention defines not only the minimum amount of time data must be kept but also the maximum (or “no longer than”) timespan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This control describes the legally compliant means by which data is removed and made inaccessible.

A

Data destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Match the following terms with their definition.
Term Definition
1. Sanitization - a. Refers to the sanitization of the key
used to perform decryption of data,
making recovery of the data
effectively impossible.

  1. Crypto Erased - b. A general term describing the means
    by which information is removed
    from media and includes methods
    such as clear, purge, and damage.
  2. Clear c. Physically breaking a storage device
    to render it useless or inoperable.
  3. Purge d. A type of sanitization that involves
    multiple block-level overwrite cycles.
  4. Damage e. A type of sanitization that provides
    effective protection from all recovery
    techniques, including clean-room
    methods.
A

1 —> b

2 —> a

3 —-> d

4 —> e

5 —> c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you understand by data sovereignty?

A

Data sovereignty identifies that the laws governing the country in which data is stored have control over the data and describes the legal dynamics of data collection and use in a global economy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some data protection considerations that should be taken into account when constructing technology solutions to support the organization?

A

1) Consider the location of the data
2) Consider the location of the data subject
3) Consider the location of the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is a data subject?

A

This is an individual who is identified by privacy data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a standard and a regulation?

A

Regulations establish the legal basis for enforcing compliance with rules and describe the consequences of non-compliance. Standards make things work by providing specifications (guidelines or requirements) for products, services, and systems. If used consistently, they ensure quality, safety, and efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the General Data protection Regulation (GDPR) all about?

A

GDPR enforces rules for organizations that offer services to entities in the European Union (EU) or that collect and/or analyze data on a subject located in the EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 7 principles of GDPR?

A

Lawfulness, fairness and transparency
Purpose limitation
Data minimization
Accuracy
Storage limitation
Integrity and confidentiality (security)
Accountability

17
Q

What is the difference between due care and due diligence?

A

Due care represents a baseline that can be used to determine if reasonable safeguards are in place. Due diligence describes the ongoing and documented effort to continuously evaluate and improve the mechanisms by which assets are protected.

18
Q

What is a legal hold?

A

A legal hold, or litigation hold, describes the notification received by an organization’s legal team instructing them to preserve electronically stored information (ESI) and/or paper documents that may be relevant to a pending legal case.

19
Q

What is e-Discovery?

A

e-Discovery describes the electronic component of identifying, collecting, and providing the electronically stored information (ESI) identified by a legal hold. The scope of information included in e-Discovery can be vast and include everything from files, emails, logs, text messages, voicemail, databases, and social media activity.

20
Q

What is the Wassenaar Arrangement?

A

The Wassenaar Arrangement was established in 1996 and defines export controls for “conventional arms and dual-use goods and technologies.” The arrangement includes 42 participating states and generally defines controls crafted to prevent a destabilizing accumulation of weaponry by any single nation and to prevent advanced weaponry and military capabilities from being acquired by terrorist factions.

21
Q

What is a Master Service Agreement (MSA) used for?

A

Master service agreements are typically “umbrella” contracts that establish an agreement between two entities to conduct business during a defined term (typically a year,) but each engagement within the agreement is typically defined by individual scopes of work that define expectations and deliverables.

22
Q

What is a Non-Disclosure Agreement (NDA)?

A

Non-disclosure agreements are established between entities and define the conditions upon which data and information can be used.

23
Q

What is a Memorandum of Understanding (MOU)?

A

A memorandum of understanding is an extremely useful contract that can be used to establish rules of engagement between two parties. Widely considered as a non-binding agreement, or one that is difficult to enforce in a court setting, MOUs instead serve as a formal means to define roles and expectations.

24
Q

What is an Interconnected Security Agreement (ISA)?

A

An interconnection security agreement is established when two entities need to share data via an interface.

25
Q

What is a Service Level Agreement (SLA)?

A

A contractual agreement setting out the detailed terms under which a service is provided. SLAs typically govern services that are both measurable and repeatable and include an enforcement mechanism that typically includes financial penalties for non-compliance.

26
Q

What is Operational-Level Agreement (OLA)?

A

Operational-level agreements are typically internal documents established by an organization to define the essential operational needs of an organization in order for it to meet the performance metrics defined in a Service Level Agreement.

27
Q

Privacy Level Agreement (PLA)?

A

A Privacy Level Agreement is commonly used when establishing a relationship with a cloud service provider (CSP) and goes beyond the provisions detailed in an SLA to include metrics and measures related to conforming with specific information privacy and data protection requirements.