Module 2 Flashcards
The Role of the Technology Professional in Privacy
Privacy Policies
Are internal documents that inform employees on how to protect consumer data. This will include information about privacy and security and data management and loss prevention. These policies need to be documented, accessible, current, endorsed and enforced.
Security Policies
Is a document that spells out the rules, expectations and overall approach that an organization uses to maintain the confidentiality, integrity and availability of its data.
Data Classification Policy
Measure to secure data; The need to have policies that establish and enforce granting and revoking access to assets and information according to their classification. Employees that handle sensitive data should only be used to perform specific tasks.
Data Schema
Measure to secure data; It is used to separated customer data. It formulates constraints to be applied on the data, defines its entities and the relationships among them.
Data Retention
Measure to secure data; Policies that align with laws and regulation concerning the storage of data. These policies should establish data retention schedules, backup storage and removal of data when no longer of use to business’s objectives.
Data Deletion
Measure to secure data; The disposal of data when it is no longer needed, including the removal of recovery methods and any derivatives from the system.
Data Inventories
Comprehensive record of an oragnization’s data assets, including where it’s stored, how it’s used, and what it is. Also known as a data map.
Privacy Impact Assessments (PIAs)
Used to identify and reduce the privacy risks that might come from a new project, system, or technology. It’s like a checklist that helps an organization make sure that they are protecting people’s personal information properly. Looks at how personal data is handled during an organization’s data life cycle.
Data Protection Impact Assessment (DPIA)
Tool that organizations use to find and reduce risks to people’s personal data when they are planning a new project or system. It’s like a safety check to make sure that any personal information, like names, addresses, or health records, is handled in a way that keeps it private and secure. This is a requirement under certain privacy regulations.
Compliance
Refers to the adherence to laws, regulations, standards, and guidelines that govern how data is collected, stored, processed, and shared. Ensures an organization is following all relevant external and internal rules that apply to its operations.
Privacy
Refers to the protection of an individual’s personal information and their right to contol how their data is collected, used, shared, and stordee. Ensures that data about individuals is handled in a way that respects their rights and maintains the confidentiality of sensitive information.
Reasonable assurance
Implies that the requirements and objective are not absolute and are based on criteria that is practical to implement and manage.
Put another way, in data privacy refers to the concept of implementing sufficient and appropriate controls to protect data from unauthorized access, disclosure, or misuse, while recognizing that absolute security is not always possible. It reflects a balance between achieving security goals and considering practical constraints like cost, technology, and operational impacts.
Internal Controls
Are policies, procedures and practices put in place to ensure that data is accurate, reliable and secure.
Preventative
A type of internal control that stops an activity
Detective
A type of internal control that identifies problematic activity.