Non-technical Data and Privacy Controls Flashcards
The process of managing information over its life cycle from creation to
destruction
Data Governance
The process of applying confidentiality and privacy labels to information
Data Classification
No restrictions on viewing the data and it presents no risk to
the organization is disclosed to the public at large
Unclassified
Viewing is restricted to authorized persons within the owner
organization or to third parties under a non-disclosure
agreement
Classified
Highly sensitive data that is for viewing only by approved
persons within the organization (and possibly by trusted third
parties under NDA)
Confidential
Information that is valuable and must be protected by severely
restricting its viewing
Secret
Information that would cause grave danger if inadvertently
disclosed
Top Secret
The downgrading of a classification label overtime due to the information no
longer requiring the additional security protections provided by that classification
Declassification
A tag or label to identify a piece of data under a subcategory of a classification
Data Type
The organization of information into preset structures or specifications
Data Format
The location of data within a processing system
▪ Data at rest
▪ Data in motion
▪ Data in use
Data State
Any type of information or asset should consider how a compromise of that information can threaten the three core security attributes of the CIA triad
Legal Requirements
Security controls focus on the CIA attributes of the processing system
Privacy versus Security
A data governance requirement that arises when collecting and processing
personal data to ensure the rights of the subject’s data
Privacy
Personal data cannot be collected, processed, or retained without the individual’s
informed consent
General Data Protection Regulation (GDPR)
Sets forth the requirements for the storage and retention of documents relating
to an organization’s financial and business operations, including the type of
documents to be stored and their retention periods
Sarbanes-Oxley Act (SOX)
Sets forth the requirements that help protect the privacy of an individual’s
financial information that is held by financial institutions and others
Gramm-Leach-Bliley Act (GLBA)
Sets forth the requirements for federal organizations to adopt information
assurance controls
Federal Information Security Management Act (FISMA)
Sets forth the requirements that help protect the privacy of an individual’s health
information that is held by healthcare providers, hospitals, and insurance
companies
Health Insurance Portability and Accountability Act (HIPAA)
Provides guidance on a variety of governance-related topics including fraud,
controls, finance, and ethics and relies on COSO’s ERM-integrated framework
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
The principle that personal information can be collected and processed only for a
stated purpose to which the subject has consented
Purpose Limitation
The principle that only necessary and sufficient personal information can be
collected and processed for the stated purpose
Data Minimization
The principle that countries and states may impose individual requirements on
data collected or stored within their jurisdiction
Data Sovereignty
A set of policies, procedures, and tools for managing the storage of persistent
data
Retention