Policies Flashcards

1
Q

What are the seven principles of Privacy by Design?

A
  1. Proactive, not reactive; preventative, not remedial
  2. Privacy as the default
  3. Privacy embedded into design
  4. Full functionality—positive-sum, not zero-sum
  5. End-to-end security—life cycle protection
  6. Visibility and transparency
  7. Respect for user privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two major groups of privacy design strategies?

A

Process-oriented strategies and Data-oriented strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are process-oriented privacy design strategies?

A

Process-oriented strategies guide the processes that ensure the responsible handling of personal data by:
* Enforcing established policies and processes
* Demonstrating compliance with policies and processes
* Informing the individual about how their data will be handled
* Providing users with control over how their data will be handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are data-oriented privacy design strategies?

A

Data-oriented strategies use technical measures to protect personal data by:
* Separating the processing of data, either logically or physically
* Minimizing how much data is collected and processed
* Abstracting data (by summarizing, grouping or approximating) to limit the amount of detail in the data
* Hiding data in ways that make it unconnectable or unobservable to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ISO/IEC 27701?

A

ISO/IEC 27701 is considered the first mainstream global privacy management standard. It defines processes and provides guidance for protecting personal information on an ongoing, evolving basis and specifies the requirements for establishing, implementing, maintaining and continually improving a privacy-specific information security management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are four examples of obfuscation?

A

Masking: Masking is a means of permitting parts of a sensitive value to be visible while leaving the remainder of the value shielded from view.

Randomization: Randomization uses random information or randomizes the data to complicate linking personal information back to an individual.

Noise: Noise adds false data to information to complicate identification of valid personal information.

Hashing: Hashing is taking user identifications and converting them into an ordered system to track the user’s activities without directly using personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of Data Minimization?

A

Data segregation: Data segregation stores data in different areas to prevent aggregation or access to large amounts of data or linking data.

Compression: Compressing data, such as an audio file, maintains its comprehensibility while removing characteristics that may distinguish an individual.

Aggregation: Data aggregation is the process of combining data from multiple records so that the combined data reflects the attributes of a group versus an individual.

Deletion: Deleting unneeded or expired data is one of the best ways to remove the risk that can come from having too much data.

Deidentification: Deidentification is an action to remove identifying characteristics from data. Deidentified data is information that does not actually identify an individual. Some laws require specific identifiers to be removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name five common security practices

A

Data loss prevention (DLP): DLP helps to ensure that sensitive data is not inadvertently released to the wrong person or entity.

Destruction: At the end of its life cycle, data should be destroyed.

Encryption: Encryption is the process of obscuring information, often through the use of a cryptographic scheme, in order to make the information unreadable without special knowledge, i.e., the use of code keys.

Auditing and testing: Auditing and testing are essential to verify that privacy requirements are being met and to validate the appropriateness of those requirements.

Access controls for physical and virtual systems: Access control is a mechanism by which access permission to a resource is managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name two new privacy enhancing technologies

A

Differential privacy: Differential privacy is a database technique that permits the analysis of user data stored within the database without revealing any information about individuals that is unavailable to those without access to the database.

Homomorphic encryption: Homomorphic encryption is a type of advanced technology that prevents raw data from being accessed while still allowing for analysis of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Vendors should be held to the same privacy standards as the organization they serve.

A

True! When engaging vendors, remember to: create a policy that outlines selection and logistics; identify vendors and their legal obligations; evaluate risk, policies and server locations; develop a thorough contract; and monitor vendors’ practices and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Vendors that provide cloud computing services may pose distinct privacy challenges

A

Therefore, a cloud computing acceptable use policy should: maintain compliance; require that agreements be approved by leadership; maintain data privacy and security; and mitigate risks of using cloud-based services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How long are you allowed to keep data under the GDPR?

A

No specified timeframe- it’s as long as you have a legitimate business purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the common goals of internal information security policies?

A

protecting against unauthorized access; providing stakeholders with information efficiently, while maintaining confidentiality, integrity and availability; promoting compliance with laws, regulations, standards and other organizational policies; and promoting data quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly