privacy and sensitive data concepts Flashcards

1
Q

_____ involves stealing ideas, inventions, creative expressions, and trade secrets from a person or company for another’s benefit.

A

Intellectual Property (IP) theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is a database de-identification method where randomly generated tokens substitute all or part of data in a field.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ process is a practice of protecting private or sensitive data by erasing or encrypting identifiers that connect an individual to stored data. The process permanently removes the identifying information.

A

data anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is a de-identification procedure that ensures one or more pseudonyms replace personally identifiable information (PII) fields within a data record. _____ makes the data record less identifiable and is reversible.

A

Pseudonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ is performed to identify vulnerabilities that may lead to data breach when storing, processing, and disclosing Personally Identifiable Information (PII). It also evaluates controls mitigating those risks.

A

Privacy Impact Assessment (PIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____ is an initial audit to determine whether a computer system or workflow collects, stores, or processes PII to a degree where a PIA must be performed.

A

Privacy Threshold Analysis (PTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _____ management model identifies the processes and procedures for managing data from cradle to the grave. This model includes creation, use, retention, and disposal.

A

information life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ role is primarily responsible for data quality. This involves tasks such as ensuring data is labeled and identified with appropriate metadata, and that data is collected and stored in a format that complies with regulations.

A

data steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _____ is responsible for managing the system where the data assets are stored. This includes responsibility for enforcing access control, encryption, along with backup and recovery measures.

A

data custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ has the ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset.

A

data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ collects and analyzes data based on a data collector’s set of predefined instructions.

A

data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ is responsible for determining why and how data is stored, collected, and used within a lawful manner. They define what a data processor should collect and why.

A

data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____ is responsible for oversight of any Personally Identifiable Information (PII) assets managed by a company. This role ensures that the processing and disclosure of PII comply with legal and regulatory frameworks and also oversees the retention of PII.

A

privacy officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An _____ identifies risks and vulnerabilities and the potential impact they could cause an organization or information technology asset. The assessment further identifies methods to limit or mitigate the risks.

A

impact assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ______ is the role mandated by the General Data Protection Regulation (GDPR) that ensures the processing, disclosure, and retention complies with regulatory frameworks.

A

Data Privacy Officer (DPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly