privacy and sensitive data concepts Flashcards
_____ involves stealing ideas, inventions, creative expressions, and trade secrets from a person or company for another’s benefit.
Intellectual Property (IP) theft
_____ is a database de-identification method where randomly generated tokens substitute all or part of data in a field.
Tokenization
A _____ process is a practice of protecting private or sensitive data by erasing or encrypting identifiers that connect an individual to stored data. The process permanently removes the identifying information.
data anonymization
_____ is a de-identification procedure that ensures one or more pseudonyms replace personally identifiable information (PII) fields within a data record. _____ makes the data record less identifiable and is reversible.
Pseudonymization
A _____ is performed to identify vulnerabilities that may lead to data breach when storing, processing, and disclosing Personally Identifiable Information (PII). It also evaluates controls mitigating those risks.
Privacy Impact Assessment (PIA)
A _____ is an initial audit to determine whether a computer system or workflow collects, stores, or processes PII to a degree where a PIA must be performed.
Privacy Threshold Analysis (PTA)
The _____ management model identifies the processes and procedures for managing data from cradle to the grave. This model includes creation, use, retention, and disposal.
information life cycle
A _____ role is primarily responsible for data quality. This involves tasks such as ensuring data is labeled and identified with appropriate metadata, and that data is collected and stored in a format that complies with regulations.
data steward
A _____ is responsible for managing the system where the data assets are stored. This includes responsibility for enforcing access control, encryption, along with backup and recovery measures.
data custodian
A _____ has the ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset.
data owner
A _____ collects and analyzes data based on a data collector’s set of predefined instructions.
data processor
A _____ is responsible for determining why and how data is stored, collected, and used within a lawful manner. They define what a data processor should collect and why.
data controller
A _____ is responsible for oversight of any Personally Identifiable Information (PII) assets managed by a company. This role ensures that the processing and disclosure of PII comply with legal and regulatory frameworks and also oversees the retention of PII.
privacy officer
An _____ identifies risks and vulnerabilities and the potential impact they could cause an organization or information technology asset. The assessment further identifies methods to limit or mitigate the risks.
impact assessment
The ______ is the role mandated by the General Data Protection Regulation (GDPR) that ensures the processing, disclosure, and retention complies with regulatory frameworks.
Data Privacy Officer (DPO)