process oriented strategies Flashcards

1
Q

4 focuses of process oriented strategies

A

(1) enforcing policies and processes,
(2) demonstrating compliance,
(3) informing the individual, and
(4) providing user control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Create policies

A

Organizations should create internal privacy policies that best describe how the
organization wishes to manage—and plans to protect—personal information; this includes ensuring
that company employees are adhering to these policies. Processes should include specific strategies
and tactics for data protection, such as hash functions, truncation, tokenization, or cryptography,
as well as contextual policies that explain the reason or purpose for privacy practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintain policies

A

Organizations should maintain established policies and processes to ensure consistency
of privacy practices throughout the organization. An example of an inconsistent policy would be if
an organization had very strong controls in place to protect customer credit card numbers but did
not have established policies for protecting their own employees’ data. Another example would be
if the organization had a strong policy regarding protecting customer credit card data for one
stakeholder, but less stringent policies for a different stakeholder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uphold (policies)

A

Organizations should uphold privacy and data protection policies as guiding principles
across the organization, treating personal information as an asset and privacy as a primary goal.
Upholding privacy and data protection policies—through employee training, process auditing, and
policy compliance enforcement—helps to demonstrate that the organization values, and is
dedicated to protecting, personal information in all forms and contexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

log (demonstrating compliance)

A

Track all processing of data and review the information for anything that may present a risk.
Any deviations from standard processing procedures, whether due to design, chance, or malicious
actions, should be logged. Logs should be periodically reviewed so that post-activity sanctions,
process changes or technology changes can be imposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

audit (demonstrating compliance)

A

Perform audits regularly to ensure that logging and organizational activities are following
established processes. Auditing provides visibility and an understanding of risks and ensures that
both formal and informal processes are identified, managed and followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

report (demonstrating compliance)

A

Periodically collect information on tests, audits, and logs, and report feedback to those
personnel who are responsible for policy and process implementation within the organization. This
allows organizations to look at their privacy activities holistically and to use that information to
improve privacy practices and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

key steps to demonstrating compliance

A

log, audit, report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key steps to informing the individual

A

supply, notify, explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

key steps to user consent

A

consent, choice, amend, delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

key steps to policy enforcement

A

create, maintain, uphold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly