Records Access and Security Flashcards

1
Q

What beliefs are privacy laws based on? (2)

A

Decide what personal info want to divulge, to whom, for what purpose

Info will be kept private, used only for purpose obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the objectives of privacy legislation for governments? (5)

A
Restrict collection
Establish rules for use and disclosure
Set rules for retention
Give individuals access
Offer independent review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the eight principles of person info management practices?

A
Openness
Individual Access
Individual Participation
Collection Limitation
Use limitation
Disclosure Limitation
Information Management 
Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does FOIPOP stand for?

A

Freedom of Information and Protection of Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What info cannot be released under FOIPOP? (4)

A

Some personal info
Info relating to 3rd party
Threats to national security
Info that interferes with law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What info is exempt from FOIPOP? (4)

A

Public domain
Published materials
Materials that can be purchased
Confidences of the Cabinet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does PIPEDA stand for?

A

Personal Information Protection and Electronic Documents Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five principles of PIPEDA?

A

Collect with consent for reasonable purpose
Used and disclosed for limited collection purpose
Accurate
Accessible
Securely Stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the top ten theft techniques?

A
  1. Trash Trawling
  2. Bugs and Wiretaps
  3. Drop bys
  4. Hacking and Cracking
  5. Mobile Phone Leeches
  6. Technology Traitors
  7. Meeting Chameleons
  8. Give aways
  9. Business Phone Attacks
  10. Treason
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you control area and facility access? (4)

A
  1. What you are given
  2. What you know
  3. What you are
  4. Combination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How you can control equipment access? (6)

A
Keep an inventory
Tag equipment
Sign out sheets
Supervised use
Security guards
Security devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can unauthorized access be obtained?

A

Manually
Visually
Through printouts and copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly