Section 30: Policies and Procedures Flashcards
Data Owner
Responsible for labeling the asset and ensuring that it is protected with appropriate controls
Data Steward
A role focused on the quality of the data and associated metadata. Works for the data owner.
Data Custodian
A role responsible for handling the management of the system on which the data assets are stored.
Privacy Officer
A role responsible for the oversight of any PII, etc. assets managed by the company
SOX
Affects publicly traded US corporations and requires certain accounting methods and financial reporting requirements
GLBA
Act that affects financial institutions and PII.
FISMA Act of 2002
All about cybersecurity and to create more across the federal government.
PCI DSS
Contractual obligation if you want to be in compliance for payments
Deidentification
Methods and technologies that remove identifying information from data before it is distributed
Data Masking
placing generic labels in place of the real stuff. It’s like covering it up
Tokenization
A deidentification method where a unique token is substituted for real data
Acceptable Use Policy
Defines the rules that restrict how a computer, network, or other systems may be used
Change Management Policy
Defines the structured way of changing the state of a computer system, network, or IT procedure
Separation of Duties
Sort of like a checks and balances system where you separate out different things so one person doesn’t have to much power
Job Rotation
Different users are trained to perform the tasks of the same position to help prevent and identify fraud that could occur if only one employee had the job