Terms Flashcards
Accountability
- appropriate technical and organizational measures are in place to protect personal data
FIP
Active Scanning Tools
DLP (data loss prevention) network, storage, scans and privacy tools
to identify security and privacy risks
Monitor for compliance with internal policies and procedures, block email or file transfers
AICPA
American Institute of Certified Public Accountants
WebTrust
CICA - canadian
Anonymization
data is altered so it can no longer be traced back to the individual
Suppression (remove some info)
Generalization (makes some values more broad)
Noise addition ( switches identifying values from one set with another)
POLC
Assess, Protect, Sustain, Respond
POLC Assess
First phase
provides the steps, checklists and processes to assess any gaps in the priv program compared to industry best practices, corporate privacy policies, applicable privacy laws and objective-based privacy program frameworks
POLC Protect
Second phase
provides the DLC, information security practices, and PbD to ‘protect’ PI
POLC Sustain
Third phase
privacy management through the monitoring, auditing and communication aspects of the management framework
POLC Respond
Fourth phase
info requests
legal compliance
incident-response planning
incident handling
aim is to reduce organizational risk and bolster regulatory compliance
Audit Life Cycle
Plan Preparation Conducting Reporting Follow up
BCR
Binding Corporate Rules
faciliate cross border transfers of PI between various entities of a corporate group
SCC
Standard Contractual Clauses
cross border transfers of PI between different corporations
Business Case
Starting point for assessing the needs of the privacy organization
Defines the program needs and ways to meet specific business goals (compliance with laws, regs, ind frameworks, customer requirements)
BCDR
Business Continuity and Disaster Recovery plan
risk mitigation plan to prep an org for crises and ensure critical business functions continue. Focus is to recover from disaster
Centralized governance
one team or person is responsible for privacy-related affairs. everyone flows through this point
Choice
Consent must be freely given and data subjects must have genuine choice to provide PI or not
GDPR requires free choice
CIA Triad
Confidentiality, Integrity, Availability