Terms Flashcards

1
Q

Accountability

A
  • appropriate technical and organizational measures are in place to protect personal data

FIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Scanning Tools

A

DLP (data loss prevention) network, storage, scans and privacy tools
to identify security and privacy risks

Monitor for compliance with internal policies and procedures, block email or file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AICPA

A

American Institute of Certified Public Accountants

WebTrust

CICA - canadian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anonymization

A

data is altered so it can no longer be traced back to the individual

Suppression (remove some info)
Generalization (makes some values more broad)
Noise addition ( switches identifying values from one set with another)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

POLC

A

Assess, Protect, Sustain, Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

POLC Assess

A

First phase

provides the steps, checklists and processes to assess any gaps in the priv program compared to industry best practices, corporate privacy policies, applicable privacy laws and objective-based privacy program frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POLC Protect

A

Second phase

provides the DLC, information security practices, and PbD to ‘protect’ PI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

POLC Sustain

A

Third phase

privacy management through the monitoring, auditing and communication aspects of the management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POLC Respond

A

Fourth phase

info requests
legal compliance
incident-response planning
incident handling

aim is to reduce organizational risk and bolster regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit Life Cycle

A

Plan Preparation Conducting Reporting Follow up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BCR

A

Binding Corporate Rules

faciliate cross border transfers of PI between various entities of a corporate group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCC

A

Standard Contractual Clauses

cross border transfers of PI between different corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Case

A

Starting point for assessing the needs of the privacy organization

Defines the program needs and ways to meet specific business goals (compliance with laws, regs, ind frameworks, customer requirements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BCDR

A

Business Continuity and Disaster Recovery plan

risk mitigation plan to prep an org for crises and ensure critical business functions continue. Focus is to recover from disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Centralized governance

A

one team or person is responsible for privacy-related affairs. everyone flows through this point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Choice

A

Consent must be freely given and data subjects must have genuine choice to provide PI or not

GDPR requires free choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FIP

A

Access & amendment
Accountability
Authority
Minimization
Quality and integrity
Individual Participation
Purpose specification and use limitation
Security
Transparency

19
Q

Data Breach

A

unauthorized acquisition of data that compromises the security, confidentiality or integrity of PI

20
Q

Data Controller

A

person, public authority, agency or body that determines the purposes and means of the processing of personal data

21
Q

Data inventory

A

record of authority

identifies personal data as it moves across various systems

how data is shared, organized and it’s location

22
Q

DLM

A

Data Life Cycle Management (ILM)

policy-based approach to managing the flow of information through a life cycle from creation to final disposition

Enterprise objectives
minimalism
simplicity of procedures and training
adequacy of infrastructure
infomation security
authenticity and accuracy of records
retrievability
distribution controls
auditability
consistency of policies
enforcement

23
Q

DPIA

A

Data Protection Impact Asssessment

assess and identify the privacy and data protection impacts of products they offer and services they provide

Identify impact and risks and prevent or minimize the risk

GDPR requirement when there is a high risk to the rights and freedoms of persons

24
Q

Decentralized governance

A

local governance

delegation of decision-making to the lower levels of the org. Fewer tiers in the org structure, wider span of control, bottom-to-top flow

25
Q

HIPAA

A

Patients have to opt-in before info can be shared with other orgs, except for treatment, payment and healthcare operations

26
Q

Hybrid governance

A

combo of local and centralized governance strategies

large, global orgs

Assign main individual responsibility and local entities then fulfill and support the policies and directives from the central governing body

27
Q

Information Life Cycle

A

Collection to deletion

collection processing use disclosure retention destruction

28
Q

Metric Life Cycle

A

processes and methods to sustain a metric to match needs of organization

1 ID intended audience
2 Define data sources
3 Select privacy metrics
4 Collect and refine of systems/application collection points
5 analysis of the data/metrics to provide value and provide a feedback quality mechanism

29
Q

Metrics

A

facilitate decision-making and accountability thru collection, analysis and reporting of data

measurable, meaningful, clearly defined, indicate progress and answer specific question

30
Q

NIST

A

Core
Profiles
Tiers

31
Q

PbD

A

Proactive not reactive
Privacy by default
Embedded in design
Full Functionality + sum
End to End Security
Visible and transparent
Users privacy rights respected

32
Q

Privacy Champ

A

an executive who serves as the privacy program sponsor and advocates for privacy program as an org concept

33
Q

PMM

A

Privacy Maturity Model

Ad Hoc Repeatable Defined Managed Optimized

ad hoc - informal
repeatable - not fully documented, doesnt cover all aspects
defined - fully documented, covers all aspects
managed - reviews are conducted to assess effectiveness
optimized - review and feedback are used to ensure CI towards optimization

34
Q

PTA

A

Privacy Threshold Analysis
a tool used to determine if a PIA should be conducted

35
Q

PETs

A

Privacy enhancing tech

developed to be used for the transmission, storage and use of privacy data

36
Q

Strategic Management

A

the first high-level task necessary to implement proactive privacy management.

Three sub tasks:
1 define the org’s privacy vision and mission statement
2 develop privacy strategy
3 structure privacy team

37
Q

Vendor management

A

Assessment of a third-party vendor for the vendor’s privacy and information security policies, access controls, where the personal information will be held and who has access to it. Privacy/security questionnaires, privacy impact assessments and other checklists can be used to assess this risk.

38
Q

Audit Phases

A

Plan
Prepare
Audit
Report
Follow up

39
Q

Types of Audits

A

1st Party - internal
2nd - supplier
3rd - external (usually for NIST cert, etc)

40
Q

Types of Monitoring

A

compliance
regulation
environment
training data

41
Q

Main benefit and objective for privacy program framework?

A

helps a business maintain privacy and data governance and prevent data breaches while complying with regulations

42
Q

Consider __ when determining the scope of a privacy program

A

the personal data collected and processed by an organization

43
Q

Black Box effect

A

it is not always possible to explain why an AI model has generated a particular output or decision

44
Q
A