What is a mistake organizations make when establishing privacy settings during the development of applications
What is a mistake organizations make when establishing privacy settings during the development of applications? A. Providing a user with too many choices. B. Failing to use “Do Not Trackā technology. C. Providing a user with too much third-party information. D. Failing to get explicit consent from a user on the use of cookies.
Granting data subjects the right to have data corrected, amended, or deleted describes?
Granting data subjects the right to have data corrected, amended, or deleted describes? A. Use limitation. B. Accountability. C. A security safeguard D. Individual participation Reference: https://www.ncbi.nlm.nih.gov/books/NBK236546/
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information? A. Individual participation. B. Purpose specification. C. Collection limitation. D. Accountability. Reference: http://oecdprivacy.org
Which activity would best support the principle of data quality?
Which activity would best support the principle of data quality? A. Providing notice to the data subject regarding any change in the purpose for collecting such data. B. Ensuring that the number of teams processing personal information is limited. C. Delivering information in a format that the data subject understands. D. Ensuring that information remains […]
What is the most important requirement to fulfill when transferring data out of an organization?
What is the most important requirement to fulfill when transferring data out of an organization? A. Ensuring the organization sending the data controls how the data is tagged by the receiver. B. Ensuring the organization receiving the data performs a privacy impact assessment. C. Ensuring the commitments made to the data owner are followed. D. […]
What is the distinguishing feature of asymmetric encryption?
What is the distinguishing feature of asymmetric encryption? A. It has a stronger key for encryption than for decryption. B. It employs layered encryption using dissimilar methods. C. It uses distinct keys for encryption and decryption. D. Itis designed to cross operating systems. Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties
Which is NOT a suitable action to apply to data when the retention period ends?
Which is NOT a suitable action to apply to data when the retention period ends? A. Aggregation. B. De-identification. C. Deletion. D. Retagging.
What is the main function of a breach response center?
What is the main function of a breach response center? A. Detecting internal security attacks. B. Addressing privacy incidents. C. Providing training to internal constituencies. D. Interfacing with privacy regulators and governmental bodies.
Which of the following became a foundation for privacy principles and practices of countries and organizations
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe? A. The Personal Data Ordinance. B. The EU Data Protection Directive. C. The Code of Fair Information Practices. D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles. Reference: https://privacyrights.org/resources/review-fair-information-principles-foundation-privacy-public-policy
What was the first privacy framework to be developed?
What was the first privacy framework to be developed? A. OECD Privacy Principles. B. Generally Accepted Privacy Principles. C. Code of Fair Information Practice Principles (FIPPs). D. The Asia-Pacific Economic Cooperation (APEC) Privacy Framework. Reference: http://oecdprivacy.org