Ted's implementation is most likely a response to what incident?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
What has been identified as a significant privacy concern with chatbots?
What has been identified as a significant privacy concern with chatbots?A . Most chatbot providers do not agree to code audits B. Chatbots can easily verify the identity of the contact. C. Users’ conversations with chatbots are not encrypted in transit. D. Chatbot technology providers may be able to read...
What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?
Many modern vehicles incorporate technologies that increase the convenience of drivers, but collect information about driver behavior in order to Implement this. What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?A . Share the sensitive data collected about driver behavior with the driver. B. Derive implicit consent...
Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...
Which is NOT a way to validate a person's identity?
Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader. B. Using a program that creates random passwords. C. Answering a question about "something you know”. D. Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B
All of the following topics should be included in a workplace surveillance policy EXCEPT?
All of the following topics should be included in a workplace surveillance policy EXCEPT?A . Who can be tracked and when. B. Who can access surveillance data. C. What areas can be placed under surveillance. D. Who benefits from collecting surveillance data.View AnswerAnswer: D Explanation: who benefits from collecting surveillance...
Before implementation, a privacy technologist should conduct which of the following?
An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls. Before implementation, a privacy technologist should...
Which of the following is a stage in the data life cycle?
Which of the following is a stage in the data life cycle?A . Data classification. B. Data inventory. C. Data masking. D. Data retention.View AnswerAnswer: D Explanation: The stages in a typical data lifecycle include creation/collection, processing, storage/retention, usage/access/sharing/distribution, archival/preservation and destruction/deletion/disposition 3. Among these options provided here only “Data...
Which is NOT a drawback to using a biometric recognition system?
Which is NOT a drawback to using a biometric recognition system?A . It can require more maintenance and support. B. It can be more expensive than other systems C. It has limited compatibility across systems. D. It is difficult for people to use.View AnswerAnswer: A
What must be done to destroy data stored on "write once read many" (WORM) media?
What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption. B. The erase function must be used to remove all data. C. The media must be physically destroyed. D. The media must be reformatted.View AnswerAnswer: C