Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago?
SCENARIO Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive...
Which of the following best describes the basic concept of "Privacy by Design?"
Which of the following best describes the basic concept of "Privacy by Design?"A . The adoption of privacy enhancing technologies. B. The integration of a privacy program with all lines of business. C. The implementation of privacy protection through system architecture. D. The introduction of business process to identify and...
How should the sharing of information within an organization be documented?
How should the sharing of information within an organization be documented?A . With a binding contract. B. With a data flow diagram. C. With a disclosure statement. D. With a memorandum of agreement.View AnswerAnswer: C
What risk is mitigated when routing video traffic through a company’s application servers, rather than sending the video traffic directly from one user to another?
What risk is mitigated when routing video traffic through a company’s application servers, rather than sending the video traffic directly from one user to another?A . The user is protected against phishing attacks. B. The user’s identity is protected from the other user. C. The user’s approximate physical location is...
Which of the following would help mitigate these risks?
An organization is concerned that its aging IT infrastructure will lead to Increased security and privacy risks. Which of the following would help mitigate these risks?A . Vulnerability management. B. Data Loss Prevention. C. Code audits. D. Network Centricity.View AnswerAnswer: A Explanation: vulnerability management would help mitigate the risks of...
The location data collected and displayed on the map should be changed for which of the following reasons?
SCENARIO Please use the following to answer the next questions: Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure...
What is a main benefit of data aggregation?
What is a main benefit of data aggregation?A . It is a good way to perform analysis without needing a statistician.B . It applies two or more layers of protection to a single data record.C . It allows one to draw valid conclusions from small data samples.D . It is...
What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions.B . Encrypting sensitive personal data during collection and storageC . Purchasing insurance to cover the organization in case of a breach.D . Applying industry...
Which is likely to reduce the types of access controls needed within an organization?
Which is likely to reduce the types of access controls needed within an organization?A . Decentralization of data.B . Regular data inventories.C . Standardization of technology.D . Increased number of remote employees.View AnswerAnswer: C
Which of the following statements best describes the relationship between privacy and security?
Which of the following statements best describes the relationship between privacy and security?A . Security systems can be used to enforce compliance with privacy policies.B . Privacy and security are independent; organizations must decide which should by emphasized.C . Privacy restricts access to personal information; security regulates how information should...