A key principle of an effective privacy policy is that it should be?
A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios.B . Made general enough to maximize flexibility in its application.C . Presented with external parties as the intended audience.D . Designed primarily by the organization's...
Before implementation, a privacy technologist should conduct which of the following?
An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls. Before implementation, a privacy technologist should...
Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house...
What must be done to destroy data stored on "write once read many" (WORM) media?
What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C
Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?
Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?A . Configuring the environment to use shorter error messages.B . Handing exceptions internally and not displaying errors to the user.C . Creating default error pages or error messages...
Which of the following would best improve an organization’ s system of limiting data use?
Which of the following would best improve an organization’ s system of limiting data use?A . Implementing digital rights management technology.B . Confirming implied consent for any secondary use of data.C . Applying audit trails to resources to monitor company personnel.D . Instituting a system of user authentication for company...
Why is first-party web tracking very difficult to prevent?
Why is first-party web tracking very difficult to prevent?A . The available tools to block tracking would break most sites’ functionality.B . Consumers enjoy the many benefits they receive from targeted advertising.C . Regulatory frameworks are not concerned with web tracking.D . Most browsers do not support automatic blocking.View AnswerAnswer:...
What distinguishes a "smart" device?
What distinguishes a "smart" device?A . It can perform multiple data functions simultaneously.B . It is programmable by a user without specialized training.C . It can reapply access controls stored in its internal memory.D . It augments its intelligence with information from the internet.View AnswerAnswer: D Explanation: Reference: https://towardsdatascience.com/what-is-a-smart-device-the-key-concept-of-the-internet-of-things-52da69f6f91b
Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?
After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation: Statement 1 reads: “Please...
You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain...