Which of the following statements describes an acceptable disclosure practice?
Which of the following statements describes an acceptable disclosure practice?A . An organization's privacy policy discloses how data will be used among groups within the organization itself.B . With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.C . Intermediaries processing sensitive data on behalf...
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?A . Verifying the accuracy of the data by contacting users.B . Validating the company's data collection procedures.C . Introducing erroneous data to see if its detected.D . Tracking changes to data through auditing.View...
What is a main benefit of data aggregation?
What is a main benefit of data aggregation?A . It is a good way to perform analysis without needing a statistician.B . It applies two or more layers of protection to a single data record.C . It allows one to draw valid conclusions from small data samples.D . It is...
Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?
Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?A . A group of hackers infiltrate a power grid and cause a major blackout.B . An insurance company raises a person's rates based on driving habits gathered from a connected car.C ....
When releasing aggregates, what must be performed to magnitude data to ensure privacy?
When releasing aggregates, what must be performed to magnitude data to ensure privacy?A . Value swapping.B . Noise addition.C . Basic rounding.D . Top coding.View AnswerAnswer: B
What is true of providers of wireless technology?
What is true of providers of wireless technology?A . They have the legal right in most countries to control and use any data on their systems.B . They can see all unencrypted data that crosses the system.C . They are typically exempt from data security regulations.D . They routinely backup...
Which is NOT a suitable action to apply to data when the retention period ends?
Which is NOT a suitable action to apply to data when the retention period ends?A . Aggregation.B . De-identification.C . Deletion.D . Retagging.View AnswerAnswer: C
Which activity would best support the principle of data quality?
Which activity would best support the principle of data quality?A . Providing notice to the data subject regarding any change in the purpose for collecting such data.B . Ensuring that the number of teams processing personal information is limited.C . Delivering information in a format that the data subject understands.D...
What distinguishes a "smart" device?
What distinguishes a "smart" device?A . It can perform multiple data functions simultaneously.B . It is programmable by a user without specialized training.C . It can reapply access controls stored in its internal memory.D . It augments its intelligence with information from the internet.View AnswerAnswer: D
Which of the following suggests the greatest degree of transparency?
Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collectionB . The data subject has multiple opportunities to opt-out after collection has occurred.C . A privacy notice accommodates broadly defined future collections for new products.D . After reading the...