A key principle of an effective privacy policy is that it should be?
A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios.B . Made general enough to maximize flexibility in its application.C . Presented with external parties as the intended audience.D . Designed primarily by the organization's...
Which of the following would best improve an organization’ s system of limiting data use?
Which of the following would best improve an organization’ s system of limiting data use?A . Implementing digital rights management technology.B . Confirming implied consent for any secondary use of data.C . Applying audit trails to resources to monitor company personnel.D . Instituting a system of user authentication for company...
What is the main benefit of using dummy data during software testing?
What is the main benefit of using dummy data during software testing?A . The data comes in a format convenient for testing.B . Statistical disclosure controls are applied to the data.C . The data enables the suppression of particular values in a set.D . Developers do not need special privacy...
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?A . Verifying the accuracy of the data by contacting users.B . Validating the company’s data collection procedures.C . Introducing erroneous data to see if its detected.D . Tracking changes to data through auditing.View...
Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...
Which activity would best support the principle of data quality?
Which activity would best support the principle of data quality?A . Providing notice to the data subject regarding any change in the purpose for collecting such data.B . Ensuring that the number of teams processing personal information is limited.C . Delivering information in a format that the data subject understands.D...
What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions.B . Encrypting sensitive personal data during collection and storageC . Purchasing insurance to cover the organization in case of a breach.D . Applying industry...
Ted's implementation is most likely a response to what incident?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?A . The implied consent model provides the user with more detailed data collection information.B . To secure explicit consent, a user's website browsing would be significantly disrupted.C ....
Which of the following suggests the greatest degree of transparency?
Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collectionB . The data subject has multiple opportunities to opt-out after collection has occurred.C . A privacy notice accommodates broadly defined future collections for new products.D . After reading the...