Which of the following suggests the greatest degree of transparency?
Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collection B. The data subject has multiple opportunities to opt-out after collection has occurred. C. A privacy notice accommodates broadly defned future collections for new products. D. After reading the...
Which is NOT a drawback to using a biometric recognition system?
Which is NOT a drawback to using a biometric recognition system?A . It can require more maintenance and support. B. It can be more expensive than other systems C. It has limited compatibility across systems. D. It is difcult for people to use.View AnswerAnswer: D
Which data practice is Barney most likely focused on improving?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?A . Individual participation. B. Purpose specifcation. C. Collection limitation. D. Accountability.View AnswerAnswer: A
Granting data subjects the right to have data corrected, amended, or deleted describes?
Granting data subjects the right to have data corrected, amended, or deleted describes?A . Use limitation. B. Accountability. C. A security safeguard D. Individual participationView AnswerAnswer: D
What is the main beneft of using dummy data during software testing?
What is the main beneft of using dummy data during software testing?A . The data comes in a format convenient for testing. B. Statistical disclosure controls are applied to the data. C. The data enables the suppression of particular values in a set. D. Developers do not need special privacy...
What is the main function of a breach response center?
What is the main function of a breach response center?A . Detecting internal security attacks. B. Addressing privacy incidents. C. Providing training to internal constituencies. D. Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B
Which of the following should Kyle recommend to Jill as the best source of support for her initiative?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...
Which procedure should be employed to identify the types and locations of data held by Wesley Energy?
SCENARIO Wesley Energy has fnally made its move, acquiring the venerable oil and gas exploration frm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. `The old...
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance. B. The EU Data Protection Directive. C. The Code of Fair Information Practices. D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D