CIPM Ch 6 Repond Flashcards

1
Q

Privacy incident response

A

Can often leverage an existing cybersecurity response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data subject request and privacy rights

A

. Data subject requests include enabling data subjects to contact organizations
- to inquire about the use of that personal data,
-to enact corrections to the person information,
-to Lodge complaints,
-to request that their information be transferred to another organization,
-and to request that their rights be removed from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data subject request

A

. Inquiries and requests that a person may lodge with an organization

. Typically maintain a log of inquiries

. organizations must respond within a specific time frame which are sometimes spelled out in regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With the authorities

A

The most important ingredients to a successful relationship and encounter with external parties is the completeness and integrity of business information including the following:

.Up to date process information.
. Data flow diagrams
. effective processes
. Complete and accurate business records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy incident response

A

Is any event in which one or more data subjects’ personal information has been inappropriately used or disclosed in a manner contrary to applicable laws or regulations or security or privacy policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

phases of incident response

A

. planning
. Detection
. Initiation
. Status updates
. Analysis
. Containment
. Eradication
. Recovery
. Remediation
. Closure
. Post-incident review
. retention of evidence
. Incident reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Planning

A

Steps involves the development of written response procedures that are followed when an incident occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detection

A

Represents the time when an organization is initially aware that a privacy incident is taking place or has taken place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initiation

A

Declaration of an incident, followed by notification sent to response team members so that response operations should commence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Status updates

A

Incident Response Team should have established methodologies, formats, frequencies, and recipients of regular status updates to keep management and others formed as the incident investigation unfolds, progress, and leads to containment, and medication, recovery, remediation, and closer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analysis

A

Response team members analyze data to understand the calls, scope, and impact of the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Containment

A

Incident responders before more direct actions that halt the progress for the advancement of an incident in this phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eradication

A

Responders to take steps to remove the source of the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Recovery

A

Or recovered to their pre-incident state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remediation

A

Involves any necessary changes that will reduce or eliminate the possibility of a similar incident occurring in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Closure

A

Incident response operations are officially closed

17
Q

post-incident review

A

Shortly after the incident closes, incident responders and other Personnel will meet to discuss the incident: It’s causes, its impact, and the organization is response

. The discussion will range from Lessons Learned to possible improvements and Technologies and procedures to develop better defense and response

18
Q

Incident reporting

A

Some of the metrics that should be kept and reported include the following:
. Number of incidents in each security level
. time required to detect and respond to incidents
. Improvements made as a result of post-incident review
. Reviews and updates of incident response plan
. Incident responder training
. Improvements in incident detection

19
Q

Privacy incident response planning

A

Two elements are needed to develop a privacy incident-response plan:
. Call outs to privacy incident responded so they may orchestrate notifications to regulators and affected parties as a required by applicable laws and regulations

. Detection and response to incidents of misuse of personal information that are not themselves security incidents

20
Q

Roles and responsibilities

A

Typical roles
. Incident Commander
. Incident responder
. Scribe
. Legal counsel
. Privacy officer
. Cyber security officer
. CIO
. Business unit leaders
. Crisis Communications
. public relations or public information officer
. business continuity and disaster recovery