Data Security Flashcards

(9 cards)

1
Q

Definition of Data Security Policies should be . . .

A

A collaborative effort between Business and IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these are characteristics of an effective data security policy?

A

The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following define the data security touch points in an organisation?

A

Business rules and process workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stakeholders whose concerns must be addressed in data security management include

A

Clients, Patients, Citizens, Suppliers, or Business Partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Apart from security requirements internal to the organisation, what other strategic goals should a Data Security Management system address?

A

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The needs of data protection require us to ensure that . . .

A

Data is processed only in ways compatible with the intended and communicated use it was collected for, and respects the consent of the data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these are increasingly driving legislation for information security and data privacy?

A

A recognition of Ethical issues in information management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Data Security contribute to competitive advantage?

A

Data Security helps to protect proprietary information and intellectual property, as well as customer and partner information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these statements best defines Data Security Management?

A

The planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly