Intro Privacy Program Management Flashcards

1
Q

What are the four phases of the privacy operational life cycle?

A
  1. Assess
  2. Protect
  3. Sustain
  4. Respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens during the “Assess” phase of the privacy operational life cycle?

A

The assess phase involves comparing the program to industry best practices, corporate privacy policies, applicable laws and regulations and the organization’s privacy framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens during the “Protect” phase of the privacy operational life cycle?

A

The protect phase embeds privacy principles and information security management practices to address, define and establish privacy practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens during the “Sustain” phase of the privacy operational life cycle?

A

The sustain phase provides monitoring, auditing and communication aspects of the management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens during the “Respond” phase of the privacy operational life cycle?

A

The respond phase involves the principles of information requests, legal compliance, incident response planning and incident handling, as well as accountability for data collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are three primary responsibilities of privacy program managers? Which is the most important?

A
  1. Compliance
  2. Alignment with organizational strategy
  3. Accountability

Accountability is the most important aspect of privacy program management. Privacy Program Managers are responsible for safekeeping and responsible use of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which organizational areas have specific privacy concerns? What are examples of each concern?

A

HR: Whistleblowing
Marketing: Providing privacy notices
Finance: Bonus calculations
Information security: Information access policy
IT: Enabling systems access
Legal: Vendor contracts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly