Module 2 Flashcards
The Role of the Technology Professional in Privacy (33 cards)
Privacy Policies
Are internal documents that inform employees on how to protect consumer data. This will include information about privacy and security and data management and loss prevention. These policies need to be documented, accessible, current, endorsed and enforced.
Security Policies
Is a document that spells out the rules, expectations and overall approach that an organization uses to maintain the confidentiality, integrity and availability of its data.
Data Classification Policy
Measure to secure data; The need to have policies that establish and enforce granting and revoking access to assets and information according to their classification. Employees that handle sensitive data should only be used to perform specific tasks.
Data Schema
Measure to secure data; It is used to separated customer data. It formulates constraints to be applied on the data, defines its entities and the relationships among them.
Data Retention
Measure to secure data; Policies that align with laws and regulation concerning the storage of data. These policies should establish data retention schedules, backup storage and removal of data when no longer of use to business’s objectives.
Data Deletion
Measure to secure data; The disposal of data when it is no longer needed, including the removal of recovery methods and any derivatives from the system.
Data Inventories
Comprehensive record of an oragnization’s data assets, including where it’s stored, how it’s used, and what it is. Also known as a data map.
Privacy Impact Assessments (PIAs)
Used to identify and reduce the privacy risks that might come from a new project, system, or technology. It’s like a checklist that helps an organization make sure that they are protecting people’s personal information properly. Looks at how personal data is handled during an organization’s data life cycle.
Data Protection Impact Assessment (DPIA)
Tool that organizations use to find and reduce risks to people’s personal data when they are planning a new project or system. It’s like a safety check to make sure that any personal information, like names, addresses, or health records, is handled in a way that keeps it private and secure. This is a requirement under certain privacy regulations.
Compliance
Refers to the adherence to laws, regulations, standards, and guidelines that govern how data is collected, stored, processed, and shared. Ensures an organization is following all relevant external and internal rules that apply to its operations.
Privacy
Refers to the protection of an individual’s personal information and their right to contol how their data is collected, used, shared, and stordee. Ensures that data about individuals is handled in a way that respects their rights and maintains the confidentiality of sensitive information.
Reasonable assurance
Implies that the requirements and objective are not absolute and are based on criteria that is practical to implement and manage.
Put another way, in data privacy refers to the concept of implementing sufficient and appropriate controls to protect data from unauthorized access, disclosure, or misuse, while recognizing that absolute security is not always possible. It reflects a balance between achieving security goals and considering practical constraints like cost, technology, and operational impacts.
Internal Controls
Are policies, procedures and practices put in place to ensure that data is accurate, reliable and secure.
Preventative
A type of internal control that stops an activity
Detective
A type of internal control that identifies problematic activity.
Overlapping Safeguards
Refers to the practice of implementing multiple layers of security and protective measures that overlap with one another to create a more robust defense against threats.
ITIL
A IT Framework with the focus on delivering high-quality IT services to meet business needs. It focuses on:
* Service Mangement: Breaks IT services into stages
* Best Practices: Guidelinses and best practices to ensure effcient and effective service delivery
* Cusotmer Satisfaction: quality of services and the end user experience
* Change management: Service interruptions are resolved promptly and managed smoothly
Remember it focuses on IT service managment and is trying to improve the quality of service delivery. It is primarily used by IT managers and service desk personel.
COBIT
An IT management framework that focuses on the following:
* Governance: Helps organization create and implement IT Governance that aligns with business goals.
* Risk Management: Risk assessment to protect businsess from IT risks
* Compliance: Compliance with internal policies, laws and regulation.
* Performance Meaurement: Metrics to measure IT performance.
Remember, its primary focus is IT governance and risk management and is primarily used by executives, IT auditors, and compliance officers.
ISO/IEC 27001
Published by ISO and the IEC, it explains how to implement best-practice information security practices. In simple terms, it provides a structured way for organizations to protect their data and sensitive information, ensuring it remains safe from unauthorized access, breaches, or loss. The standard outlines the best practices for creating a secure environment, from assessing risks to implementing controls and continually improving security processes.
Information Governance
The development of a decision and accountability framework that defines acceptable behavior in the creation, valuation, use, sharing, storage, archiving, and deletion of information. More specifically, it looks at the big picture of how information is managed throughout its entire life cycle—from the moment it’s created until it’s no longer needed. It focuses on policies, compliance, and risk management to ensure that information (like documents, emails, and records) is handled properly, stored securely, and disposed of when necessary. It includes data but also considers broader forms of information, including how it’s shared and protected to meet legal, ethical, and business standards.
Enterprise Architecture
A blueprint for how a company’s technology, processes, and people work together. In simple terms, it’s a plan that helps a business align its IT systems (like software and hardware) with its overall goals and strategies.
Client-Server Architecture
The client refers to a program that runs on a local computer, while the server is a program that runs on a remote computer. In this model, the data is stored on the client side to complete the transaction. The back-end services respond to the request and performs a task (transaction). Does not maintain shared data between the client and server. This model assumes the client data is secure and the storage and surveillance of data is clear to user.
Service-oriented Architecture
This system is where the components on the network are arranged according to the services they offer. Compared to Client-Server, SOA is more scalable, flexible and reusable, making it more suitable for larger and more complex systems.
Plug-in-Architecture
A design that allows extra features or functionalities to be added to a system without changing its core. Think of it like a smartphone: the phone has basic functions, but you can install apps (plug-ins) to add new features like games, social media, or productivity tools. These apps don’t change how the phone works at its core; they just add extra capabilities on top of it.