Monitoring and Audits Flashcards

1
Q

What are the three tiers of audience for business metrics?

A

Primary audience: Legal and privacy officers, senior leadership, chief information officer (CIO), program managers (PM), information system owners, chief information security officer (CISO) and chief privacy officers (CPO).

Secondary audience: Chief financial officer (CFO), training organizations, human resources (HR), inspectors general (IG), HIPAA security officials

Tertiary audience: External watchdog groups, sponsors, stockholders

These are differentiated by the level of interest, influence, ownership and responsibility of privacy within the business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is trend analysis? What are the types?

A

Trend analysis ensures data is interpreted correctly and apparent relationships are meaningful and significant

  1. Time series: Shows trends in an upward or downward tendency
  2. Cyclical component: Shows weekly, monthly or yearly data describing any regular fluctuations
  3. Irregular component: Also known as “noise”—this is what is left over when the other components of the series (time and cyclical) have been accounted for and is the most difficult to detect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ROI?

A

Return on investment is an indicator used to measure the financial gain or loss (value) of a project in relation to its cost. ROI = (Benefits – Costs)/Costs. Privacy ROI helps provide justification to pay for a good privacy program by defining metrics to measure the effectiveness of investments and the cost to protect personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the five maturity levels of the AICPA/CICA Privacy Maturity Model?

A

o Level 1 (Ad hoc): Informal, incomplete, undocumented and undefined

o Level 2 (Repeatable): There is structure and consistent focus on improvement

o Level 3 (Defined): Defined and documented with consistency

o Level 4 (Managed): Requirements and controls are in place with metrics

o Level 5 (Optimized): Deliberate and continuous process improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the responsibilities of a metric owner?

A

A metric owner is responsible for managing the metric throughout its life cycle. Responsibilities include knowing what is critical about the metric and how it fits into business objectives; monitoring performance with the metric; updating process documentation (including the metric’s definition); performing regular reviews; and incorporating improvements into the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name four ways to analyze privacy program metrics?

A

trend analysis, return on investment (or ROI), business resiliency and program maturity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “Audit”

A

Audits are an ongoing process of evaluating the effectiveness of controls throughout the organization’s operations, systems, and processes … The purpose of a privacy audit is to determine the degree to which technology, processes, and people comply with privacy policies and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five phases of an audit?

A

The high-level, five phase audit approach includes:
1. Audit planning: Risk assessment, schedule, selecting auditor, pre-audit questionnaire, preparatory meeting/visit and checklist

  1. Audit preparation: schedule; confirm and prepare checklists, sampling criteria and audit plan
  2. The audit itself
  3. Reporting: Noncompliance records and categories (major/minor), audit report, closing meeting and distribution
  4. Follow-up: Confirm scope, schedule, methodology and closure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the differences between first-party, second-party, and, third-party audits?

A

A first-party audit is performed by internal employees. Functions to review are determined by manpower and compliance factors.

Second-party audits are often known as “supplier audits,” because they typically involve the organization auditing existing suppliers or subcontractors.

Third-party audits are required under consent decree or by a regulator.
They are conducted by independent outside sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two questions an audit should answer?

A

Audits should answer two questions:
1) Do the privacy operations do what they were designed to do?

2) Are data privacy controls correctly managed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly