Terms Flashcards

(44 cards)

1
Q

Accountability

A
  • appropriate technical and organizational measures are in place to protect personal data

FIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Scanning Tools

A

DLP (data loss prevention) network, storage, scans and privacy tools
to identify security and privacy risks

Monitor for compliance with internal policies and procedures, block email or file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AICPA

A

American Institute of Certified Public Accountants

WebTrust

CICA - canadian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anonymization

A

data is altered so it can no longer be traced back to the individual

Suppression (remove some info)
Generalization (makes some values more broad)
Noise addition ( switches identifying values from one set with another)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

POLC

A

Assess, Protect, Sustain, Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

POLC Assess

A

First phase

provides the steps, checklists and processes to assess any gaps in the priv program compared to industry best practices, corporate privacy policies, applicable privacy laws and objective-based privacy program frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POLC Protect

A

Second phase

provides the DLC, information security practices, and PbD to ‘protect’ PI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

POLC Sustain

A

Third phase

privacy management through the monitoring, auditing and communication aspects of the management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POLC Respond

A

Fourth phase

info requests
legal compliance
incident-response planning
incident handling

aim is to reduce organizational risk and bolster regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit Life Cycle

A

Plan Preparation Conducting Reporting Follow up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BCR

A

Binding Corporate Rules

faciliate cross border transfers of PI between various entities of a corporate group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCC

A

Standard Contractual Clauses

cross border transfers of PI between different corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Case

A

Starting point for assessing the needs of the privacy organization

Defines the program needs and ways to meet specific business goals (compliance with laws, regs, ind frameworks, customer requirements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BCDR

A

Business Continuity and Disaster Recovery plan

risk mitigation plan to prep an org for crises and ensure critical business functions continue. Focus is to recover from disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Centralized governance

A

one team or person is responsible for privacy-related affairs. everyone flows through this point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Choice

A

Consent must be freely given and data subjects must have genuine choice to provide PI or not

GDPR requires free choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FIP

A

Access & amendment
Accountability
Authority
Minimization
Quality and integrity
Individual Participation
Purpose specification and use limitation
Security
Transparency

19
Q

Data Breach

A

unauthorized acquisition of data that compromises the security, confidentiality or integrity of PI

20
Q

Data Controller

A

person, public authority, agency or body that determines the purposes and means of the processing of personal data

21
Q

Data inventory

A

record of authority

identifies personal data as it moves across various systems

how data is shared, organized and it’s location

22
Q

DLM

A

Data Life Cycle Management (ILM)

policy-based approach to managing the flow of information through a life cycle from creation to final disposition

Enterprise objectives
minimalism
simplicity of procedures and training
adequacy of infrastructure
infomation security
authenticity and accuracy of records
retrievability
distribution controls
auditability
consistency of policies
enforcement

23
Q

DPIA

A

Data Protection Impact Asssessment

assess and identify the privacy and data protection impacts of products they offer and services they provide

Identify impact and risks and prevent or minimize the risk

GDPR requirement when there is a high risk to the rights and freedoms of persons

24
Q

Decentralized governance

A

local governance

delegation of decision-making to the lower levels of the org. Fewer tiers in the org structure, wider span of control, bottom-to-top flow

25
HIPAA
Patients have to opt-in before info can be shared with other orgs, except for treatment, payment and healthcare operations
26
Hybrid governance
combo of local and centralized governance strategies large, global orgs Assign main individual responsibility and local entities then fulfill and support the policies and directives from the central governing body
27
Information Life Cycle
Collection to deletion collection processing use disclosure retention destruction
28
Metric Life Cycle
processes and methods to sustain a metric to match needs of organization 1 ID intended audience 2 Define data sources 3 Select privacy metrics 4 Collect and refine of systems/application collection points 5 analysis of the data/metrics to provide value and provide a feedback quality mechanism
29
Metrics
facilitate decision-making and accountability thru collection, analysis and reporting of data measurable, meaningful, clearly defined, indicate progress and answer specific question
30
NIST
Core Profiles Tiers
31
PbD
Proactive not reactive Privacy by default Embedded in design Full Functionality + sum End to End Security Visible and transparent Users privacy rights respected
32
Privacy Champ
an executive who serves as the privacy program sponsor and advocates for privacy program as an org concept
33
PMM
Privacy Maturity Model Ad Hoc Repeatable Defined Managed Optimized ad hoc - informal repeatable - not fully documented, doesnt cover all aspects defined - fully documented, covers all aspects managed - reviews are conducted to assess effectiveness optimized - review and feedback are used to ensure CI towards optimization
34
PTA
Privacy Threshold Analysis a tool used to determine if a PIA should be conducted
35
PETs
Privacy enhancing tech developed to be used for the transmission, storage and use of privacy data
36
Strategic Management
the first high-level task necessary to implement proactive privacy management. Three sub tasks: 1 define the org's privacy vision and mission statement 2 develop privacy strategy 3 structure privacy team
37
Vendor management
Assessment of a third-party vendor for the vendor’s privacy and information security policies, access controls, where the personal information will be held and who has access to it. Privacy/security questionnaires, privacy impact assessments and other checklists can be used to assess this risk.
38
Audit Phases
Plan Prepare Audit Report Follow up
39
Types of Audits
1st Party - internal 2nd - supplier 3rd - external (usually for NIST cert, etc)
40
Types of Monitoring
compliance regulation environment training data
41
Main benefit and objective for privacy program framework?
helps a business maintain privacy and data governance and prevent data breaches while complying with regulations
42
Consider __ when determining the scope of a privacy program
the personal data collected and processed by an organization
43
Black Box effect
it is not always possible to explain why an AI model has generated a particular output or decision
44