Terms Flashcards
(44 cards)
Accountability
- appropriate technical and organizational measures are in place to protect personal data
FIP
Active Scanning Tools
DLP (data loss prevention) network, storage, scans and privacy tools
to identify security and privacy risks
Monitor for compliance with internal policies and procedures, block email or file transfers
AICPA
American Institute of Certified Public Accountants
WebTrust
CICA - canadian
Anonymization
data is altered so it can no longer be traced back to the individual
Suppression (remove some info)
Generalization (makes some values more broad)
Noise addition ( switches identifying values from one set with another)
POLC
Assess, Protect, Sustain, Respond
POLC Assess
First phase
provides the steps, checklists and processes to assess any gaps in the priv program compared to industry best practices, corporate privacy policies, applicable privacy laws and objective-based privacy program frameworks
POLC Protect
Second phase
provides the DLC, information security practices, and PbD to ‘protect’ PI
POLC Sustain
Third phase
privacy management through the monitoring, auditing and communication aspects of the management framework
POLC Respond
Fourth phase
info requests
legal compliance
incident-response planning
incident handling
aim is to reduce organizational risk and bolster regulatory compliance
Audit Life Cycle
Plan Preparation Conducting Reporting Follow up
BCR
Binding Corporate Rules
faciliate cross border transfers of PI between various entities of a corporate group
SCC
Standard Contractual Clauses
cross border transfers of PI between different corporations
Business Case
Starting point for assessing the needs of the privacy organization
Defines the program needs and ways to meet specific business goals (compliance with laws, regs, ind frameworks, customer requirements)
BCDR
Business Continuity and Disaster Recovery plan
risk mitigation plan to prep an org for crises and ensure critical business functions continue. Focus is to recover from disaster
Centralized governance
one team or person is responsible for privacy-related affairs. everyone flows through this point
Choice
Consent must be freely given and data subjects must have genuine choice to provide PI or not
GDPR requires free choice
CIA Triad
Confidentiality, Integrity, Availability
FIP
Access & amendment
Accountability
Authority
Minimization
Quality and integrity
Individual Participation
Purpose specification and use limitation
Security
Transparency
Data Breach
unauthorized acquisition of data that compromises the security, confidentiality or integrity of PI
Data Controller
person, public authority, agency or body that determines the purposes and means of the processing of personal data
Data inventory
record of authority
identifies personal data as it moves across various systems
how data is shared, organized and it’s location
DLM
Data Life Cycle Management (ILM)
policy-based approach to managing the flow of information through a life cycle from creation to final disposition
Enterprise objectives
minimalism
simplicity of procedures and training
adequacy of infrastructure
infomation security
authenticity and accuracy of records
retrievability
distribution controls
auditability
consistency of policies
enforcement
DPIA
Data Protection Impact Asssessment
assess and identify the privacy and data protection impacts of products they offer and services they provide
Identify impact and risks and prevent or minimize the risk
GDPR requirement when there is a high risk to the rights and freedoms of persons
Decentralized governance
local governance
delegation of decision-making to the lower levels of the org. Fewer tiers in the org structure, wider span of control, bottom-to-top flow