Trust Services Criteria Flashcards
S1 M2 (6 cards)
identify transaction processing methods that comprise confidentiality, privacy, & availability & that can be circumvented to allow unauthorized access
security
search for bottlenecks in the flow of data across the organization & identify other processes that prevent data from being available when needed
availability
survey processing methods & transactions that do not complete timely or at all, yield faulty results, or do not meet the company’s objectives
processing integrity
evaluate employees & processes that handle transactions with confidential data to identify potential data leakage, mishandling, or other practices that expose confidential information
confidentiality
analyze methods used to collect, store, use, & dispose of personal data that are being processed to identify the potential for data breaches or leakage
privacy