Trust Services Criteria Flashcards

S1 M2 (6 cards)

1
Q

identify transaction processing methods that comprise confidentiality, privacy, & availability & that can be circumvented to allow unauthorized access

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

search for bottlenecks in the flow of data across the organization & identify other processes that prevent data from being available when needed

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

survey processing methods & transactions that do not complete timely or at all, yield faulty results, or do not meet the company’s objectives

A

processing integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

evaluate employees & processes that handle transactions with confidential data to identify potential data leakage, mishandling, or other practices that expose confidential information

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

analyze methods used to collect, store, use, & dispose of personal data that are being processed to identify the potential for data breaches or leakage

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly