How much you are aware of your data privacy?
Any data that alone, or in combination with other information, can identify an individual
Historical information published about a monument
Any information of an employee
Information or data that is stored in a vault
Not collect personal information indiscriminately.
Not deceive or mislead individuals about the purposes for collecting personal
Limit the amount and type of information you collect to what is needed for the identified purposes.
All of the above
100 People
3 billion
20,000
500 million
Name
Source Code
All of the above
True
False
20,000,000 euros or up to 4% of annual turnover, whichever is greater
10,000,000 euros or up to 1% of annual turnover, whichever is greater
5,000,000 euros, job suspension and imprisonment for up to 5 years
There is no maximum fine
Any organization that processes personal data
All data controllers and processors established in the EU and organizations that target EU resident
Data controllers operating in the EU
All of the above
Within 48 hours
Within 12 hours
Within 24 hours
Within 72 hours
Using a password manager to securely store your login information.
Writing your passwords down on a sticky note that you keep near your computer.
Changing your passwords on a regular basis, such as every three-to-six months.
Creating unique, long, complex passwords for each and every online account you have.
Physical measures, for example, shredding documents and locking desk drawers
Organizational measures, for example, security clearances and limiting access on a “need-to-know” basis
Technological measures, for example, the use of passwords and encryption
All of the above
To protect people's personal information.
To help police, doctors, army, etc. to get information.
To help everyone find information.
All of the above.
Data users use data for their own advantage breaking the Law.
Data users file, store the data e.g. Doctors and Bankers.
Data users use the data in databases.
All of the above.
Banks and finance companies who process a lot of payments.
Any organisation or individual is liable to be the victim of hackers.
Companies which hold a lot of proprietary information.
Companies which hold credit card numbers of customers.
Bad spelling, poor syntax and grammar are one of the tell-tale signs of a fake email.
Look at the email headers to see where it really came from.
Look for poorly replicated logos.
Contact the sender on some other medium besides email to verify whether they sent you the email.
Once a week.
Once a month.
In accordance with your organisation’s backup policy and the criticality of the data in question.
Once a fortnight.
On a sticker underneath your laptop’s battery as it’s not visible to anyone using the laptop.
On a sticky note attached to the base of your laptop.
In a password-protected Word file stored on your laptop.
Use the password management tool supplied/authorised by your organisation.
Address
CCTV Video
Name
Religion
Pass it on to someone else
Give it back to the owner
Securely delete or destroy it
Throw it out
5
6
7
8
Information Commissioner
Data Controller
Data Subject
Data User