Opting-in means an individual makes an active, affirmative indication...
True or false? All incidents are breaches, but not all breaches are...
The information life cycle recognizes that data has different value,...
Information security provides physical, technical and administrative...
True or false? When communicating about a breach, an organization...
Can you identify the five phases of a privacy program audit?
Which best describes the disadvantages of a centralized privacy...
In the U.S., many industries have sector-specific privacy-related laws...
A privacy policy is generally an internal document that is addressed...
How do information security and privacy teams work in concert, so that...
Control types and categories. Information security provides physical,...
Information security provides physical, technical and administrative...
Privacy risks. In 2006, Daniel Solove authored an article entitled, "A...
A metric owner is a process owner, champion and advocate responsible...
Why does an organization need a privacy program? Identify the number 3...
Business alignment includes the following elements:
Data governance of personal information includes the following...
Inquiry/complaint-handling procedures includes the following elements:
Which best describes the advantages of a centralized privacy...
Which best describes the advantages of a local privacy governance...
Which best describes the advantages of a hybrid privacy governance...
Which best describes the disadvantages of a hybrid privacy governance...
Which best describes the disadvantages of a local privacy governance...
Which of the below are Tasks that the DPO is responsible for...
Match the category and skills that a DPO should possess
Match the following DPO responsibilities and categories
True or false. The DPO needs to be located in Europe?
GRC, is an umbrella term whose scope touches the privacy office, as...
Within an organization, the privacy function should always reside...
The chief privacy officer for a telecommunications company wants to...
Before determining an organization's privacy strategy, what should a...
In differentiating between a privacy strategy and a privacy framework,...
A law or regulation may constitute a privacy framework. true or false?
Match the order of the steps in developing a Privacy Program
What type of privacy governance model is defined by a one team or...
The privacy team should always comprise more than one person. true or...
Which business function ensures business and regulatory requirements...
Before the acquisition can take place the following should take place:
What are the similarities between Canada's PIPEDA and the European...
What are the differences between Canada's PIPEDA and the European...
Understanding the regulatory environment. Because the regulatory...
GDPR: Rights and obligations. How familiar are you with the rights and...
CCPA: Rights and obligations. How familiar are you with the rights and...
The California Privacy Rights Act (CPRA) ballot initiative was passed....
_____ means that one country (or jurisdiction, such as the EU) has...
_____ (language written into a contract) may be a way for...
Under the GDPR, _____ resemble the self-regulatory programs used...
_____ may also be used for GDPR compliance, although they must receive...
Under the GDPR, BCRs require approval from a supervisory authority. At...
Which are common elements of privacy-related legislation across...
Privacy and data protection regulators/oversight agencies have the...
What can controllers and processors do to avoid incurring penalties...
Two global pharmaceutical companies have recently merged. What are...
Using a valid mechanism for transferring personal information across...
Which cross-border data transfer mechanism is used to demonstrate to...
Match the elements to either Data Inventory & Mapping or Privacy...
Match the elements with with the considerations for building a data...
Match the following events with the relevant department in an...
From the list, check the events that may trigger the need for a...
Match the following components of a DPIA in the order conducted.
In addition to identifying areas of non-compliance, assessments may...
Match the considerations with the elements involved in assessing...
Match the terms to complete the sentences about items in a vendor...
Mergers, acquisitions and divestitures serve as key junctures for...
Which of the following is a common function of a data inventory?...
Which of the following elements may be found in a data inventory?...
True or false? Data inventories are almost always created and...
Which of the following is a potential tool for keeping a data...
Which of the following is an assessment that measures how closely an...
True or false? A privacy impact assessment can help facilitate privacy...
Ideally, when should a PIA be conducted? Select all that apply.
Which of the following are methods for assessing vendors? Select all...
A privacy policy is one of the two primary types of documents that...
Information security policies: Access and data classification....
Vendors should be held to the same privacy standards as the...
Procurement: Engaging vendors Match the considerations with the...
HR handles diverse employee personal information and typically will...
Data retention and destruction policies should support the idea that...
Privacy-related policies will not be effective if individuals do not...
Implementing policies. Privacy-related policies will not be effective...
Select the ones you like
An information security team is crafting an internal document that...
A marketing team works with their legal department to create an...
What is the purpose of an acceptable use policy?
True or false? Vendors should be held to the same privacy standards as...
A vendor contract should include the following. Select all that apply.
True or false? Some laws and regulations stipulate lengths of time...
How may an organization enable employees to integrate privacy policies...
Across jurisdictions, data subjects typically have certain rights,...
Select the ones you like
Privacy notices are generally external communications, to customers,...
Privacy notice: Common elements. Your organization's privacy notice...
Privacy notices should be living documents, maintained in a lifecycle...
Privacy notices should be living documents, maintained in a lifecycle...
Providing a privacy notice is not the same as soliciting consent.
...
Opting-out means that an individual's lack of action implies a...
Opting-out means an individual makes an active, affirmative indication...
Opting-in means that an individual's lack of action implies a...
There are several methods for tailoring privacy notices to children...
Choice and control should be offered to individuals even after the...
A privacy team should work with legal to establish policies and...
Data portability is a right that applies only in some...
Under the GDPR, individuals have the right to request erasure of their...
Complaints about how your organization manages data subject rights may...
A privacy notice typically explains what? Select all that apply.
The chief privacy officer of a technology company has revised its...
When does consent need to be reviewed and possibly refreshed? Select...
What may an organization's procedures around withdrawal of consent...
True or false? Upon request from an individual, an organization must...
Under the EU's General Data Protection Regulation, erasure entails...
True or false? Regardless of the source (e.g., employees, etc.) of...
Awareness: Operational actions
...
Consider what motivates your organization's employees. How can you...
What should privacy training and awareness programs do? Select all...
Who needs privacy training? Select all that apply.
Which of the following qualifies as an awareness method?
The HR team within an organization is being trained on the proper...
To resolve the potential security issues a DPO/CPO may observe, what...
Privacy and security professionals alike agree that the most important...
What privacy functions are valuable in mitigating a data breach? Check...
Information security provides administrative, technical and physical...
ISO/IEC 27001 and 27002 are internationally recognized information...
ISO/IEC 27701 is an extension of ISO/IEC 27001. It defines processes...
ISO/IEC 27001 and 27002 which of the below are elements of a...
Information security provides physical, technical and administrative...
Information security provides physical, technical and administrative...
Information security provides physical, technical and administrative...
Information security provides physical, technical and administrative...
Access controls. A privacy team should work with information security...
Security policies. A well-functioning internal security policy...
Technical privacy controls. In addition to security and administrative...
Evaluating security controls. When you are evaluating security...
Technical privacy controls. In addition to security and...
Technical privacy controls. In addition to security and...
Technical privacy controls. In addition to security and...
Technical privacy controls. In addition to security and...
Several of the data processing principles outlined in the GDPR may be...
Privacy risk models and frameworks. Risk management is an integral...
Privacy risks
...
Privacy risks
...
Privacy risks. In 2006, Daniel Solove authored an article entitled, "A...
Privacy risks. In 2006, Daniel Solove authored an article entitled, "A...
Privacy risks. In 2006, Daniel Solove authored an article entitled, "A...
The implementation of appropriate technical and organizational...
DLP network, storage, scans and privacy tools can be used to identify...
Two major groups of privacy design strategies can play an important...
A U.S. professional organization of certified public accountants and...
Two major groups of privacy design strategies can play an important...
The process in which individually identifiable data is altered in such...
Privacy design strategies Two major groups of privacy design...
_____ takes specific identifying values and makes them broader, such...
Keeping up with disruptive technologies. Evolving and disruptive...
_____ addition takes identifying values from a given data set and...
True or false? Security focuses on information and the people...
_____ is the most basic version of anonymization and it simply removes...
True or false? The existence of information processing risks means...
Anonymization is the process in which individually identifiable data...
Which of the following are security controls included in the ISO/IEC...
A set of non-binding principles adopted by the Asia-Pacific Economic...
What category of security control may rely on segregation of duties?
The first of four phases of the privacy operational life cycle _____
A scorecard of risk factors may assist an organization in doing what?
Privacy Operational Life Cycle Focused on refining and improving...
True or false? A key difference between the U.S. and EU concepts of...
High-level, five-phase audit approach. The steps include: Audit...
Which of the following is an administrative control?
Audit Life Cycle is a high-level, five-phase audit approach. The steps...
True or false? Data processing principles, such as those found in the...
_____ is targeted at individuals based on the observation of their...
If a data breach occurs, what's at risk for an organization? What...
_____ are appropriate safeguards allowed by the General Data...
Test your knowledge: According to the most recent Ponemon report,...
The United States' Federal Trade Commission's _____ (BoC) enforces the...
Breaches can occur in many ways, including through hacking or malware,...
The United States' Federal Trade Commission's _____ (BoCP) stops...
Different stakeholder teams have different responsibilities in both...
The United States' Federal Trade Commission's _____ (BoE) helps the...
Different stakeholder teams have different responsibilities in both...
The starting point for assessing the needs of the privacy...
Different stakeholder teams have different responsibilities in both...
BCDR or _____ is a risk mitigation plan designed to prepare an...
Different stakeholder teams have different responsibilities in both...
The _____ (BCP) is typically drafted and maintained by key...
Different stakeholder teams have different responsibilities in both...
_____ (COPPA) is a U.S. federal law that applies to the operators of...
Different stakeholder teams have different responsibilities in both...
In the context of consent, _____ refers to the idea that consent must...
Different stakeholder teams have different responsibilities in both...
Three common information security principles from the 1960s. _____
Different stakeholder teams have different responsibilities in both...
The three common information security principles from the 1960s that...
Different stakeholder teams have different responsibilities in both...
A fair information practices principle, it is the principle stating...
Different stakeholder teams have different responsibilities in both...
This privacy requirement is one of the fair information practices....
A requirement that an individual "signifies" his or her...
Employee training for incident preparedness and preparation can help:...
Implied consent arises where consent may reasonably be inferred from...
Which of the following are critical duties of an organization's legal...
Any person or entity that complies or evaluates personal information...