Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

IAPP CIPM GLOSSARY FOR EXAM PREPARATION

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
07-10-2024
Written in
2024/2025

Accountability The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law, an idea codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross Border Privacy Rules. Traditionally, accountability has been a fair information practices principle, that due diligence and reasonable steps will be undertaken to ensure that personal information will be protected and handled consistently with relevant law and other fair use principles. Active Scanning Tools DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to personal information. They can also be used to monitor for compliance with internal policies and procedures, and block e-mail or file transfers based on the data category and definitions. American Institute of Certified Public Accountants A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal program. Acronym(s): AICPA Associated term(s): Canadian Institute of Chartered Accountants, Seal Programs, WebTrust Anonymization The process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual. Among many techniques, there are three primary ways that data is anonymized. Suppression is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability. Generalization takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set. Note that all of these processes will not guarantee that data is no longer identifiable and have to be performed in such a way that does not harm the usability of the data. Associated law(s):Anonymous Data, De-Identification, Microdata Sets, Re-identification APEC Privacy Principles A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative (APEC) that mirror the OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs. Assess The first of four phases of the privacy operational life cycle; provides the steps, checklists and processes necessary to assess any gaps in a privacy program as compared to industry best practices, corporate privacy policies, applicable privacy laws, and objective-based privacy program frameworks. Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond Audit Life Cycle High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting the Audit; Reporting; and Follow-up. Behavioral Advertising Advertising that is targeted at individuals based on the observation of their behaviour over time. Most often done via automated processing of personal data, or profiling, the General Data Protection Regulation requires that data subjects be able to opt-out of any automated processing, to be informed of the logic involved in any automatic personal data processing and, at least when based on profiling, be informed of the consequences of such processing. If cookies are used to store or access information for the purposes of behavioral advertising, the ePrivacy Directive requires that data subjects provide consent for the placement of such cookies, after having been provided with clear and comprehensive information. Acronym(s): OBA Associated term(s): Online Behavioral Advertising, Behavioral Targeting, Contextual Advertising, Demographic Advertising, Premium Advertising, Psychographic Advertising, Remnant Advertising Binding Corporate Rules Binding Corporate Rules (BCRs) are an appropriate safeguard allowed by the General Data Protection Regulation to facilitate cross-border transfers of personal data between the various entities of a corporate group worldwide. They do so by ensuring that the same high level of protection of personal data is complied with by all members of the organizational group by means of a single set of binding and enforceable rules. BCRs compel organizations to be able to demonstrate their compliance with all aspects of applicable data protection legislation and are approved by a member state data protection authority. To date, relatively few organizations have had BCRs approved. Acronym(s): BCR Bureau of Competition The United States' Federal Trade Commission's Bureau of Competition enforces the nation's antitrust laws, which form the foundation of our free market economy. The antitrust laws promote the interests of consumers; they support unfettered markets and result in lower prices and more choices. Associated term(s): Bureau of Consumer Protection; Bureau of Economics Bureau of Economics The United States' Federal Trade Commission's Bureau of Economics helps the FTC evaluate the economic impact of its actions by providing economic analysis for competition and consumer protection investigations and rulemakings, and analyzing the economic impact of government regulations on businesses and consumers. Associated term(s): Bureau of Competition; Bureau of Consumer Protection Business case The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or regulations, industry frameworks, customer requirements and other considerations. Business Continuity and Disaster Recovery Plan A risk mitigation plan designed to prepare an organization for crises and to ensure critical business functions continue. The focus is to recover from a disaster when disruptions of any size are encountered. Acronym(s): BCDR Business Continuity Plan The business continuity plan is typically drafted and maintained by key stakeholders, spelling out departmental responsibilities and actions teams must take before, during and after an event in order to help operations run smoothly. Situations covered in a BCP often include fire, flood, natural disasters (tornadoes and hurricanes), and terrorist attack. Acronym(s): BCP Canadian Institute of Chartered Accountants The Canadian Institute of Chartered Accountants (CICA), in partnership with the provincial and territorial institutes, is responsible for the functions that are critical to the success of the Canadian CA profession. CICA, pursuant to the 2006 Protocol, is entrusted with the responsibility for providing strategic leadership, co-ordination of common critical functions of strategic planning, protection of the public and ethics, education and qualification, standard setting and communications Acronym(s): CICA Centralized governance Privacy governance model that leaves one team or person responsible for privacy-related affairs; all other persons or organizations will flow through this point.

Show more Read less
Institution
IAPP CIPM GLOSSARY
Course
IAPP CIPM GLOSSARY

Content preview

IAPP CIPM GLOSSARY FOR EXAM PREPARATION

Accountability



The implementation of appropriate technical and organizational measures to ensure and be able to
demonstrate that the handling of personal data is performed in accordance with relevant law, an idea
codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross
Border Privacy Rules. Traditionally, accountability has been a fair information practices principle, that
due diligence and reasonable steps will be undertaken to ensure that personal information will be
protected and handled consistently with relevant law and other fair use principles.




Active Scanning Tools



DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to
personal information. They can also be used to monitor for compliance with internal policies and
procedures, and block e-mail or file transfers based on the data category and definitions.




American Institute of Certified Public Accountants



A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal
program.

Acronym(s): AICPA

Associated term(s): Canadian Institute of Chartered Accountants, Seal Programs, WebTrust




Anonymization

, The process in which individually identifiable data is altered in such a way that it no longer can be
related back to a given individual. Among many techniques, there are three primary ways that data is
anonymized. Suppression is the most basic version of anonymization and it simply removes some
identifying values from data to reduce its identifiability. Generalization takes specific identifying values
and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition
takes identifying values from a given data set and switches them with identifying values from another
individual in that data set. Note that all of these processes will not guarantee that data is no longer
identifiable and have to be performed in such a way that does not harm the usability of the data.

Associated law(s):Anonymous Data, De-Identification, Microdata Sets, Re-identification




APEC Privacy Principles



A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative (APEC) that mirror the
OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote
electronic commerce throughout the Asia-Pacific region by balancing information privacy with business
needs.




Assess



The first of four phases of the privacy operational life cycle; provides the steps, checklists and processes
necessary to assess any gaps in a privacy program as compared to industry best practices, corporate
privacy policies, applicable privacy laws, and objective-based privacy program frameworks.

Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond




Audit Life Cycle



High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting
the Audit; Reporting; and Follow-up.

Written for

Institution
IAPP CIPM GLOSSARY
Course
IAPP CIPM GLOSSARY

Document information

Uploaded on
October 7, 2024
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TOPDOCTOR Abacus College, Oxford
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
2 year
Number of followers
5
Documents
3395
Last sold
5 months ago
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions