Which of the following must Privacy Impact Assessments (PIAs) do?
- Analyze how an organization handles information to ensure it satisfies requirements
-mitigate privacy risks
-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information
systems.
-all of the above - Answers All of the Above
True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other
damage. - Answers True
What / Which guidance identifies federal information security controls?
-The Freedom of Information Act (FOIA)
-The Privacy Act of 1974
-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII
-DOD 5400.11-R: DOD Privacy Program - Answers OMB Memorandum M-17-12
Which of the following is NOT an example of PII?
-Driver's License Number
-Pet's nickname
-Social Security Number
-Fingerprints - Answers Pet's nickname
Which of the following is NOT a permitted disclosure of PII contained in a system of records?
-These are all permitted disclosures
-The record is disclosed for a new purpose that is not specified in the SORN
-The record is disclosed for routine use.
-The individual has requested that their record be disclosed. - Answers The record is disclosed for a new
purpose that is not specified in the SORN
PIA is required when organization collects PII from: - Answers - Existing information systems and
electronic collections for which no PIA was prev completed.