Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CIPM- IAPP

Puntuación
-
Vendido
-
Páginas
16
Grado
A+
Subido en
07-10-2024
Escrito en
2024/2025

Audit Life Cycle - answer-High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting the Audit; Reporting; and Follow-up. Active Scanning Tools - answer-DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to personal information. They can also be used to monitor for compliance with internal policies and procedures, and block e-mail or file transfers based on the data category and definitions. Anonymization - answer-The process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual. Among many techniques, there are three primary ways that data is anonymized. Suppression is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability. Generalization takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set. Note that all of these processes will not guarantee that data is no longer identifiable and have to be performed in such a way that does not harm the usability of the data. Behavioral Advertising - answer-advertising that is targeted to particular customers, based on their observed online behavior Binding Corporate Rules - answer-An appropriate safeguard allowed by the GDPR to facilitate cross-border transfers of personal data between the various entities of a corporate group worldwide. Bureau of Competition - answer-Enforce the US antitrust laws Bureau of Consumer Protection - answer-protects consumers against unfair, deceptive, or fraudulent practices by collecting complaints and conducting investigations, suing companies and people that break the law, developing rules to maintain a fair marketplace, and educating consumers. Bureau of Economics - answer-Provides economic analysis and support to antitrust and consumer protection investigations Business Case - answer-The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or regulations, industry frameworks, customer requirements and other considerations. Canadian Institute of Chartered Accountants - answer-Responsible for the functions that are critical to the success of the Canadian CA profession. COPPA (Children's Online Privacy Protection Act) - answer-Passed in 1998 to protect children from the gathering of their personal information without parental consent. Required to be followed by all websites geared toward children under 13. Choice - answer-Choice refers to the idea that consent must be freely given and that data subjects must have a genuine choice as to whether to provide personal data or not. CIA Triad - answer-Confidentiality, Integrity, Availability Collection Limitation - answer-A fair information practices principle, it is the principle stating there should be limits to the collection of personal data, that any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Consent - answer-Individuals must be able to prevent the collection of their personal data, unless the disclosure is required by law. Current Baseline - answer-"As-is" data privacy requirements; the current environment and any protections, policies, and procedures currently deployed. Data Breach - answer-The unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by a data collector. Breaches do not include good faith acquisitions of personal information by an employee or agent of the data collector for a legitimate purpose of the data collector—provided the personal information is not used for a purpose unrelated to the data collector's business or subject to further unauthorized disclosure. Data Controller - answer-someone who determines why and how personal data is processed Data Inventory - answer-Also known as a record of authority, identifies personal data as it moves across various systems and thus how data is shared and organized, and its location. That data is then categorized by subject area, which identifies inconsistent data versions, enabling identification and mitigation of data disparities. Data Life Cycle Management - answer-Also known as information life cycle management (ILM) or data governance, DLM is a policy-based approach to managing the flow of information through a life cycle from creation to final disposition. DLM provides a holistic approach to the processes, roles, controls and measures necessary to organize and maintain data, and has 11 elements: Enterprise objectives; minimalism; simplicity of procedure and effective training; adequacy of infrastructure; information security; authenticity and accuracy of one's own records; retrievability; distribution controls; auditability; consistency of policies; and enforcement. Data Minimization Principle - answer-The idea that one should only collect and retain that personal data which is necessary. Data Protection Authority - answer-Independent public authorities that supervise the application of data protection laws in the EU. Data Protection Impact Assessment - answer-The process by which companies can systematically assess and identify the privacy and data protection impacts of any products they offer and services they provide. Data Quality - answer-A comprehensive approach to ensuring the accuracy, validity, and timeliness of data. Do Not Track - answer-A proposed regulatory policy, similar to the existing Do Not Call Registry in the United States, which would allow consumers to opt out of web-usage tracking. Electronic Communications Privacy Act of 1986 - answer-The collective name of the Electronic Communications Privacy and Stored Wire Electronic Communications Acts, which updated the Federal Wiretap Act of 1968. ECPA, as amended, protects wire, oral and electronic communications while those communications are being made, are in transit, and when they are stored on computers. The act applies to e-mail, telephone conversations and data stored electronically. The USA PATRIOT Act and subsequent federal enactments have clarified and updated ECPA in light of the ongoing development of modern communications technologies and methods, including easing restrictions on law enforcement access to stored communications in some cases. Gramm-Leach-Bliley Act - answer-requires financial institutions to ensure the security and confidentiality of customer data Individual Participation - answer-A fair information practices principle, it is the principle that an individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have data relating to him communicated to him within a reasonable time; at a charge, if any, that is not excessive; in a reasonable manner, and in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended. Information Life Cycle - answer-Collection, processing, use, disclosure, retention, and destruction. Metric Life Cycle - answer-The processes and methods to sustain a metric to match the ever-changing needs of an organization. Consists of a 5-step process: (1) Identification of the intended audience; (2) Definition of data sources; (3) Selection of privacy metrics; (4) Collection and refinement of systems/application collection points; and (5) Analysis of the data/metrics to provide value to the organization and provide a feedback quality mechanism. Metrics - answer-Tools that facilitate decision making and accountability through collection, analysis, and reporting of data. They must be measurable, meaningful, clearly defined (with boundaries), indicate progress, and answer a specific question to be valuable and practical. NIST - answer-National Institute of Standards and Technology. NIST is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special publications related to security that are freely available for download here: http:// Non-Public Personal Information - answer-Is defined by GLBA as personally identifiable financial information (i) provided by a consumer to a financial institution, (ii) resulting from a transaction or service performed for the consumer, or (iii) otherwise obtained by the financial institution. Excluded from the definition are (i) publicly available information and (ii) any consumer list that is derived without using personally ide

Mostrar más Leer menos
Institución
CIPM- IAPP
Grado
CIPM- IAPP

Vista previa del contenido

CIPM- IAPP EXAMINATIONS
Audit Life Cycle - answer-High-level, five-phase audit approach. The steps include: Audit Planning; Audit
Preparation; Conducting the Audit; Reporting; and Follow-up.



Active Scanning Tools - answer-DLP network, storage, scans and privacy tools can be used to identify
security and privacy risks to personal information. They can also be used to monitor for compliance with
internal policies and procedures, and block e-mail or file transfers based on the data category and
definitions.



Anonymization - answer-The process in which individually identifiable data is altered in such a way that
it no longer can be related back to a given individual. Among many techniques, there are three primary
ways that data is anonymized. Suppression is the most basic version of anonymization and it simply
removes some identifying values from data to reduce its identifiability. Generalization takes specific
identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24).
Noise addition takes identifying values from a given data set and switches them with identifying values
from another individual in that data set. Note that all of these processes will not guarantee that data is
no longer identifiable and have to be performed in such a way that does not harm the usability of the
data.



Behavioral Advertising - answer-advertising that is targeted to particular customers, based on their
observed online behavior



Binding Corporate Rules - answer-An appropriate safeguard allowed by the GDPR to facilitate cross-
border transfers of personal data between the various entities of a corporate group worldwide.



Bureau of Competition - answer-Enforce the US antitrust laws



Bureau of Consumer Protection - answer-protects consumers against unfair, deceptive, or fraudulent
practices by collecting complaints and conducting investigations, suing companies and people that break
the law, developing rules to maintain a fair marketplace, and educating consumers.



Bureau of Economics - answer-Provides economic analysis and support to antitrust and consumer
protection investigations

,Business Case - answer-The starting point for assessing the needs of the privacy organization, it defines
the individual program needs and the ways to meet specific business goals, such as compliance with
privacy laws or regulations, industry frameworks, customer requirements and other considerations.



Canadian Institute of Chartered Accountants - answer-Responsible for the functions that are critical to
the success of the Canadian CA profession.



COPPA (Children's Online Privacy Protection Act) - answer-Passed in 1998 to protect children from the
gathering of their personal information without parental consent. Required to be followed by all
websites geared toward children under 13.



Choice - answer-Choice refers to the idea that consent must be freely given and that data subjects must
have a genuine choice as to whether to provide personal data or not.



CIA Triad - answer-Confidentiality, Integrity, Availability



Collection Limitation - answer-A fair information practices principle, it is the principle stating there
should be limits to the collection of personal data, that any such data should be obtained by lawful and
fair means and, where appropriate, with the knowledge or consent of the data subject.



Consent - answer-Individuals must be able to prevent the collection of their personal data, unless the
disclosure is required by law.



Current Baseline - answer-"As-is" data privacy requirements; the current environment and any
protections, policies, and procedures currently deployed.



Data Breach - answer-The unauthorized acquisition of computerized data that compromises the
security, confidentiality, or integrity of personal information maintained by a data collector. Breaches do
not include good faith acquisitions of personal information by an employee or agent of the data
collector for a legitimate purpose of the data collector—provided the personal information is not used
for a purpose unrelated to the data collector's business or subject to further unauthorized disclosure.



Data Controller - answer-someone who determines why and how personal data is processed

, Data Inventory - answer-Also known as a record of authority, identifies personal data as it moves across
various systems and thus how data is shared and organized, and its location. That data is then
categorized by subject area, which identifies inconsistent data versions, enabling identification and
mitigation of data disparities.



Data Life Cycle Management - answer-Also known as information life cycle management (ILM) or data
governance, DLM is a policy-based approach to managing the flow of information through a life cycle
from creation to final disposition. DLM provides a holistic approach to the processes, roles, controls and
measures necessary to organize and maintain data, and has 11 elements: Enterprise objectives;
minimalism; simplicity of procedure and effective training; adequacy of infrastructure; information
security; authenticity and accuracy of one's own records; retrievability; distribution controls;
auditability; consistency of policies; and enforcement.



Data Minimization Principle - answer-The idea that one should only collect and retain that personal data
which is necessary.



Data Protection Authority - answer-Independent public authorities that supervise the application of data
protection laws in the EU.



Data Protection Impact Assessment - answer-The process by which companies can systematically assess
and identify the privacy and data protection impacts of any products they offer and services they
provide.



Data Quality - answer-A comprehensive approach to ensuring the accuracy, validity, and timeliness of
data.



Do Not Track - answer-A proposed regulatory policy, similar to the existing Do Not Call Registry in the
United States, which would allow consumers to opt out of web-usage tracking.



Electronic Communications Privacy Act of 1986 - answer-The collective name of the Electronic
Communications Privacy and Stored Wire Electronic Communications Acts, which updated the Federal
Wiretap Act of 1968. ECPA, as amended, protects wire, oral and electronic communications while those
communications are being made, are in transit, and when they are stored on computers. The act applies
to e-mail, telephone conversations and data stored electronically. The USA PATRIOT Act and subsequent
federal enactments have clarified and updated ECPA in light of the ongoing development of modern

Escuela, estudio y materia

Institución
CIPM- IAPP
Grado
CIPM- IAPP

Información del documento

Subido en
7 de octubre de 2024
Número de páginas
16
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TOPDOCTOR Abacus College, Oxford
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
10
Miembro desde
2 año
Número de seguidores
5
Documentos
3395
Última venta
5 meses hace
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Lee mas Leer menos
5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes