What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Start a Discussions
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Correct : B
[Section 1798.100 of the CCPA]
[Schedule 1, Principle 4.8 of the PIPEDA]
[ISACA CDPSE Review Manual, Chapter 1, Section 1.3.2]
Start a Discussions
Which of the following is a role PRIMARILY assigned to an internal data owner?
Correct : B
The role primarily assigned to an internal data owner is authorizing access rights. A data owner is a person or a role within the organization who has the authority and responsibility for the data assets under their control. A data owner is responsible for defining the data classification, data quality, data retention, and data security requirements for their data assets. A data owner is also responsible for granting, revoking, and reviewing the access rights to their data assets based on the principle of least privilege and the business needs. A data owner is accountable for ensuring that the data assets are used in compliance with the organizational policies and the applicable laws and regulations.Reference:
[ISACA Glossary of Terms]
[ISACA CDPSE Review Manual, Chapter 3, Section 3.2.1]
[ISACA CDPSE Review Manual, Chapter 3, Section 3.2.2]
[ISACA CDPSE Review Manual, Chapter 3, Section 3.2.3]
Start a Discussions
Which of the following practices BEST indicates an organization follows the data minimization principle?
Correct : D
The practice that best indicates an organization follows the data minimization principle is that data is regularly reviewed for its relevance. The data minimization principle is one of the core principles of data protection under various laws and regulations, such as the GDPR or the CCP
A) It states that personal data should be adequate, relevant, and limited to what is necessary in relation to the purposes for which they are processed. By regularly reviewing the data they hold, organizations can ensure that they do not collect or retain excessive or unnecessary data that may pose privacy risks or violate data subject rights.
Data is pseudonymized when being backed up, data is encrypted before storage, or data is only accessible on a need-to-know basis are also good practices for data protection, but they do not directly indicate that the organization follows the data minimization principle. Pseudonymization is a process of replacing identifying information in data with artificial identifiers or pseudonyms. Pseudonymization can help enhance the privacy of data by reducing the linkability between data and data subjects, but it does not prevent re-identification or inference attacks. Encryption is a process of transforming data into an unreadable form using a secret key or algorithm. Encryption can help protect the confidentiality, integrity, and availability of data by preventing unauthorized access, disclosure, or modification. Access control is a process of restricting who can access, modify, or delete data based on their roles, permissions, or credentials. Access control can help prevent unauthorized or inappropriate use of data by limiting the scope of access.
Start a Discussions
Who is ULTIMATELY accountable for the protection of personal data collected by an organization?
Correct : B
The data owner is the person or entity who has the ultimate authority and responsibility for the protection of personal data collected by an organization. The data owner defines the purpose, scope, classification, and retention of the personal data, as well as the rights and obligations of the data subjects and other parties involved in the data processing. The data owner also ensures that the personal data is handled in compliance with the applicable privacy laws and regulations, as well as the organization's privacy policies and standards. The data owner may delegate some of the operational tasks to the data processor, data custodian, or data protection officer, but the accountability remains with the data owner.
Start a Discussions