The statement that is false regarding the use of technical security controls is that most privacy legislation lists the types of technical security controls that must be implemented. Technical security controls are the hardware and software components that protect a system against cyberattacks, such as encryption, firewalls, antivirus software, and access control mechanisms1 However, most privacy legislation does not prescribe specific types of technical security controls that must be implemented by organizations. Instead, they usually require organizations to implement reasonable or appropriate technical security measures to protect personal data from unauthorized or unlawful access, use, disclosure, alteration, or destruction23 The exact level and type of technical security controls may depend on various factors, such as the nature and sensitivity of the data, the risks and threats involved, the state of the art technology available, and the cost and feasibility of implementation4 Therefore, organizations have some flexibility and discretion in choosing the most suitable technical security controls for their data processing activities. References: 1: Technical Controls — Cybersecurity Resilience - Resilient Energy Platform; 2: [General Data Protection Regulation (GDPR) – Official Legal Text], Article 32; 3: [Privacy Act 1988], Schedule 1 - Australian Privacy Principles (APPs), APP 11; 4: Technical Security Controls: Encryption, Firewalls & More
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit