Which of the following is MOST important to capture in the audit log of an application hosting personal data?
An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?
Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?
An email opt-in form on a website applies to which privacy principle?
Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?
Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?