Which of the following is the MOST important consideration when choosing a method for data destruction?
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
Critical data elements should be mapped to which of the following?
A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the
lender. Which fundamental data subject right does this process infringe upon?
Which of the following BEST represents privacy threat modeling methodology?
Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?
The MOST effective way to incorporate privacy by design principles into applications is to include privacy requirements in.
Which of the following is the BEST way to protect personal data in the custody of a third party?
Which of the following is the MOST important attribute of a privacy policy?
Breach notification period
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?