An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
An email opt-in form on a website applies to which privacy principle?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
When can data subjects be prohibited from withdrawing consent for processing their personal data?
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?