A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?
Answer : D
When is the BEST time during the secure development life cycle to perform privacy threat modeling?
Answer : B
The best time during the secure development life cycle to perform privacy threat modeling is early in the design phase, because this will help identify and mitigate the potential privacy risks and vulnerabilities of the system or application before they become costly or difficult to fix.Privacy threat modeling is a systematic process of analyzing the data flows, assets, actors, and scenarios of a system or application to identify and prioritize the privacy threats and countermeasures12. Performing privacy threat modeling early in the design phase will also help ensure that privacy is built into the system or application from the start, rather than as an afterthought.
CDPSE Exam Content Outline, Domain 2 -- Privacy Architecture (Privacy Architecture Implementation), Task 2: Implement privacy solutions3.
CDPSE Review Manual, Chapter 2 -- Privacy Architecture, Section 2.3 -- Privacy Architecture Implementation4.
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Answer : C
Irreversible disposal is a process of removing or destroying data from a storage device or media to prevent unauthorized access or recovery of the data. Irreversible disposal is the most important thing to establish within a data storage policy to protect data privacy, as it reflects the principles of data minimization and storage limitation, which require limiting the collection, storage and processing of personal data to what is necessary and relevant for the intended purposes, and deleting or disposing of personal data when it is no longer needed or justified. Irreversible disposal also helps to reduce the privacy risks and costs associated with data storage and retention, such as data breaches, unauthorized access, misuse or loss of data. The other options are not as important as irreversible disposal in protecting data privacy within a data storage policy. Data redaction is a technique that removes or obscures sensitive or confidential information from a document or file, but it does not address the issue of data retention or deletion. Data quality assurance (QA) is a process of ensuring that the data meets the standards and specifications of accuracy, completeness, consistency and reliability, but it does not address the issue of data retention or deletion.Collection limitation is a principle that requires limiting the collection of personal data to what is necessary and relevant for the intended purposes, but it does not address the issue of data retention or deletion1, p.75-76Reference:1: CDPSE Review Manual (Digital Version)
An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?
Answer : C
Before de-identifying data, it is important to determine the categories of personal data collected, such as names, addresses, phone numbers, email addresses, social security numbers, health information, and so on. This will help to identify which data elements are considered identifiers or quasi-identifiers, and which de-identification techniques are appropriate for each category. For example, some data elements may need to be removed completely, while others may be masked, generalized, or perturbed.
Anonymize and De-identify | Research Data Management
Data De-identification: An Overview of Basic Terms - ed
Which of the following would BEST support an organization in fulfilling data subject rights?
Answer : D
A current and accurate data map enables organizations to locate personal data across systems, which is essential for responding to access, rectification, erasure, and portability requests. DLP (A) prevents leakage, not rights fulfillment; breach handling (B) addresses incidents, not rights; contact forms (C) provide intake but not fulfillment.
''Data maps provide visibility into where and how personal data is processed, enabling rights fulfillment.''
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
Answer : C
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the business application owner, because they are the ones who are responsible for defining the business requirements, functions, and objectives of the applications. The business application owner can also determine the appropriate level of access for different users or groups based on their roles, responsibilities, and needs. The business application owner can also monitor and review the access control policies and procedures to ensure that they are effective and compliant with the privacy regulations and standards.
Access Control Policy and Implementation Guides, CSRC
What is Authorization and Access Control?, ICANN
Which of the following is the MOST important consideration for developing data retention requirements?
Answer : D
The most important consideration for developing data retention requirements is the applicable regulations that govern the data. Different types of data may be subject to different legal and regulatory obligations, such as how long the data must be kept, how it must be protected, and how it can be accessed or disposed of. Failing to comply with these obligations can result in fines, penalties, lawsuits, or reputational damage for the organization. Therefore, it is essential to identify and follow the applicable regulations for each data category.
Data Retention Policy 101: Best Practices, Examples & More - Intradyn
Data retention - Wikipedia