Which of the following mechanisms can be used to transfer personal data outside of a country?
______________ is used to identify and reduce privacy risks by analyzing what is processed by the entity and the policies in place to protect the data.
Which of the following is not in line with the modem definition of Consent?
Which of the following best describes ‘Processing’?
Section 43A of the Information Technology (Amendment) Act, 2008 holds____________ accountable for having reasonable security practices and procedures in place to protection sensitive personal data.
__________ calls for inclusion of data protection from the onset of the designing of systems.