Which of the following could be considered as triggers for updating privacy policy? (Choose all that apply.)
With respect to privacy monitoring and incident management process, which of the following should be a part of a standard incident handling process?I: Incident identification and notificationII: Investigation and remediationIII: Root cause analysis -IV: User awareness training on how to report incidents
‘Create an inventory of the specific contractual terms that explicitly mention the data protection requirements.’ This an imperative of which DPF practice area?
Which of the following is not an objective of POR?
From the following list, identify the technology aspects that are specially designed for upholding privacy:I: Data minimization -II: Intrusion prevention system -III: Data scrambling -IV: Data loss prevention -V: Data portability -VI: Data obfuscation -VII: Data encryption -VIII: Data mirroring
Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:I: Increase control over their personal dataII: Choose whether to use services anonymously or notIII: Obtain informed consent about sharing their personal dataIV: Opt-out of behavioral advertising or any other use of data