Which of the following is the BEST way to convert personal information to non-personal information?
Which of the following is the BEST control to detect potential internal breaches of personal data?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?
Which of the following is the BEST method of data sanitization when there is a need to balance the destruction of data and the ability to recycle IT assets?