WITH ANSWERS GRADED A+
◉ Strategic management of privacy starts by creating or updating the
organization vision and mission statement based on privacy best
practices that should include: Answer: (1) Develop vision and mission
statement objectives\n\n(2) Define privacy program scope\n\n\n(3)
Identify legal and regulatory compliance challenges\n\n\n(4) Identify
organization personal information legal requirements
◉ Define Privacy Program Scope. Answer: 1) Identify & Understand
Legal and Regulatory Compliance Challenges\nii) Identify the Data
Impacted\n\n*Understand Global Perspective\n*Customize
Approach\n*Be Aware of Laws, Regulations, Processes,
Procedures\n*Monitor Legal Compliance Factors
◉ Types of Protection Models (4). Answer: i) Sectoral (US)\nii)
Comprehensize (EU, Canada, Russia)\niii) Co-Regulatory
(Australia)\niv) Self Regulated (US, Japan, Singapore)
◉ Questions to Ask When Determining Privacy Requirements (Legal).
Answer: - Who collects, uses, maintians Personal Information\n- What
are the types of Personal Information\n- What are the legal requirements
,for the PI\n- Where is the PI stored\n- How is the PI collected\n- Why is
the PI collected
◉ Steps to Developing a Privacy Strategy (5). Answer: i) ID
Stakeholders and Internal Partnerships\nii) Leverage Key Functions\niii)
Create a Process for Interfacing\niv) Develop a Data Governance
Strategy\nv) *Conduct a Privacy Workshop
◉ Data Governance Models (3). Answer: i) Centralized\nii)
Local/Decentralized\niii) Hybrid
◉ What is a Privacy Program Framework?. Answer: Implementation
roadmap that provides structure or checklists to guide privacy
professionals through management and prompts for details to determine
privacy relevant decisions.
◉ Popular Frameworks (6). Answer: APEC Privacy - regional data
transfers\nPIPEDA (Canada) & AIPP (Australian)\nOCED\nPrivacy by
Design\nUS Government
◉ Steps to Develop Privacy Policies, Standards, Guidelines (4). Answer:
i) Assessment of Business Case \nii) Gap Analysis - \niii) Review &
Monitor\niv) Communicate
,◉ Business Case. Answer: Defines individual program needs and way to
meet specific goals.\n\n- Org Privacy Guidance\n- Define Privacy\n-
Laws/Regs\n- Technical Controls\n- External Privacy Orgs\n-
Frameworks\n- Privacy Enhancing Tech (PETs)\n-
Education/Awareness\n- Program Assurance
◉ What are the 4 Parts of the Privacy Operational Life Cycle. Answer: i)
Assess\nii) Protect\niii) Sustain\niv) Respond
◉ 5 Maturity Levels of the AICPA/CICA Privacy Maturity Model?.
Answer: i) Ad Hoc - Procedures informal, incomplete, inconsistently
applied (not written)\nii) Repeatable - Procedures exist, partially
documented, don't cover all areas\niii) Defined - All documented,
implemented, cover all relevant aspects\niv) Managed - Reviews
conducted assess effectiveness of controls\nv) Optimized - Regular
reviews and feedback to ensure continuous improvements.
◉ Privacy Assessment Approach (Key Areas). Answer: i) Internal Audit
& Risk Management\nii) Information Tech & IT
Operations/Development\niii) Information Security\niv) HR/Ethics\nv)
Legal/Contracts\nvi) Process/3rd Party Vendors\nvii)
Marketing/Sales\nviii) Government Relations\nix) Accounting/Finance
◉ 11 Principles of the Data Life Cycle Management Model. Answer: i)
Enterprise Objectives\nii) Minimalism\niii) Simplicity of Procedures &
Training\niv) Adequacy of Infrastructure\nv) Information Security\nvi)
Authenticity and Accuracy of Records\nvii) Retrievabiliyt\nviii)
, Distribution Controls\nix) Auditability\nx) Consistency of Policies\nxi)
Enforcement
◉ What is CIA & AA. Answer:
Confidentiality\nIntegrity\nAvailability\n\nAccountability\nAssurance
◉ What is the difference between positive & negative controls?.
Answer: Positive - Enable privacy and business practices
(win/win)\n\nNegative - Enable privacy but constrain business
(win/lose)
◉ What are the 3 high level security roles?. Answer: i) Executive\nii)
Functional\niii) Corollary
◉ What are the 7 foundation principles of Privacy by Design?. Answer:
i) Proactive not Reactive; Preventative not Remedial\nii) Privacy as
Default Setting\niii) Privacy Embedded into Design\niv) Full
Funcationality\nv) End to End Security (Throughout Lifecyle)\nvi)
Visibility and Transparency\nvii) Respect for User Privacy
◉ 3 keys to Sustainment?. Answer: i) Monitor\nii) Audit\niii)
Communicate
◉ 4 keys to Response?. Answer: i) Information Requests\nii) Legal
Compliance\niii) Incident Response Planning\niv) Incident Handling