What can be used to determine the type of data in storage without exposing its contents?
Which is NOT a drawback to using a biometric recognition system?
Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?
What is an Access Control List?
Which activity would best support the principle of data quality?
What Privacy by Design (PbD) element should include a de-identification or deletion plan?
Granting data subjects, the right to have data corrected, amended, or deleted describes?
What is the best way to protect privacy on a Geographic Information System (GIS)?
What term describes two re-identifiable data sets that both come from the same unidentified individual?
Which of these actions is NOT generally part of the responsibility of an IT or software engineer?
What is the main function of the Amnesic Incognito Live System or TAILS device?
What was the first privacy framework to be developed?
Not updating software for a system that processes human resources data with the latest security patches may create what?
How should the sharing of information within an organization be documented?
Which is likely to reduce the types of access controls needed within an organization?
What is the main benefit of data aggregation?
All of the following can be indications of a ransomware attack EXCEPT?
What is an example of a just-in-time notice?
What is true of providers of wireless technology?