Certification once granted, will be valid for period of _______ years subject to surveillance assessments.
A newly appointed Data Protection officer is reviewing the organization’s existing privacy policy. Which of the following would be the most critical factor for the review process?
What are the two phases of DSCI Privacy Third Party Assessment?
Which of the following is not an objective of POR?
Classify the following scenario as major or minor non-conformity.
“The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.”
With respect to privacy implementation, organizations should strive for which of the following:
What is a Data Controller?
“Data which cannot be attributed to a particular data subject without use of additional information.” Which of the following best describes the above statement?
Which of the following activities form part of an organization’s Visibility over Personal Information (VPI) initiative, according to DSCI Privacy Framework (DPF®)?
Which of the following parameters should ideally be addressed by a privacy program of an organization? (Choose all that apply.)