What are the two phases of DSCI Privacy Third Party Assessment?
Answer : C
Which of the following are key contributors that would enhance the complexity in implementing security measures for protection of personal information? (Choose all that apply.)
Answer : A, B, C
Which of the following activities form part of an organization's Visibility over Personal Information (VPI) initiative, according to DSCI Privacy Framework (DPF)?
Answer : C
There are several privacy incidents reported in an organization. The organization plans to analyze and learn from these incidents. Which privacy practice will the organization have to implement for the same?
Answer : D
From the following list, identify the technology aspects that are specially designed for upholding privacy:
I) Data minimization
II) Intrusion prevention system
III) Data scrambling
IV) Data loss prevention
V) Data portability
VI) Data obfuscation
VII) Data encryption
VIII) Data mirroring
Answer : C
Which of the following does the 'Privacy Strategy & Processes' layer in the DPF help accomplish? (Choose all that apply.)
Answer : A, B, D, E
What is the maximum compensation that can be imposed on an organization for negligence in implementing reasonable security practices as defined in Section 43A of ITAA, 2008?
Answer : C