A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
Attribute-based access control (ABAC) is the best approach for limiting the access of regional HR team members to employee data only within their regional office, because it allows for fine-grained and dynamic access control based on attributes of the subject, object, environment, and action. Attributes are characteristics or properties that can be used to describe or identify entities, such as users, resources, locations, roles, or permissions. ABAC uses policies and rules that evaluate the attributes and grant or deny access accordingly. For example, an ABAC policy could state that a user can access an employee record if and only if the user's role is HR and the user's region matches the employee's region. This way, the access control can be tailored to the specific needs and context of the organization, without relying on predefined or fixed access levels.
Attribute-Based Access Control (ABAC), NIST
What is Attribute-Based Access Control (ABAC)?, Axiomatics
Access Control Models -- Westoahu Cybersecurity, Westoahu Cybersecurity
Which of the following is the MOST important consideration when determining retention periods for personal data?
Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?
Data flow diagrams (DFDs) are most valuable for illustrating the locations and movements of personal data across systems and processes, which is essential for compliance mapping and controls. Mapping at rest (C) or transit (D) are subsets of this broader view, while (A) is vague.
''DFDs identify where personal data resides and flows, supporting compliance and risk management.''
Which of the following is the MOST important consideration when processing personal data for an AI project?
Before any processing, CDPSE stresses lawfulness: identify and document the appropriate legal basis and processing purpose(s). Security controls (C), algorithmic techniques (B), and aggregation (D) are important but secondary to establishing a lawful basis and purpose limitation.
Key CDPSE-aligned phrasing (short extract): ''Processing requires a lawful basis and defined purposes prior to collection/use.''
Which of the following solutions would BEST enable a privacy practitioner to support control over data processing activities related to personal information?
A consent management platform (CMP) directly supports control over personal data processing by tracking and enforcing individuals' consent preferences across systems. SIEM (A) monitors security events, ERP (C) supports operations, and DLP (D) protects against data leakage but does not manage lawful basis for processing.
''Consent management tools ensure personal data is processed only in line with valid consent or lawful basis.''
Fletcher
11 days agoFatima
18 days agoLashanda
25 days agoElden
1 month agoMelissa
1 month agoAllene
2 months agoTy
2 months agoUlysses
2 months agoRobt
2 months agoPauline
3 months agoEarlean
3 months agoEarleen
3 months agoRonnie
3 months agoLai
4 months agoDeandrea
4 months agoCarline
4 months agoHoward
4 months agoEmilio
5 months agoHyman
5 months agoYuriko
5 months agoTeri
5 months agoOretha
6 months agoDaron
6 months agoJannette
6 months agoAnthony
6 months agoAlaine
7 months agoAn
7 months agoHoa
7 months agoRashad
7 months agoWillodean
7 months agoNettie
7 months agoNatalie
7 months agoLuke
10 months agoGalen
10 months agoRosann
11 months agoDeangelo
12 months agoKeneth
1 year agoCammy
1 year agoLettie
1 year agoMauricio
1 year agoFrederica
1 year agoAmina
1 year agoVi
1 year agoChristene
1 year agoCory
1 year agoKatheryn
1 year agoRessie
1 year agoLouvenia
1 year agoIsadora
1 year agoMoira
1 year agoMona
1 year agoBrendan
1 year agoMargart
1 year agoScarlet
1 year agoSherrell
1 year agoMerlyn
1 year agoAlisha
1 year agoKristel
1 year agoWeldon
1 year agoBrunilda
2 years agoNorah
2 years agoPok
2 years agoMireya
2 years agoWilford
2 years agoRyan
2 years agoJohnathon
2 years agoBen
2 years agoHassie
2 years agoFrance
2 years agoJoana
2 years agoPeggy
2 years agoAlba
2 years ago