An organization's data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following MOST effectively protects against the use of a network sniffer?
An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?
Which of the following is MOST important when developing an organizational data privacy program?