When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
An online retail company is trying to determine how to handle users' data if they unsubscribe from marketing emails generated from the website. Which of the following is the BEST approach for handling personal data that has been restricted?
Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
Which of the following features should be incorporated into an organization's technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?