Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner's BEST recommendation?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Require security management to validate data privacy security practices.
Conduct annual data privacy tabletop exercises
Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?
Type of data being processed
An organization's work-from-home policy allows employees to access corporate IT assets remotely Which of the following controls is MOST important to mitigate the risk of potential personal data compromise?