Rédigé par des étudiants ayant réussi Disponible immédiatement après paiement Lire en ligne ou en PDF Mauvais document ? Échangez-le gratuitement 4,6 TrustPilot
logo-home
Examen

IAPP CIPM GLOSSARY FOR EXAM PREPARATION

Note
-
Vendu
-
Pages
11
Grade
A+
Publié le
07-10-2024
Écrit en
2024/2025

Accountability The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law, an idea codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross Border Privacy Rules. Traditionally, accountability has been a fair information practices principle, that due diligence and reasonable steps will be undertaken to ensure that personal information will be protected and handled consistently with relevant law and other fair use principles. Active Scanning Tools DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to personal information. They can also be used to monitor for compliance with internal policies and procedures, and block e-mail or file transfers based on the data category and definitions. American Institute of Certified Public Accountants A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal program. Acronym(s): AICPA Associated term(s): Canadian Institute of Chartered Accountants, Seal Programs, WebTrust Anonymization The process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual. Among many techniques, there are three primary ways that data is anonymized. Suppression is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability. Generalization takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set. Note that all of these processes will not guarantee that data is no longer identifiable and have to be performed in such a way that does not harm the usability of the data. Associated law(s):Anonymous Data, De-Identification, Microdata Sets, Re-identification APEC Privacy Principles A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative (APEC) that mirror the OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs. Assess The first of four phases of the privacy operational life cycle; provides the steps, checklists and processes necessary to assess any gaps in a privacy program as compared to industry best practices, corporate privacy policies, applicable privacy laws, and objective-based privacy program frameworks. Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond Audit Life Cycle High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting the Audit; Reporting; and Follow-up. Behavioral Advertising Advertising that is targeted at individuals based on the observation of their behaviour over time. Most often done via automated processing of personal data, or profiling, the General Data Protection Regulation requires that data subjects be able to opt-out of any automated processing, to be informed of the logic involved in any automatic personal data processing and, at least when based on profiling, be informed of the consequences of such processing. If cookies are used to store or access information for the purposes of behavioral advertising, the ePrivacy Directive requires that data subjects provide consent for the placement of such cookies, after having been provided with clear and comprehensive information. Acronym(s): OBA Associated term(s): Online Behavioral Advertising, Behavioral Targeting, Contextual Advertising, Demographic Advertising, Premium Advertising, Psychographic Advertising, Remnant Advertising Binding Corporate Rules Binding Corporate Rules (BCRs) are an appropriate safeguard allowed by the General Data Protection Regulation to facilitate cross-border transfers of personal data between the various entities of a corporate group worldwide. They do so by ensuring that the same high level of protection of personal data is complied with by all members of the organizational group by means of a single set of binding and enforceable rules. BCRs compel organizations to be able to demonstrate their compliance with all aspects of applicable data protection legislation and are approved by a member state data protection authority. To date, relatively few organizations have had BCRs approved. Acronym(s): BCR Bureau of Competition The United States' Federal Trade Commission's Bureau of Competition enforces the nation's antitrust laws, which form the foundation of our free market economy. The antitrust laws promote the interests of consumers; they support unfettered markets and result in lower prices and more choices. Associated term(s): Bureau of Consumer Protection; Bureau of Economics Bureau of Economics The United States' Federal Trade Commission's Bureau of Economics helps the FTC evaluate the economic impact of its actions by providing economic analysis for competition and consumer protection investigations and rulemakings, and analyzing the economic impact of government regulations on businesses and consumers. Associated term(s): Bureau of Competition; Bureau of Consumer Protection Business case The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or regulations, industry frameworks, customer requirements and other considerations. Business Continuity and Disaster Recovery Plan A risk mitigation plan designed to prepare an organization for crises and to ensure critical business functions continue. The focus is to recover from a disaster when disruptions of any size are encountered. Acronym(s): BCDR Business Continuity Plan The business continuity plan is typically drafted and maintained by key stakeholders, spelling out departmental responsibilities and actions teams must take before, during and after an event in order to help operations run smoothly. Situations covered in a BCP often include fire, flood, natural disasters (tornadoes and hurricanes), and terrorist attack. Acronym(s): BCP Canadian Institute of Chartered Accountants The Canadian Institute of Chartered Accountants (CICA), in partnership with the provincial and territorial institutes, is responsible for the functions that are critical to the success of the Canadian CA profession. CICA, pursuant to the 2006 Protocol, is entrusted with the responsibility for providing strategic leadership, co-ordination of common critical functions of strategic planning, protection of the public and ethics, education and qualification, standard setting and communications Acronym(s): CICA Centralized governance Privacy governance model that leaves one team or person responsible for privacy-related affairs; all other persons or organizations will flow through this point.

Montrer plus Lire moins
Établissement
IAPP CIPM GLOSSARY
Cours
IAPP CIPM GLOSSARY

Aperçu du contenu

IAPP CIPM GLOSSARY FOR EXAM PREPARATION

Accountability



The implementation of appropriate technical and organizational measures to ensure and be able to
demonstrate that the handling of personal data is performed in accordance with relevant law, an idea
codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross
Border Privacy Rules. Traditionally, accountability has been a fair information practices principle, that
due diligence and reasonable steps will be undertaken to ensure that personal information will be
protected and handled consistently with relevant law and other fair use principles.




Active Scanning Tools



DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to
personal information. They can also be used to monitor for compliance with internal policies and
procedures, and block e-mail or file transfers based on the data category and definitions.




American Institute of Certified Public Accountants



A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal
program.

Acronym(s): AICPA

Associated term(s): Canadian Institute of Chartered Accountants, Seal Programs, WebTrust




Anonymization

, The process in which individually identifiable data is altered in such a way that it no longer can be
related back to a given individual. Among many techniques, there are three primary ways that data is
anonymized. Suppression is the most basic version of anonymization and it simply removes some
identifying values from data to reduce its identifiability. Generalization takes specific identifying values
and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition
takes identifying values from a given data set and switches them with identifying values from another
individual in that data set. Note that all of these processes will not guarantee that data is no longer
identifiable and have to be performed in such a way that does not harm the usability of the data.

Associated law(s):Anonymous Data, De-Identification, Microdata Sets, Re-identification




APEC Privacy Principles



A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative (APEC) that mirror the
OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote
electronic commerce throughout the Asia-Pacific region by balancing information privacy with business
needs.




Assess



The first of four phases of the privacy operational life cycle; provides the steps, checklists and processes
necessary to assess any gaps in a privacy program as compared to industry best practices, corporate
privacy policies, applicable privacy laws, and objective-based privacy program frameworks.

Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond




Audit Life Cycle



High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting
the Audit; Reporting; and Follow-up.

École, étude et sujet

Établissement
IAPP CIPM GLOSSARY
Cours
IAPP CIPM GLOSSARY

Infos sur le Document

Publié le
7 octobre 2024
Nombre de pages
11
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

€9,36
Accéder à l'intégralité du document:

Mauvais document ? Échangez-le gratuitement Dans les 14 jours suivant votre achat et avant le téléchargement, vous pouvez choisir un autre document. Vous pouvez simplement dépenser le montant à nouveau.
Rédigé par des étudiants ayant réussi
Disponible immédiatement après paiement
Lire en ligne ou en PDF

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
TOPDOCTOR Abacus College, Oxford
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
10
Membre depuis
2 année
Nombre de followers
5
Documents
3395
Dernière vente
5 mois de cela
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Lire la suite Lire moins
5,0

1 revues

5
1
4
0
3
0
2
0
1
0

Documents populaires

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions