To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some new questions:
Q
Which of the following would be an example of an ‘objective’ privacy harm to an individual, based on Calo’s Harm Dimensions?
A. Receiving spam following the sale of an email address.
B. Negative feelings derived from government surveillance.
C. Social media profile views indicating unexpected interest in a person.
D. Personal data inaccuracies present in a user’s social media profile.
Q
Which of the following is NOT a factor to consider in FAIR analysis?
A. The severity of the harm that might be caused by the privacy risk.
B. The capability of a threat actor to exploit the analyzed privacy risk.
C. The stage of the data life cycle in which the analyzed privacy risk occurs.
D. The probability that a threat actor’s attempts to exploit a privacy risk might succeed.
Q
Which of the following is the most important action to take prior to collecting personal data directly from a customer?
A. Define what data needs to be collected.
B. Define the purpose for collecting and using the data.
C. Identify business requirements for the data that will be collected.
D. Provide individuals with information about how their data will be used after collection.
……………