The two types of data we have are?
Technical measures are sometimes thought of as the protection of personal data held in ______________________
Who is tasked with driving company-wide compliance with NDPR 2019 at your company?
When considering cybersecurity, what factors should you look at?
_________is fundamentally linked to fairness. Its processing is about being clear, open and honest with people from the start about who you are, how and why you use their personal data
Technical measures may sometimes be referred as?
Acting in line with the LETTER and the SPIRIT of laid down rules, regulations, guidelines, standards, laws and codes, conventions; either internal or external is referred to as ______
When confronting threats from spam emails, an effective measure is----------
When can we say data misuse has occurred?
The protection of data under the NDPR applies to
Listed below are the NDPR governance except:
i. Lawful, Fairness and Transparency
ii. Purpose Limitation, Data Minimization
iii. Principles, Processes, Programs and Procedures
iv. Integrity and Confidentiality, Accountability
Which of these is not a factor to look at when considering physical security?
Personal data must be _______, ______ and ______ to what is necessary in relation to the purposes for which they are processed
___________ and ____________ are specified in the NDPR as two examples of measures that may be appropriate for you to implement in the control and mitigation of data breach
What is the ultimate goal of the NDPR 2019?
The storage that comes in different forms including backing up information on removable hard drives or other external storage mediums is referred to as?
Which of the following is not a component of compliance?
A specific, deliberate monitoring carried out to identify breaches with the NDPR is referred to as_____
Which of the following is not a control of compliance?
Upon reporting a breach to NDPB by a data subject, Director General may direct action to be taken which may include the following except:
Notification of Data Breach to NDPB must include the following information except:
Under the accountability principle of NDPR Governance, Data Controllers are “Responsible for compliance and must be able to demonstrate compliance”?
Some of the rights of data subjects include the following except
Some common threats when creating a threat list includes the following except
Which of the following is not considered a data subject?