Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?
Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following poses the GREATEST data privacy risk related to the use of large language models (LLMs)?
Who is ULTIMATELY accountable for the protection of personal data collected by an organization?
Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?