Which of the following is the BEST way to protect the privacy of data stored on a laptop in case of loss or theft?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?