Lesson 16: Summarize Data and Protection and Compliance Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Data Types

Categorizing or classifying data based on its inherent characteristics, structure, and intended use

2
New cards

Regulated Data

Sensitive information that must be stored and handled in specific ways because of government laws or industry rules

3
New cards

Trade Secret

Valuable, confidential information that gives a business a competitive advantage

4
New cards

Intellectual Property

A type of legal protection for ideas, creations, and inventions that come from a person’s or business’s mind or creativity.

5
New cards

Legal Data

Documents and records that relate to matters of law

6
New cards

Financial Data

Information about money and financial activities

7
New cards

Data Classification

Sorting information into groups based on how private or sensitive it is

8
New cards

Public Data Classification

There are no restrictions on viewing the data

9
New cards

Confidential Data Classification

Private but manageable information that needs controlled access.

10
New cards

Secret Data Classification

Information that, if revealed, could cause serious harm to national security, so it must be strictly protected.

11
New cards

Top Secret Data Classification

The highest classification level for information that, if leaked, could cause exceptionally grave harm to national security.

12
New cards

Private Data Classification

Information that relates to an individual’s identity and must be protected from unauthorized access to ensure their privacy and safety.

13
New cards

Data Sovereignty

Data is subject to the laws and regulations of the country where it is physically stored.

14
New cards

Geographical Considerations

  • Organizations must ensure data remains within designated boundary

  • Access controls to validate a user’s geographic location

15
New cards

General Data Protection Regulation (GDPR) in the European Union

A strict EU privacy law that gives people control over their personal data and forces companies to protect it responsibly.

16
New cards

Data Controller

The organization or person that decides why and how personal data is collected and used.

17
New cards

Data Processor

Someone who uses or stores data for someone else, without making decisions about it

18
New cards

Data Subject

The person whose personal data is being collected, stored, or used

19
New cards

Right to be Forgotten

A key principle in GDPR that gives people the right to ask for their personal data to be deleted, under certain conditions

20
New cards

Data Inventories

List of classified data or information stored or processed by a system.

21
New cards

Data Retention

Organizations must keep personal data only as long as it's needed to fulfill its original purpose or as required by law, and then safely delete or archive it

22
New cards

Data Breach

When information is read, modified, or deleted without authorization

23
New cards

Organization Consequences of Data Breaches

  • Reputation Damage

  • Identity Theft

  • Fines

  • Intellectual Property (IP) Theft

24
New cards

Breach Notification

How a company alerts people and authorities that their data may have been compromised

25
New cards

Security Compliance

Organizations adherence to applicable security standards, regulations, policy and best practices

26
New cards

Legal & Regulatory Noncompliance

When an organization fails to follow laws, regulations, or required standards that apply to its business or data practices.

27
New cards

Software Licensing Noncompliance

When an organization uses software in ways that break the terms of its license agreement

28
New cards

Contractual Noncompliance

When a person or organization fails to follow the terms and conditions of a signed contract

29
New cards

Data Protection

Data requires different protections methods for each state

30
New cards

Data at Rest

Data that is being stored somewhere

31
New cards

Data in Transit

Data that is actively moving between locations

32
New cards

Data in Use

Data being actively processed or accessed.

33
New cards

Data Loss Prevention (DLP)

Tools and strategies used to stop sensitive data from being leaked, lost, or stolen

34
New cards

Conduct Policies

Rules that explain how employees are expected to behave in the workplace, helping ensure a safe, respectful, and ethical environment

35
New cards

Acceptable Use Policy (AUP)

A policy that controls how employees (or customers) can use company equipment, internet access, and other IT resources

36
New cards

Code of Conduct

A set of rules of behavior that defines the expected professional standards for individuals within an organization

37
New cards

Social Media Use and Analysis

Refers to how people or organizations interact on social platforms and how they study that activity to understand trends, behaviors, or opinions.

38
New cards

Use of Personally Owned Devices in the Workplace

A set of rules that explains how employees can use their personal phones, laptops, or tablets for work, while protecting the company’s data and systems

39
New cards

Clean Desk Policy

Mandates employee work areas be free from potentially sensitive information