1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Environmental, Social, and Governance (ESG)
A framework used to assess a project's impact on environmental sustainability, social responsibility, and ethical governance practices.
Project Manager’s Role in ESG
Ensures that ESG responsibilities are clearly assigned to accountable team members, though the project manager does not directly handle ESG tasks.
Environmental Factor (ESG)
Focuses on the project's impact on the natural environment, including sustainability practices and environmentally friendly outcomes.
Social Factor (ESG)
Addresses how the project affects people, including employees, customers, and stakeholders; emphasizes communication, inclusivity, and stakeholder expectations.
Governance Factor (ESG)
Relates to leadership, accountability, and alignment with the company’s mission, vision, and values; involves oversight and ethical decision-making.
Physical Security
Measures taken to protect people, facilities, and equipment. This includes physical entry points like buildings and data centers.
Background Screening
A security measure to verify an individual's background, education, and criminal history before they're assigned to a project, especially for roles with access to classified information.
Removable Media Considerations
Security protocols related to the use of USB drives and external hard drives. This includes preventing data leaks or malware introduction.
Resource Access and Permissions
Controlling access to project files and systems based on an individual's job role and the principle of least privilege.
Remote Access Restrictions
Security protocols for users accessing project systems from outside networks, often requiring VPN or approved devices.
Multifactor Authentication (MFA)
A security method requiring multiple forms of verification to access project systems or data.
Data Classification
Organizing data into categories based on its sensitivity and risk level. This helps determine how to handle and protect the data.
Classifications of Information Based on Sensitivity
Public
Internal
Confidential
Proprietary
National Security Information
Need-to-Know Basis
A principle stating that sensitive project information should only be shared with individuals who absolutely need it to perform their roles.
Corporate IT Security Policies
Internal rules and procedures that define how technology and data are handled to ensure compliance and reduce risks.
Data Privacy
Protecting personal data. This involves ensuring its confidentiality, integrity, and availability.
Personally Identifiable Information (PII)
Any information that can be used to identify, contact, or locate a single person, such as name, social security number, or date of birth.
Protected Health Information (PHI)
Any PII created, received, or maintained by a covered entity related to the past, present, or future physical or mental health condition of an individual. This is protected under the Health Insurance Portability and Accountability Act (HIPAA).
General Data Protection Regulation (GDPR)
A data privacy regulation in the European Union that requires organizations to protect the personal data and privacy of EU citizens.
Legal and Regulatory Terms
Project managers must be aware of various laws and standards. These can include HIPAA, the Payment Card Industry Data Security Standard (PCI DSS), and regulations from entities like the Federal Transit Authority (FTA) or the Financial Crimes Enforcement Network (FinCEN).
Project Compliance
Adhering to legal, contractual, and policy requirements. This is a critical duty for a project manager to avoid fines and reputational damage.
Branding Restrictions
Guidelines that govern the use of company logos, slogans, and other branding elements in project documentation or communications to protect corporate identity.
Public (Information Sensitivity Classification)
Unclassified data with no restrictions on dissemination. This information can be shared freely with the public without causing harm.
Internal (Information Sensitivity Classification)
Information that is intended for internal business use only. While not highly sensitive, it is not meant for public release.
Confidential (Information Sensitivity Classification)
Highly sensitive data with restricted access. Unauthorized disclosure of this information could cause significant harm to the organization or individuals.
Proprietary (Information Sensitivity Classification)
Data that gives a company a competitive edge. This information must be protected from unauthorized disclosure to maintain a company's market advantage.
National Security Information (Information Sensitivity Classification)
Classified data related to national defense or intelligence. Access to this information is extremely limited and heavily restricted to protect national interests.