Examining Security, Privacy and Compliance in Project Management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Environmental, Social, and Governance (ESG)

A framework used to assess a project's impact on environmental sustainability, social responsibility, and ethical governance practices.

2
New cards

Project Manager’s Role in ESG

Ensures that ESG responsibilities are clearly assigned to accountable team members, though the project manager does not directly handle ESG tasks.

3
New cards

Environmental Factor (ESG)

Focuses on the project's impact on the natural environment, including sustainability practices and environmentally friendly outcomes.

4
New cards

Social Factor (ESG)

Addresses how the project affects people, including employees, customers, and stakeholders; emphasizes communication, inclusivity, and stakeholder expectations.

5
New cards

Governance Factor (ESG)

Relates to leadership, accountability, and alignment with the company’s mission, vision, and values; involves oversight and ethical decision-making.

6
New cards

Physical Security

Measures taken to protect people, facilities, and equipment. This includes physical entry points like buildings and data centers.

7
New cards

Background Screening

A security measure to verify an individual's background, education, and criminal history before they're assigned to a project, especially for roles with access to classified information.

8
New cards

Removable Media Considerations

Security protocols related to the use of USB drives and external hard drives. This includes preventing data leaks or malware introduction.

9
New cards

Resource Access and Permissions

Controlling access to project files and systems based on an individual's job role and the principle of least privilege.

10
New cards

Remote Access Restrictions

Security protocols for users accessing project systems from outside networks, often requiring VPN or approved devices.

11
New cards

Multifactor Authentication (MFA)

A security method requiring multiple forms of verification to access project systems or data.

12
New cards

Data Classification

Organizing data into categories based on its sensitivity and risk level. This helps determine how to handle and protect the data.

13
New cards

Classifications of Information Based on Sensitivity

Public

Internal

Confidential

Proprietary

National Security Information

14
New cards

Need-to-Know Basis

A principle stating that sensitive project information should only be shared with individuals who absolutely need it to perform their roles.

15
New cards

Corporate IT Security Policies

Internal rules and procedures that define how technology and data are handled to ensure compliance and reduce risks.

16
New cards

Data Privacy

Protecting personal data. This involves ensuring its confidentiality, integrity, and availability.

17
New cards

Personally Identifiable Information (PII)

Any information that can be used to identify, contact, or locate a single person, such as name, social security number, or date of birth.

18
New cards

Protected Health Information (PHI)

Any PII created, received, or maintained by a covered entity related to the past, present, or future physical or mental health condition of an individual. This is protected under the Health Insurance Portability and Accountability Act (HIPAA).

19
New cards

General Data Protection Regulation (GDPR)

A data privacy regulation in the European Union that requires organizations to protect the personal data and privacy of EU citizens.

20
New cards

Legal and Regulatory Terms

Project managers must be aware of various laws and standards. These can include HIPAA, the Payment Card Industry Data Security Standard (PCI DSS), and regulations from entities like the Federal Transit Authority (FTA) or the Financial Crimes Enforcement Network (FinCEN).

21
New cards

Project Compliance

Adhering to legal, contractual, and policy requirements. This is a critical duty for a project manager to avoid fines and reputational damage.

22
New cards

Branding Restrictions

Guidelines that govern the use of company logos, slogans, and other branding elements in project documentation or communications to protect corporate identity.

23
New cards

Public (Information Sensitivity Classification)

Unclassified data with no restrictions on dissemination. This information can be shared freely with the public without causing harm.

24
New cards

Internal (Information Sensitivity Classification)

Information that is intended for internal business use only. While not highly sensitive, it is not meant for public release.

25
New cards

Confidential (Information Sensitivity Classification)

Highly sensitive data with restricted access. Unauthorized disclosure of this information could cause significant harm to the organization or individuals.

26
New cards

Proprietary (Information Sensitivity Classification)

Data that gives a company a competitive edge. This information must be protected from unauthorized disclosure to maintain a company's market advantage.

27
New cards

National Security Information (Information Sensitivity Classification)

Classified data related to national defense or intelligence. Access to this information is extremely limited and heavily restricted to protect national interests.