You contact the individual to update the personnel record. is this compliant with pii safeguarding

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (21)

Which action requires an organization to carry out a Privacy Impact Assessment?

A. Storing paper-based records
B. Collecting PII to store in a new information system
C. Collecting any CUI. including but not limited to PII
D. Collecting PII to store in a National Security System

B. Collecting PII to store in a new information system

What is the purpose of a Privacy Impact Assessment (PIA)?

A. Determine whether paper-based records are stored securely
B. Determine whether information must be disclosed according to the Freedom of Information Act (FOIA)
C. Determine whether the collection and maintenance of PII is worth the risk to individuals
D. Determine whether Protected Health Information (PHI) is held by a covered entity

C. Determine whether the collection and maintenance of PII is worth the risk to individuals

T or F? Information that can be combined with other information to link solely to an individual is considered PII.

True

What guidance identifies federal information security controls?

A. DoD 5400.11-R: DoD Privacy Program
B. The Freedom of Information Act (FOIA)
C. OMB Memorandum M-17-12: Preparing for and Responding to a Breach of Personally Identifiable Information
D. The Privacy Act of 1974

C. OMB Memorandum M-17-12: Preparing for and Responding to a Breach of Personally Identifiable Information

An organization that fails to protect PII can face consequences including:

A. Remediation costs
B. Loss of trust
C. Legal liability
D. All of the above

D. All of the above

If someone tampers with or steals and individual's PII, they could be exposed to which of the following?

A. Embarrassment
B. Fraud
C. Identity theft
D. All of the above

D. All of the above

Which of the following is not an example of PII?

A. Fingerprints
B. Driver's license number
C. Social Security number
D. Pet's nickname

D. Pet's nickname

What law establishes the federal government's legal responsibility for safeguarding PII?

A. OMB Memorandum M-12-12: Preparing for and Responding to a Breach of Personally Identifiable Information
B. DoD 5400.11-R: DoD Privacy Program
C. The Privacy Act of 1974
D. The Freedom of Information Act (FOIA)

C. The Privacy Act of 1974

An organization with existing system of records decides to start using PII for a new purpose outside the "routine use" defined in the System of Records Notice (SORN). Is this a permitted use?

A. Yes
B. No

B. No

Which of the following is responsible for the most recent PII data breaches?

A. Physical breaking and entry
B. Insider threat
C. Phishing
D. Reconstruction of improperly disposed documents

C. Phishing

Which of the following is not an example of an administrative safeguard that organizations use to protect PII?

A. Conduct risk assessments
B. Reduce the volume and use of Social Security Numbers
C. List all potential future uses of PII in the System of Records Notice (SORN)
D. Ensure employees are trained to properly use and protect electronic records

C. List all potential future uses of PII in the System of Records Notice (SORN)

Within what timeframe must DoD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered?

A. 1 Hour
B. 24 Hours
C. 48 Hours
D. 12 Hours

A. 1 Hour

Officials or employees who knowingly disclose PII to someone without a need-to-know may be subject to which of the following?

A. Civil penalties
B. Criminal penalties
C. Both civil and criminal penalties
D. Neither civil nor criminal penalties

B. Criminal penalties

Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as a record identification. Is this compliant with PII safeguarding procedures?

A. Yes
B. No

B. No

Identify if a PIA is required:

A. PII records are only in paper form.
B. PII records are being converted from paper to electronic.
C. A National Security System is being used to store records.
D. A new system is being purchased to store PII.
E. All of the above.
F. B and D
G. A, B, and D

F. B and D

Which of the following is NOT included in a breach notification?

A. Articles and other media reporting the breach.
B. What happened, date of breach, and discovery.
C. Point of contact for affected individuals.
D. Whether the information was encrypted or otherwise protected.

A. Articles and other media reporting the breach.

T or F? Misuse of PII can result in legal liability of the individual.

True

Which regulation governs the DoD Privacy Program?

A. DoD 5400.11-R: DoD Privacy Program
B. FOIA
C. OMB-M-17-12, Preparing for and Responding to a Breach of Personally Identifiable Information
D. The Privacy Act of 1974

A. DoD 5400.11-R: DoD Privacy Program

T or F? Using a social security number to track individuals' training requirements is an acceptable use of PII.

False

T or F? Misuse of PII can result in legal liability of the organization.

True

Which type of safeguarding measure involves restricting PII access to people with a need-to-know?

A. Administrative
B. Physical
C. Technical
D. All of the above

A. Administrative

Sets found in the same folder

WNSF PII Personally Identifiable Information (PII)…

13 terms

kpsych4

DoD Mandatory Controlled Unclassified Information…

15 terms

Arsenal619

DoD Mandatory Controlled Unclassified Information…

20 terms

chloezendt12

Malicious Code

9 terms

aastrii

Verified questions

SOCIOLOGY

According to Hochschild’s second shift explanation, gender equity in the home does not exist. Why do men, on average, still do less housework than women? Do attitudes about masculinity have anything to do with this? Do women naturally feel inclined to do the housework, given their role as nurturers and caretakers? How might gender stereotypes contribute to inequality in the household?

Verified answer

SOCIOLOGY

Discuss the cause-and-effect relationship between competition and monopolies and oligopolies.

Verified answer

SOCIOLOGY

What is the difference between authority and coercion?

Verified answer

SOCIOLOGY

Give one reason why the gap between men’s and women’s salaries persists.

Verified answer

Other Quizlet sets

SPA 4326 Final

62 terms

lindz2000

Permit test DMV questions

76 terms

Georgia_Wandersee

ASC171: Week 4. Nervous System

144 terms

OatmealWednesdayPLUS

Chapter 13

76 terms

pyoung1134

Related questions

QUESTION

Communities that focus on resort activities (Branson, MO)

2 answers

QUESTION

Historian Eric Hosbawm's book, Nations and Nationalism Since 1780: Programme, Myth, Reality - what does he have to say?

11 answers

QUESTION

Which social media space zone primarily assists in the online buying and selling of products/services?

11 answers

QUESTION

Ensuring data backups for data stored on a desktop or laptop computer is generally considered:

4 answers

What is compliant with PII safeguarding procedures?

SAFEGUARDING PII Safeguarding refers to protecting PII from loss, theft, or misuse while simultaneously supporting the agency mission. Safeguards are protective measures the Army takes to prevent unauthorized access to or disclosure of personally identifiable information (PII).

What are the three PII confidentiality safeguards?

To protect the confidentiality of PII, organizations need to use cyber security risk assessments, third-party risk management, vendor risk management and information risk management.

Does PII include employee information?

The PII covered by this policy may come from various types of individuals performing tasks on behalf of the company and includes employees, applicants, independent contractors and any PII maintained on its customer base.

What is an example of a physical safeguard that individuals can use to protect PII?

Some examples of physical safeguards are: Controlling building access with a photo-identification/swipe card system. Locking offices and file cabinets containing PHI. Turning computer screens displaying PHI away from public view.