Page 190 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 190

Information  Security and Privacy




                    Notes              (b)  the organization is necessary by law to gather the information;
                                       (c)  the individual is physically or lawfully unable of giving consent to the compilation;
                                            or physically not capable to converse his or her consent to the collection and gathering
                                            the information is essential to prevent or lessen a serious and looming threat to the
                                            life or health of the individual or another individual;

                                       (d)  gathering the information is necessary to establish, exercise or defend a legal or
                                            equitable claim. Though, an agency may collect sensitive information regarding an
                                            individual if:
                                            (i)  the compilation is essential for research, or the compilation or examination
                                                 of statistics, relevant to government funded targeted welfare or instructive
                                                 services;  or is  of information connecting to an individual’s  racial or ethnic
                                                 origin and is for the reason of offering government funded targeted welfare
                                                 or educational services
                                       (e)  there is no other sensibly practicable alternative  to gathering the information for
                                            that reason, and
                                       (f)  it  is  unfeasible  for  the  association  to  seek  the  individual’s  approval  to  the
                                            collection.

                                   Self Assessment


                                   Fill in the blanks
                                   15.  Access and correction is typically managed under the provisions of the .........................  .
                                   16.  A unique ......................... is typically a number allocated to an individual in order to identify
                                       the person for the reasons of an agency’ operations.
                                   12.10 Summary


                                      Good metrics are those that are elegant, i.e. specific, quantifiable, attainable, repeatable,
                                       and time reliant.

                                      Metrics  are tools intended to  facilitate decision making and  recover performance  and
                                       accountability during  collection, analysis,  and reporting  of  pertinent  performance-
                                       associated data.
                                      Metrics can be an effectual tool for security executives to discern the efficiency of various
                                       components of their protection programs, the security of a particular system, product or
                                       process, and the aptitude of staff or departments inside an organization to address security
                                       concerns for which they are accountable.

                                      Metrics can also help recognize the level of risk in not taking a given action, and in that
                                       way supply guidance in prioritizing counteractive actions.

                                      Security matrix is used to concentrate measures where they are required, and to be aware
                                       of what measures are being (purposely) abandoned.
                                      Privacy can be explained as exercising power over what  access others  have to private
                                       extent of us, like information privacy.
                                      Privacy  as a  business  concern  or  issue  is  tremendously  sensitive to  changes in  the
                                       surrounding context. Changes in people’s expectations or in authoritarian governance can
                                       noticeably alter business issues and potentials.




          184                               LOVELY PROFESSIONAL UNIVERSITY
   185   186   187   188   189   190   191   192   193   194   195