Identifying and Safeguarding

Information Technology22 CardsCreated 5 months ago

This flashcard set covers key concepts related to Privacy Impact Assessments (PIAs), Personally Identifiable Information (PII), federal guidance, and disclosure rules. It's designed to reinforce understanding of when PIAs are required, risks associated with PII, and what qualifies as protected information.

Which of the following must Privacy Impact Assessments (PIAs) do?
- Analyze how an organization handles information to ensure it satisfies requirements
-mitigate privacy risks
-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems.
-all of the above

All of the Above

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/22

Key Terms

Term
Definition

Which of the following must Privacy Impact Assessments (PIAs) do?
- Analyze how an organization handles information to ensure it satisfies requirements
-mitigate privacy risks
-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems.
-all of the above

All of the Above

True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other damage.

True

What / Which guidance identifies federal information security controls?
-The Freedom of Information Act (FOIA)
-The Privacy Act of 1974
-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII
-DOD 5400.11-R: DOD Privacy Program

OMB Memorandum M-17-12

Which of the following is NOT an example of PII?
-Driver's License Number
-Pet's nickname
-Social Security Number
-Fingerprints

Pet's nickname

Which of the following is NOT a permitted disclosure of PII contained in a system of records?
-These are all permitted disclosures
-The record is disclosed for a new purpose that is not specified in the SORN
-The record is disclosed for routine use.
-The individual has requested that their record be disclosed.

The record is disclosed for a new purpose that is not specified in the SORN

PIA is required when organization collects PII from:

- Existing information systems and electronic collections for which no PIA was prev completed.
-New information systems or electronic collection...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following must Privacy Impact Assessments (PIAs) do?
- Analyze how an organization handles information to ensure it satisfies requirements
-mitigate privacy risks
-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems.
-all of the above

All of the Above

True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other damage.

True

What / Which guidance identifies federal information security controls?
-The Freedom of Information Act (FOIA)
-The Privacy Act of 1974
-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII
-DOD 5400.11-R: DOD Privacy Program

OMB Memorandum M-17-12

Which of the following is NOT an example of PII?
-Driver's License Number
-Pet's nickname
-Social Security Number
-Fingerprints

Pet's nickname

Which of the following is NOT a permitted disclosure of PII contained in a system of records?
-These are all permitted disclosures
-The record is disclosed for a new purpose that is not specified in the SORN
-The record is disclosed for routine use.
-The individual has requested that their record be disclosed.

The record is disclosed for a new purpose that is not specified in the SORN

PIA is required when organization collects PII from:

- Existing information systems and electronic collections for which no PIA was prev completed.
-New information systems or electronic collections.
(before development or purchase and/or converting paper records to electronic systesm)

PIA is not required when the information system or electronic collection:

- does not collect, maintain, or disseminate PII
-is a national security system, including one that process classified info
- is solely paper-based

Within what timeframe must DOD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered?
-1 hour
-12 hours
-48 hours
-24 hours

1 hour for US-CERT

(FYI: 24 hours to Component Privacy Office and 48 hours to Defense Privacy, Civil liberties, and transparency division)

Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as record identification. Is this compliant with PII safeguarding procedures?
- Yes or No

NO

You are tasked with disposing of physical copies of last year's grant application forms. These documents contain PII so you use a cross-cut shredder to render them unrecognizable and beyond reconstruction. Is this compliant with PII safeguarding procedures?
-YES or NO

YES

Organizations that fail to maintain accurate, relevant, timely, and complete information may be subject to which of the following?
-Neither civil nor criminal penalties
-civil penalties
-criminal penalties
-both civil and criminal penalties

Civil Penalties

True or False? Paper-based PP is involved in data breaches more often than electronic PP documentation?

False- Phishing is responsible for most of the recent PII Breaches

Which regulation governs the DoD Privacy Program?
-The Freedom of Information Act (FOIA)
-The Privacy Act of 1974
-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII
-DOD 5400.11-R: DOD Privacy Program

-DOD 5400.11-R: DOD Privacy Program

Which of the following is NOT included in a breach notification?
A. Articles and other media reporting the breach.
B. What happened, date of breach, and discovery.
C. Point of contact for affected individuals.
D. Whether the information was encrypted or otherwise protected.

A. Articles and other media reporting the breach.

TRUE OR FALSE. A PIA is required if your system for storing PII is entirely on paper.

FALSE

TRUE OR FALSE. Misuse of PII can result in legal liability of the individual

TRUE

TRUE OR FALSE. Misuse of PII can result in legal liability of the organization.

TRUE

Where is a System of Records Notice (SORN) filed?
A. National Archives and Records Administration
B. Congress
C. Federal Register
D. SORNs are for internal reference only, and don't need to be filed with a third party.

Federal Register

Organizations must report to Congress the status of their PII holdings every:
A. Six Months
B. Year
C. Five years
D. Organizations are not required to report to Congress

Year

Jane Student is delivering a document that contains PII, but she cannot find the correct cover sheet. She should:
A. Mark the document CUI and deliver it without the cover sheet.
B. Mark the document as sensitive and deliver it without the cover sheet.
C. Mark the document CUI and wait to deliver it until she has the cover sheet.
D. None of the above; provided she is delivering it by hand, it does not require a cover sheet or markings.

Mark the document CUI and wait to deliver it until she has the cover sheet

The acronym PHI, in this context, refers to:
A. Protected Health Information
B. Public Health Institute
C. Public Health Informatics
D. Public Health Intelligence

Protected Health Information