Course Hero Logo

Which of these is not part of the security program

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 3 pages.

6.Which of these is not part of the security program required by DATA toprevent compromise of critical information?LO 9-6a.Develop, document, and maintain a security policy for the collection,use, sale, dissemination, and maintenance of personally identifyinginformation.b.Define a protocol to efficiently notify affected parties and regulatorsin the event of a data breach.c.Establish contracts with third parties with access to the information toestablish controls that meet the requirements of the act.d.Establish a process to identify risks and vulnerabilities of potentialbreaches and implement administrative and technical controls tomitigate the risk of compromise of the personally identifyinginformation.
7.Which term is used to describe the science of examining raw data,removing excess noise from the dataset, and organizing the data with thepurpose of drawing conclusions for decision making?LO 9-1,LO 9-2,9-3,LO 9-4LO

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
Babara

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture