Podcast
Questions and Answers
Which of the following is a reason to avoid using personal business keys?
Which of the following is a reason to avoid using personal business keys?
- It can result in model complexity (correct)
- Operational systems are not able to delete or reduce personal data
- It is the only identifier available
- It is a common mistake made by Chief Data Privacy Officers
What is a common mistake made by Chief Data Privacy Officers regarding personal business keys?
What is a common mistake made by Chief Data Privacy Officers regarding personal business keys?
- Not considering the complexity of the model
- Defining all business keys to be personal (correct)
- Using the wrong patch to delete personal data
- Storing personal data in the wrong location
Why should personal business keys be avoided?
Why should personal business keys be avoided?
- Operational systems cannot delete or reduce personal data
- They are the only identifier available
- They can result in model complexity (correct)
- They are a common mistake made by Chief Data Privacy Officers
True or false: Social security numbers are personal business keys?
True or false: Social security numbers are personal business keys?
True or false: It is recommended to define all business keys as personal?
True or false: It is recommended to define all business keys as personal?
True or false: If operational systems cannot delete personal data, it is not a problem to use personal business keys?
True or false: If operational systems cannot delete personal data, it is not a problem to use personal business keys?
Match the following statements with their correct interpretation:
Match the following statements with their correct interpretation:
Match the following statements with their correct context:
Match the following statements with their correct context:
Match the following terms with their definitions:
Match the following terms with their definitions:
Match the following personal business key examples with their potential usage:
Match the following personal business key examples with their potential usage:
Match the following terms with their definitions:
Match the following terms with their definitions:
Match the following statements with their correct interpretation:
Match the following statements with their correct interpretation:
Match the following terms with their correct context:
Match the following terms with their correct context:
Match the following statements with their correct context:
Match the following statements with their correct context:
Match the following terms with their definitions:
Match the following terms with their definitions:
Match the following personal business key examples with their potential usage:
Match the following personal business key examples with their potential usage:
Which of the following is an example of a personal business key?
Which of the following is an example of a personal business key?
What is the purpose of personal business keys?
What is the purpose of personal business keys?
Why should personal business keys be treated carefully?
Why should personal business keys be treated carefully?
Which of the following is a potential risk of using personal business keys?
Which of the following is a potential risk of using personal business keys?
What additional information is often used in conjunction with personal business keys?
What additional information is often used in conjunction with personal business keys?
Which of the following is NOT a potential usage of personal business keys?
Which of the following is NOT a potential usage of personal business keys?
What is the potential consequence of a compromised personal business key?
What is the potential consequence of a compromised personal business key?
Personal business keys are used to identify a specific person in a business context.
Personal business keys are used to identify a specific person in a business context.
Personal business keys are typically used to access and manage personal data.
Personal business keys are typically used to access and manage personal data.
Personal business keys can include employee ID numbers.
Personal business keys can include employee ID numbers.
Personal business keys should be treated carefully because they can be used to access sensitive personal data.
Personal business keys should be treated carefully because they can be used to access sensitive personal data.
Social security numbers are considered personal business keys.
Social security numbers are considered personal business keys.
If a personal business key is compromised, it could lead to identity theft or fraud.
If a personal business key is compromised, it could lead to identity theft or fraud.
Personal business keys should be avoided in operational systems that cannot delete personal data.
Personal business keys should be avoided in operational systems that cannot delete personal data.