Exam 15: Information Security Privacy in E-HRM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is information security and privacy critically important to businesses?

Free
(Essay)
4.9/5
(40)
Correct Answer:
Verified

o With fundamental changes in business models, technology trends, increasingly sophisticated cyber-attacks, followed by complex statutory regulations, information security and privacy have become critically important. What is more, as Morgan (2014, p. 2) states, 'the new rule for the future is going to be, "anything that can be connected, will be connected". This raises the frightening possibility of the information economy becoming extremely vulnerable to criminal mischief with individuals, firms, nations and the global economy having to pay a heavy price in the quest for a connected world.
\bullet Changing business models
\bullet Rapid technology changes
\bullet Rising sophisticated cyber-attacks
\bullet Increasingly complex regulations

List and discuss three of the common privacy principles included in the chapter.

Free
(Essay)
4.8/5
(32)
Correct Answer:
Verified

o Privacy principles are safeguards to be followed while collecting, using, storing, transferring or deleting the personal data. These privacy principles should be used to guide the design, development and implementation of privacy controls.
\bullet - Consent and choice: PII principals should be given an opportunity to choose how their PII is handled and to allow them to withdraw consent easily and free of charge. There are two types of consent and choice: "Opt-in" and "opt-out". Opt-in consent occurs when PII principal affirmatively and explicitly indicates his/her desire to have their data processed by the organization. Opt-out consent occurs when PII principal implicitly consents by not indicating their disapproval of requested processing. Opt-in consent is generally required for more intrusive processing like handling sensitive personal information, While opt-out consent is appropriate for less intrusive forms of processing like signing up for marketing emails.
\bullet - Purpose legitimacy and specification: Organization should have a legitimate reason to collect personal data and use it only for that purpose. The purpose for which personal data is collected should be specified at or before the time of data collection and subsequent use should be limited to the fulfilment of that purpose or compatible purpose.
\bullet - Collection limitation: There should be limits to the collection of PII data and any collected data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the PII principal.

______________ is the "management framework to initiate, implement and control information security within the organization".

Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
Verified

A

The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).

(Multiple Choice)
4.9/5
(38)

______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.

(Multiple Choice)
4.8/5
(37)

What is Information Security Management System?

(Essay)
4.8/5
(42)

Explain the critical role of HR in protecting information security and privacy?

(Essay)
4.8/5
(38)

A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:

(Multiple Choice)
4.8/5
(38)

In order to protect the Personal Identity Information (PII), organizations implement ______________.

(Multiple Choice)
4.9/5
(44)

ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.

(Multiple Choice)
4.8/5
(44)

__________ are the external agents which could act to malicious effects.

(Multiple Choice)
4.7/5
(35)

Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:

(Multiple Choice)
4.9/5
(39)

_________ are the internal weakness in the system, such as unpatched system.

(Multiple Choice)
4.7/5
(49)

__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.

(Multiple Choice)
4.9/5
(41)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)