List three high-level competencies for the privacy professional identified by the EBK.

What will be an ideal response?


1. Design and evaluate data security for privacy considerations
2. Manage, design, implement, and evaluate incident management programs for privacy considerations
3. Design and evaluate IT security training and awareness to ensure privacy considerations
4. Design and implement personnel security protections to ensure privacy
5. Manage, design, implement, and evaluate regulatory and standards compliance programs to ensure privacy
6. Manage, design, implement, and evaluate privacy risk management programs

Computer Science & Information Technology

You might also like to view...

The library function move() can be used to

A) transfer ownership of a managed object from one unique_ptr object to another. B) move the contents of a dynamically allocated block of memory to another address. C) move the contents of any block of memory to another address. D) make a raw pointer point to a different memory location.

Computer Science & Information Technology

With HTML, browsers usually accept documents that violate HTML ____________________ as long as the violation is not too severe.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which site has easy-to-read overviews of a lot of technical information?

A) Washington Post Learning Network B) Beginner's Guide to Life and the Internet C) Wikipedia D) Webopedia

Computer Science & Information Technology

____ is the process of examining the elements of an array in order, looking for a match for a specific value.

A. Bubble sort B. Sequential search C. Heap sort D. Shell sort

Computer Science & Information Technology