When dealing with third parties, which of the following is NOT a way to ensure a level of security that the data involved warrants?
A. Include contract clauses that detail the exact security measures that are expected of the third party.
B. Allow for specific implementation of a security measure to be determined by the third party.
C. Periodically audit and test the security provided to ensure compliance.
D. Consider executing a Interconnection security agreements (ISA) which in some areas, such as healthcare, may be required.
B
Explanation: The security measures to be implemented should be agreed upon, including the specific implementation of each measure. There should be no room left for interpretation on the part of the third party.
You might also like to view...
Holds all the material that will be on your website.
a. Central folder b. Top-level folder c. Sub-folder d. Default folder
Which of the following does not need to be done when marking a presentation as final?
A) It is important to consider who will be viewing the presentation and what version of PowerPoint they will be using. B) If you will be publishing your presentation to the web you will also want to check for any accessibility issues for people with visual impairments. C) If people may be viewing your presentation with an earlier version of PowerPoint, you will want to check for any compatibility issues. D) The Accessibility Checker will inform you of ways to ensure people without PowerPoint installed on their computer can still view your presentation.
A macro consists of a series of actions grouped as a single command
Indicate whether the statement is true or false
Recursion can describe a very sophisticated process with a simple and efficient set of instructions.
Answer the following statement true (T) or false (F)