Join the discussion
Question 1/24
The method of personal data usage in which the users must explicitly decide not to participate.
Correct Answer: D
Add Comments
- Other Question (24q)
- Q1. The method of personal data usage in which the users must explicitly decide not to partici...
- Q2. Which of the following wasn't prescribed as a privacy principle under the OECD Privacy Gui...
- Q3. Which of the following best describes 'Processing'?...
- Q4. Following aspects can serve as inputs to a privacy organization for ensuring privacy prote...
- Q5. FILL BLANK MIM The company has a well-defined and tested Information security monitoring a...
- Q6. Categorize the following statements as: Visibility/ Capability /Enforcement /Demonstration...
- Q7. As a newly appointed Data Protection officer of an IT company gearing up for DSCI's privac...
- Q8. FILL BLANK IUA and PAT The company has a very mature enterprise level access control polic...
- Q9. FILL BLANK IUA and PAT The company has a very mature enterprise level access control polic...
- Q10. Which among the following would not be characteristic of a good privacy notice?...
- Q11. What is the maximum compensation that can be imposed on an organization for negligence in ...
- Q12. Which of the following statements is true with respect to organization's privacy training ...
- Q13. Its mandatory for the assessee to provide the pre-requisites to the assessor organization ...
- Q14. With respect to privacy monitoring and incident management process, which of the following...
- Q15. Which of the following could be considered as triggers for updating privacy policy? (Choos...
- Q16. "Data which cannot be attributed to a particular data subject without use of additional in...
- Q17. __________ layer of the DSCI Privacy Framework (DPF) ensures that adequate level of awaren...
- Q18. Privacy enhancing tools aim to allow users to take one or more of the following actions re...
- Q19. FILL BLANK RCI and PCM Given its global operations, the company is exposed to multiple reg...
- Q20. Which of the following are key contributors that would enhance the complexity in implement...
- Q21. What is a Data Controller?
- Q22. Arrange the following techniques in decreasing order of the risk of re-identification: I) ...
- Q23. In the landmark case _______________ the Honourable Supreme Court of India reaffirmed the ...
- Q24. FILL BLANK RCI and PCM In April 2011, the rules were issued under Section 43A of the IT Ac...
