Our Policies
Across
- 4. What type of software must devices accessing organizational resources have up-to-date?
- 7. What structured process is used for developing and maintaining software?
- 8. What must remote work and BYOD users use as an additional security measure?
- 10. What must automated monitoring systems trigger within fifteen minutes of performance threshold violations?
- 12. What must system owners conduct prior to deployment and on a quarterly basis to prevent fairness issues?
- 13. What type of board reviews all new AI systems and significant changes?
- 15. What must all AI systems clearly disclose to users regarding their nature?
- 17. What approach should be used as the primary strategy to validate and sanitize all inputs?
- 18. What acronym describes users who must comply with additional security measures when using their own devices?
- 19. Who should you contact before hitting the send button if you are in doubt?
- 20. What type of data category includes racial or ethnic origin, genetic data, and biometric data?
Down
- 1. What e-mail address prefix should you use to report a breach immediately?
- 2. What should you respect and not use if it is not yours?
- 3. Who provides overall oversight for ensuring that secure development practices align with organizational objectives?
- 5. What must users not send, in relation to unsolicited emails?
- 6. What type of media involves blogs, wikis, and forms where you are personally responsible for published content?
- 9. What is a huge factor when reviewing content before publishing to avoid discomfort?
- 11. How many hours do we have to report a personal data breach to supervisory authorities?
- 14. What process is used during the design phase to identify, prioritize, and mitigate potential security threats?
- 16. What type of address, along with IP, is listed as a personal data identifier?