Data Privacy

12345678910111213141516171819
Across
  1. 4. Entity which determines the purpose(s) for which and the manner in which any personal data are to be processed
  2. 9. An Ultimatix application related to internal networking where consent is taken
  3. 10. Data protection act of Canada is (acronym)
  4. 12. In case of a personal data breach, you may have to inform the affected individual through a _____________
  5. 13. __________ is a procedure by which all personal identifying fields within a data set are replaced by one or more artificial identifiers, in a way which can be remapped with removed personal identifiers
  6. 17. __________ is one of the security technologies which is used for protecting personal information sent through digital medium/channel
  7. 18. Medical records, sexual orientation, biometrics are examples of ______ personal information
  8. 19. A data subject has a right to demand for erasure of past events from his/her life that are serving no purpose, or are impacting current/future life prospects. This right is known as Right to be ___________
Down
  1. 1. In a data privacy impact assessment of an application, it was found that Date of birth and mother’s name had no purpose and was removed. This is done in order to comply with privacy principle
  2. 2. Data ________ is any entity that processes personal data on behalf of and as instructed by the data controller
  3. 3. It is fundamental that everyone enjoys this human right and the Data Protection Act can help ensuring the same
  4. 5. Processing personal data is generally prohibited, unless it is expressly allowed by law, or the data subject has given his/her _________
  5. 6. Data ________ are the owners of personal data.
  6. 7. ________is one of the privacy principles which requires entity to process personal data as long as it is required for intended and notified purpose
  7. 8. Where two or more controllers together determine the purposes and means of personal data processing, they shall be ____ controllers
  8. 10. ____________is a concept intended to anticipate, build and manage privacy during the entire life cycle of a process/system/project/product/software, right from its concept to execution to retirement
  9. 11. It is preferable that personal information must be collected _______from the individual
  10. 14. Unauthorized collection, use or disclosure or disposal of personal information is called personal data _________
  11. 15. All privacy incidents should be logged in TCS Internal tool known as ____
  12. 16. The primary person in EU and/or UK to be contacted for reporting a personal data breach is