Our Policies

1234567891011121314151617181920
Across
  1. 4. What type of software must devices accessing organizational resources have up-to-date?
  2. 7. What structured process is used for developing and maintaining software?
  3. 8. What must remote work and BYOD users use as an additional security measure?
  4. 10. What must automated monitoring systems trigger within fifteen minutes of performance threshold violations?
  5. 12. What must system owners conduct prior to deployment and on a quarterly basis to prevent fairness issues?
  6. 13. What type of board reviews all new AI systems and significant changes?
  7. 15. What must all AI systems clearly disclose to users regarding their nature?
  8. 17. What approach should be used as the primary strategy to validate and sanitize all inputs?
  9. 18. What acronym describes users who must comply with additional security measures when using their own devices?
  10. 19. Who should you contact before hitting the send button if you are in doubt?
  11. 20. What type of data category includes racial or ethnic origin, genetic data, and biometric data?
Down
  1. 1. What e-mail address prefix should you use to report a breach immediately?
  2. 2. What should you respect and not use if it is not yours?
  3. 3. Who provides overall oversight for ensuring that secure development practices align with organizational objectives?
  4. 5. What must users not send, in relation to unsolicited emails?
  5. 6. What type of media involves blogs, wikis, and forms where you are personally responsible for published content?
  6. 9. What is a huge factor when reviewing content before publishing to avoid discomfort?
  7. 11. How many hours do we have to report a personal data breach to supervisory authorities?
  8. 14. What process is used during the design phase to identify, prioritize, and mitigate potential security threats?
  9. 16. What type of address, along with IP, is listed as a personal data identifier?