SlideShare a Scribd company logo
1 of 8
Download to read offline
This self-assessment test allows data collection
agencies to get their Personally Identifiable
Information and Specific Device Identifiable
Information Consumer Fairness Best Practices
Score. Which can then be shared with the public.
©2015 Joel Drotts on behalf of
The Association for Consumer Effectiveness
http://www.oneacedata.com
TRUE FALSE
2. . Is the information is absolutely mandatory to
the functioning of services of operations of the
business or services (Ex: A bank must know the
customers bank account number.)?
Is the data collected for the following purposes (3-6):
3. Keep profile in database so customer order or
payment information is more accessible and need
not be re-entered?
4. To aid and assist in the company own internal
operations and functioning: To study and track
your own customer buying trends, to seek
improved sales and more desirable products.)?
5. To aid in larger research projects of your
industry and profession (Doctors comparing cases
and statistics for scientific purposes).
6. To sell that information as a retail item (The
Geo-location of a consumers phone in relation to
nearby stores and restaurants, in order to bring or
offer the consumer more relevant adds.)?
7. What legal authority and/or agreements allow
the information to be collected?
8. You have not lawfully and ethically obtaining a
knowing and willing consent to possess and use the
consumer information for the purposes for which
you are using that data in writing or other evidence
medium?
9. Did you receive consumer permission for a
blanket or first use and possession, and now are
utilizing data for second use purposes other than
the stated reason given the consumer in order to
collect the information?
10. Does the consumer doesn't know how you're
utilizing their PII?
11. Did you collected or collect data through or by
the monitoring of consumers and harvest their PII
without their consent or knowledge?
12. Did you buy the PII from a vendor or data
broker?
13. Did you harvest or gather the PII directly from
the personal or corporate communications of the
targets (Meta data searches of e-mails or corporate
monitored e-mails of employees.)
14. How great do you believe the expectation of
privacy to be of the individual or individuals that
you monitor in order to capture the PII?
15. What sort of safeguarding have you deployed to
ensure you have given adequate warning about
your monitoring, and received the necessary
permission to monitor your subjects?
16. Are your subjects required to accept or agree to
being monitored in order to utilize your system,
website, software, goods, or services?
17. You harvest the data collected from third party
blogs, social media websites, and other posted
media accounts or websites.
18. You own the copyright or a license to utilize the
media or data which you have collected in order for
you to republish, re-broadcast, reprint, or re
communicate the original copyrighted material
produced and created by your targets, subjects, or
customers?
19. Is the information searchable by a personal
identifier?
20. You have a system that identifies and tracks
consumer information?
21. You have not made anonymous second use
data, by removing any and all information that can
be said to be PII or relate back to an individual,
their place of residence or employment?
22. Data storage and sales is your primary business
purposes or generates at least 50% of your net
revenues?
23. Explain how long you retain the information?
24. What reason the information is retained?
25. Are there any forms or surveys that are
associated with the collection of the information
that would be covered by the Paperwork Reduction
Act (PRA)?
26. Do you hire outside experts to audit your
systems and organization for PII compliance?
27. Do you have internal auditing to ensure best
practices on Personally Identifiable Information or
Specific device identifiable information?
28. Will individuals be given notice prior to the
collection of personal information about them?
29. Are there any privacy risks for this system that
relate to openness and transparency? If so, how
will you mitigate these risks?
30. Do you state the reasons why you collect any
and all PII which you are collecting?
31. Are those reasons for collection and the sorts of
data you do collect made obvious and apparent by
being in the first section or paragraph of any
disclosures, and stated in plain regular language
that is easy to understand. (Ex: We collect you
name and address. We use it to market to you, by
sending you our catalogs. We sell your information
to third parties, whom may use it for purposes
unknown to us. )
32. Whose information is included in the system?
33. What PII will the system include?
34. Why is the collection and use of the PII
necessary to the project or system?
35. Will the system aggregate previously
unavailable data about the individual or create new
data about the individual? If so, how will this data
be maintained and used?
36. What controls exist to protect the consolidated
data and prevent unauthorized access?
37. Will the system monitor the public?
38. Who will monitor the system?
39. Do you have a set policy of access and control
procedures for sensitive data, or “need to know
only” ratings and designations for your personnel?
40. Will the system monitor employees or
contractors?
41. What kinds of reports can be produced on
individuals from the data you harvest?
42. Will the data included in the reports produced
be made anonymous?
43. Are there any privacy risks for this system that
relate to data minimization? If so, how will you
mitigate these risks?
44. Is the information in the project limited to only
the information that is needed to carry out the
purpose of the collection?
45. Will you share any of the information with
other individuals, Federal and/or state agencies, or
private sector organizations? If so, how will you
share the information?
46. Is the information collected directly from the
individual or is it taken from another source?
47. Will the project interact with other systems,
whether within your organization or outside of
your organization? If so, how?
48. Are there any privacy risks for this project that
relate to use limitation? If so, how will the mitigate
these risks?
49. Do you have permission to share the PII or
specific device identifiable information?
50. Do you give assurances of any type stating that
you shall not share the PII?
51. Did you give any assurances about the way you
shall use the PII?
52. Do you honor those assurances if you give
them? If so how do you ensure those assurances are
carried out?
53. The PII you collect was collected by stating its
use? Do you use the PII in any other ways not
known by the individuals it identifies?
54. What steps do you take to ensure that all PII is
accurate, relevant, timely, and complete?
55. How will the information collected be verified
for accuracy and completeness?
56. Are there any privacy risks for individuals
whose information is collected or used by the
project that relate to data quality and integrity? If
so, how will you mitigate these risks?
57. What are the possible consequences or possible
harms could come to an individual whose PII you
collect in an inaccurate, incomplete, or untimely
manner?
58. Do you have a plan in place to mitigate and
minimize those consequences or harms in a timely
and responsible manner?
59. Does that plan include public relations media
damage control?
60. Who else or what other organizations could be
harmed in the data you collect and provide is
incomplete, inaccurate, or untimely?
61. Which individuals or companies depend of the
PII you collect and provide? How do they use that
PII in their operations?
62. On a scale of 1 to 10, 10 being life or death and
1 being a possible customer may fail to hear about
your upcoming Saturday sale, how important is
accuracy, completeness, timeliness, and relevancy
of the PII you collect.
63. Have you completed a system security plan for
the information system(s) supporting the project?
Who has the Authority to Operate (“ATO”) the
system?
64. How is that authority decided?
65. Do you have different levels of access?
66. Which employees shall be authorized
personnel, including employees and contractors
acting on behalf of the organization?
67. Which personnel official duties require access?
68. Do you have a Standard operating procedure
for terminating or reducing access for individuals
who no longer have a need to know all or certain
information?
69. Do you have an operating policy.
70. What security controls and safeguards exist to
protect information contained in the system against
unauthorized disclosure and access?
71. Do you have policies and procedures for:
Conducting background checks on all personnel
with access to the system?
Initial and follow-on privacy and security
awareness training for each individual with access
to the system?
Physical perimeter security safeguards?
Security Operations Center to monitor antivirus
and intrusion detection software?
Risk and controls assessments and mitigation?
Technical access controls, such as role-based access
management and firewalls?
Disaster mitigation strategies, breach notification
processes and plans, and secure channels for
submitting transaction information are in place for
the system?
72. Are there mechanisms in place to identify
security breaches? If so, what are they?
73. Are there any privacy risks for this system that
relate to security? If so, how will you mitigate these
risks?
74. Do you give individuals, in most cases, the
ability to access their PII, and allow them to
correct or amend their PII if it is inaccurate?
75. What opportunities are available for
individuals to consent to uses, decline to provide
information, or opt out of the project?
76. If no opportunities are available to consent,
decline or opt out, please explain why?
77. What procedures will allow individuals to
access their information?
78. Can individuals amend information about
themselves in the system?
79. Are there any privacy risks for this system that
relate to individual participation?
80. Who will train all personnel about the proper
treatment of PII?
81. Describe what privacy training is provided to
users, either generally or specifically relevant to the
project?
82. Are there any privacy risks for this system that
relate to awareness and training? If so, how will
you mitigate these risks?
83. Have you hired coaches or lecturers to train
employees?
84. Mandatory reading for employees?
85. Consultants to teach employees?
86. Testing for employees?
87. Do you have company wide certification?
88. Who developed that certification? How up to
date is it?
89. How does the system ensure that the
information is used in accordance with the stated
practices in this assessment?
90. Do you have internal auditing?
91. How often do you review your policies for
weaknesses or outdated systems?
92. Do you run vulnerability attacks on your
system? If so how often?
93. Do you hire outside experts to audit your
systems and organization for PII compliance?

More Related Content

What's hot

HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
Rebecca Norman
 
HIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenarioHIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenario
Brian Wong
 

What's hot (20)

Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
4. data security eb__1_
4. data security eb__1_4. data security eb__1_
4. data security eb__1_
 
Audit trails
Audit trailsAudit trails
Audit trails
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA Compliance
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
HIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenarioHIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenario
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentation
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
HIPAA Basic Healthcare Guide
HIPAA Basic Healthcare GuideHIPAA Basic Healthcare Guide
HIPAA Basic Healthcare Guide
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
Data privacy and digital strategy
Data privacy and digital strategyData privacy and digital strategy
Data privacy and digital strategy
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 

Viewers also liked

Viewers also liked (6)

BUSINESS LEARNING SYSTEM LECTURE
BUSINESS LEARNING SYSTEM LECTUREBUSINESS LEARNING SYSTEM LECTURE
BUSINESS LEARNING SYSTEM LECTURE
 
Honest Values Media and Communications Education: The Five Filters of the Media
Honest Values Media and Communications Education: The Five Filters of the MediaHonest Values Media and Communications Education: The Five Filters of the Media
Honest Values Media and Communications Education: The Five Filters of the Media
 
Project earned respect
Project earned respectProject earned respect
Project earned respect
 
CREDIT REPAIR COURSE
CREDIT REPAIR COURSECREDIT REPAIR COURSE
CREDIT REPAIR COURSE
 
Grade 9 Araling Panlipunan Module
Grade 9 Araling Panlipunan ModuleGrade 9 Araling Panlipunan Module
Grade 9 Araling Panlipunan Module
 
Ekonomiks Learning Module Yunit 4
Ekonomiks Learning Module Yunit 4Ekonomiks Learning Module Yunit 4
Ekonomiks Learning Module Yunit 4
 

Similar to Standardized ethical data collection assesment test

Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
RightScale
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
learfield
 
Remote Access Security Policy Organization XYZ Health Care Prov.docx
Remote Access Security Policy Organization XYZ Health Care Prov.docxRemote Access Security Policy Organization XYZ Health Care Prov.docx
Remote Access Security Policy Organization XYZ Health Care Prov.docx
sodhi3
 
Social media compliance for healthcare professionals
Social media compliance for healthcare professionalsSocial media compliance for healthcare professionals
Social media compliance for healthcare professionals
complianceonline123
 

Similar to Standardized ethical data collection assesment test (20)

Third-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdfThird-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdf
 
Third-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfThird-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdf
 
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
 
GDPR Assessment Checklist.pptx
GDPR Assessment Checklist.pptxGDPR Assessment Checklist.pptx
GDPR Assessment Checklist.pptx
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Privacy and Security What types of health care data are protected u.pdf
Privacy and Security What types of health care data are protected u.pdfPrivacy and Security What types of health care data are protected u.pdf
Privacy and Security What types of health care data are protected u.pdf
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Rightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloudRightscale webinar-hipaa-public-cloud
Rightscale webinar-hipaa-public-cloud
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
Remote Access Security Policy Organization XYZ Health Care Prov.docx
Remote Access Security Policy Organization XYZ Health Care Prov.docxRemote Access Security Policy Organization XYZ Health Care Prov.docx
Remote Access Security Policy Organization XYZ Health Care Prov.docx
 
Social media compliance for healthcare professionals
Social media compliance for healthcare professionalsSocial media compliance for healthcare professionals
Social media compliance for healthcare professionals
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 

More from Joel Drotts

LICENSE AGREEMENT 2016
LICENSE AGREEMENT 2016LICENSE AGREEMENT 2016
LICENSE AGREEMENT 2016
Joel Drotts
 
Strategic American Four Data vs Privacy
Strategic American Four Data vs PrivacyStrategic American Four Data vs Privacy
Strategic American Four Data vs Privacy
Joel Drotts
 

More from Joel Drotts (8)

Censorship on line is a clear violation of the First Amendment!
Censorship on line is a clear violation of the First Amendment!Censorship on line is a clear violation of the First Amendment!
Censorship on line is a clear violation of the First Amendment!
 
CONTINUED EDUCATION FOR DEPLOYED LAW ENFORCEMENT FIELDING BODY WORN CAMERAS
CONTINUED EDUCATION FOR DEPLOYED LAW ENFORCEMENT FIELDING BODY WORN CAMERASCONTINUED EDUCATION FOR DEPLOYED LAW ENFORCEMENT FIELDING BODY WORN CAMERAS
CONTINUED EDUCATION FOR DEPLOYED LAW ENFORCEMENT FIELDING BODY WORN CAMERAS
 
LICENSE AGREEMENT 2016
LICENSE AGREEMENT 2016LICENSE AGREEMENT 2016
LICENSE AGREEMENT 2016
 
Grant Proposal of the Association for Consumer Effectiveness
Grant Proposal of the Association for Consumer EffectivenessGrant Proposal of the Association for Consumer Effectiveness
Grant Proposal of the Association for Consumer Effectiveness
 
The Strategic American Issue One: Business in America
The Strategic American Issue One: Business in AmericaThe Strategic American Issue One: Business in America
The Strategic American Issue One: Business in America
 
The Strategic American Issue Two: How an Unconstitutional Government Violatio...
The Strategic American Issue Two: How an Unconstitutional Government Violatio...The Strategic American Issue Two: How an Unconstitutional Government Violatio...
The Strategic American Issue Two: How an Unconstitutional Government Violatio...
 
The Strategic American Issue Five: Professor Boss and the Learning Matrix System
The Strategic American Issue Five: Professor Boss and the Learning Matrix SystemThe Strategic American Issue Five: Professor Boss and the Learning Matrix System
The Strategic American Issue Five: Professor Boss and the Learning Matrix System
 
Strategic American Four Data vs Privacy
Strategic American Four Data vs PrivacyStrategic American Four Data vs Privacy
Strategic American Four Data vs Privacy
 

Recently uploaded

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
HyderabadDolls
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
HyderabadDolls
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
HyderabadDolls
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
HyderabadDolls
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Call Girls in G.T.B. Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in G.T.B. Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in G.T.B. Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in G.T.B. Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 

Recently uploaded (20)

In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
Belur $ Female Escorts Service in Kolkata (Adult Only) 8005736733 Escort Serv...
 
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
Lake Town / Independent Kolkata Call Girls Phone No 8005736733 Elite Escort S...
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
 
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Call Girls in G.T.B. Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in G.T.B. Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in G.T.B. Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in G.T.B. Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 
Call Girls In GOA North Goa +91-8588052666 Direct Cash Escorts Service
Call Girls In GOA North Goa +91-8588052666 Direct Cash Escorts ServiceCall Girls In GOA North Goa +91-8588052666 Direct Cash Escorts Service
Call Girls In GOA North Goa +91-8588052666 Direct Cash Escorts Service
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
💞 Safe And Secure Call Girls Agra Call Girls Service Just Call 🍑👄6378878445 🍑...
 

Standardized ethical data collection assesment test

  • 1. This self-assessment test allows data collection agencies to get their Personally Identifiable Information and Specific Device Identifiable Information Consumer Fairness Best Practices Score. Which can then be shared with the public. ©2015 Joel Drotts on behalf of The Association for Consumer Effectiveness http://www.oneacedata.com TRUE FALSE 2. . Is the information is absolutely mandatory to the functioning of services of operations of the business or services (Ex: A bank must know the customers bank account number.)? Is the data collected for the following purposes (3-6): 3. Keep profile in database so customer order or payment information is more accessible and need not be re-entered? 4. To aid and assist in the company own internal operations and functioning: To study and track your own customer buying trends, to seek improved sales and more desirable products.)? 5. To aid in larger research projects of your industry and profession (Doctors comparing cases and statistics for scientific purposes). 6. To sell that information as a retail item (The Geo-location of a consumers phone in relation to nearby stores and restaurants, in order to bring or offer the consumer more relevant adds.)? 7. What legal authority and/or agreements allow the information to be collected? 8. You have not lawfully and ethically obtaining a knowing and willing consent to possess and use the consumer information for the purposes for which you are using that data in writing or other evidence medium?
  • 2. 9. Did you receive consumer permission for a blanket or first use and possession, and now are utilizing data for second use purposes other than the stated reason given the consumer in order to collect the information? 10. Does the consumer doesn't know how you're utilizing their PII? 11. Did you collected or collect data through or by the monitoring of consumers and harvest their PII without their consent or knowledge? 12. Did you buy the PII from a vendor or data broker? 13. Did you harvest or gather the PII directly from the personal or corporate communications of the targets (Meta data searches of e-mails or corporate monitored e-mails of employees.) 14. How great do you believe the expectation of privacy to be of the individual or individuals that you monitor in order to capture the PII? 15. What sort of safeguarding have you deployed to ensure you have given adequate warning about your monitoring, and received the necessary permission to monitor your subjects? 16. Are your subjects required to accept or agree to being monitored in order to utilize your system, website, software, goods, or services? 17. You harvest the data collected from third party blogs, social media websites, and other posted media accounts or websites. 18. You own the copyright or a license to utilize the media or data which you have collected in order for you to republish, re-broadcast, reprint, or re communicate the original copyrighted material produced and created by your targets, subjects, or customers? 19. Is the information searchable by a personal identifier? 20. You have a system that identifies and tracks consumer information?
  • 3. 21. You have not made anonymous second use data, by removing any and all information that can be said to be PII or relate back to an individual, their place of residence or employment? 22. Data storage and sales is your primary business purposes or generates at least 50% of your net revenues? 23. Explain how long you retain the information? 24. What reason the information is retained? 25. Are there any forms or surveys that are associated with the collection of the information that would be covered by the Paperwork Reduction Act (PRA)? 26. Do you hire outside experts to audit your systems and organization for PII compliance? 27. Do you have internal auditing to ensure best practices on Personally Identifiable Information or Specific device identifiable information? 28. Will individuals be given notice prior to the collection of personal information about them? 29. Are there any privacy risks for this system that relate to openness and transparency? If so, how will you mitigate these risks? 30. Do you state the reasons why you collect any and all PII which you are collecting? 31. Are those reasons for collection and the sorts of data you do collect made obvious and apparent by being in the first section or paragraph of any disclosures, and stated in plain regular language that is easy to understand. (Ex: We collect you name and address. We use it to market to you, by sending you our catalogs. We sell your information to third parties, whom may use it for purposes unknown to us. ) 32. Whose information is included in the system? 33. What PII will the system include? 34. Why is the collection and use of the PII necessary to the project or system?
  • 4. 35. Will the system aggregate previously unavailable data about the individual or create new data about the individual? If so, how will this data be maintained and used? 36. What controls exist to protect the consolidated data and prevent unauthorized access? 37. Will the system monitor the public? 38. Who will monitor the system? 39. Do you have a set policy of access and control procedures for sensitive data, or “need to know only” ratings and designations for your personnel? 40. Will the system monitor employees or contractors? 41. What kinds of reports can be produced on individuals from the data you harvest? 42. Will the data included in the reports produced be made anonymous? 43. Are there any privacy risks for this system that relate to data minimization? If so, how will you mitigate these risks? 44. Is the information in the project limited to only the information that is needed to carry out the purpose of the collection? 45. Will you share any of the information with other individuals, Federal and/or state agencies, or private sector organizations? If so, how will you share the information? 46. Is the information collected directly from the individual or is it taken from another source? 47. Will the project interact with other systems, whether within your organization or outside of your organization? If so, how? 48. Are there any privacy risks for this project that relate to use limitation? If so, how will the mitigate these risks? 49. Do you have permission to share the PII or specific device identifiable information?
  • 5. 50. Do you give assurances of any type stating that you shall not share the PII? 51. Did you give any assurances about the way you shall use the PII? 52. Do you honor those assurances if you give them? If so how do you ensure those assurances are carried out? 53. The PII you collect was collected by stating its use? Do you use the PII in any other ways not known by the individuals it identifies? 54. What steps do you take to ensure that all PII is accurate, relevant, timely, and complete? 55. How will the information collected be verified for accuracy and completeness? 56. Are there any privacy risks for individuals whose information is collected or used by the project that relate to data quality and integrity? If so, how will you mitigate these risks? 57. What are the possible consequences or possible harms could come to an individual whose PII you collect in an inaccurate, incomplete, or untimely manner? 58. Do you have a plan in place to mitigate and minimize those consequences or harms in a timely and responsible manner? 59. Does that plan include public relations media damage control? 60. Who else or what other organizations could be harmed in the data you collect and provide is incomplete, inaccurate, or untimely? 61. Which individuals or companies depend of the PII you collect and provide? How do they use that PII in their operations? 62. On a scale of 1 to 10, 10 being life or death and 1 being a possible customer may fail to hear about your upcoming Saturday sale, how important is accuracy, completeness, timeliness, and relevancy of the PII you collect.
  • 6. 63. Have you completed a system security plan for the information system(s) supporting the project? Who has the Authority to Operate (“ATO”) the system? 64. How is that authority decided? 65. Do you have different levels of access? 66. Which employees shall be authorized personnel, including employees and contractors acting on behalf of the organization? 67. Which personnel official duties require access? 68. Do you have a Standard operating procedure for terminating or reducing access for individuals who no longer have a need to know all or certain information? 69. Do you have an operating policy. 70. What security controls and safeguards exist to protect information contained in the system against unauthorized disclosure and access? 71. Do you have policies and procedures for: Conducting background checks on all personnel with access to the system? Initial and follow-on privacy and security awareness training for each individual with access to the system? Physical perimeter security safeguards? Security Operations Center to monitor antivirus and intrusion detection software? Risk and controls assessments and mitigation? Technical access controls, such as role-based access management and firewalls? Disaster mitigation strategies, breach notification processes and plans, and secure channels for submitting transaction information are in place for the system? 72. Are there mechanisms in place to identify security breaches? If so, what are they?
  • 7. 73. Are there any privacy risks for this system that relate to security? If so, how will you mitigate these risks? 74. Do you give individuals, in most cases, the ability to access their PII, and allow them to correct or amend their PII if it is inaccurate? 75. What opportunities are available for individuals to consent to uses, decline to provide information, or opt out of the project? 76. If no opportunities are available to consent, decline or opt out, please explain why? 77. What procedures will allow individuals to access their information? 78. Can individuals amend information about themselves in the system? 79. Are there any privacy risks for this system that relate to individual participation? 80. Who will train all personnel about the proper treatment of PII? 81. Describe what privacy training is provided to users, either generally or specifically relevant to the project? 82. Are there any privacy risks for this system that relate to awareness and training? If so, how will you mitigate these risks? 83. Have you hired coaches or lecturers to train employees? 84. Mandatory reading for employees? 85. Consultants to teach employees? 86. Testing for employees? 87. Do you have company wide certification? 88. Who developed that certification? How up to date is it? 89. How does the system ensure that the information is used in accordance with the stated practices in this assessment? 90. Do you have internal auditing?
  • 8. 91. How often do you review your policies for weaknesses or outdated systems? 92. Do you run vulnerability attacks on your system? If so how often? 93. Do you hire outside experts to audit your systems and organization for PII compliance?