The term for an organization that has collected or created data
Data Owner
The person who is legally responsible and accountable for a specific set of data, even if others manage it
Data Owner
The term for how data is archived and deleted
Data Retention
This diagram shows what ports and protocols are used and what controls are applied
Data Flow
Used to describe the application of digital rights management tools and techniques to files
IRM (Incident Response Management)
Data based discovery method depending on specific traits of the data
Metadata
The process of labeling data based on its sensitivity and importance to the organization
Data Classification
This disposal technique does not work with solid-state drives, flash media, and USB thumb drives
Degaussing
At what periods might a legal hold occur?
Law enforcement or a regulator does an investigation; A private entity takes legal action; Litigation
Set of proactive, business-wide practices that contribute to an organization's security, risk tolerance profile and strategic decisions
IRM (Incident Response Management)
What the data type of the extensible markup language is
Semi-Structured
A security method that protects data by turning it into unreadable code unless you have the proper key
Encryption
Name two issues with Log Review
Not a priority, expensive, repetitive, reviewer understanding
Assigned to data based on organizational policies and characteristics of a dataset
Data Classification
Describes the specific actions users can take regarding data
Data Rights
The entity that is responsible for manipulating, storing, and moving data
Data Processor
The process of scanning systems to locate where sensitive data is stored: Metadata
Data Discovery
The length of time an organization should keep data
Retention Period
The actions that authorized users can take on a given asset
Data Rights
Document used to validate the identity of a user or computer
Certificate
Type of classification system used by the military
Sensitivity
The method of permanently deleting or destroying data so it cannot be recovered or misused
Data Destruction
Databases are an example of this classification of data
Structured Data
This policy should specify requirements for how data is archived
Retention Policy
List two issues with employing IRM in a locally based cloud environment
Replication Restrictions, Jurisdictional conflicts, Agent Conflicts, Mapping issues, API Conflicts