Which practices constitute privacy by design for an address management system?

Enhance your CSS skills with the Address Management System Test. Utilize flashcards and multiple-choice questions, each with detailed hints and explanations. Prepare effectively for your exam!

Multiple Choice

Which practices constitute privacy by design for an address management system?

Explanation:
Privacy by design means building protection into the system from the start. For an address management system, the strongest approach combines data minimization, encryption, access controls, log masking, and flexible data erasure. Minimizing PII storage reduces the amount of sensitive information you hold. Encrypting data at rest and in transit keeps information protected even if storage or networks are breached. Strict access controls ensure only authorized users can view or modify addresses. Masking sensitive fields in logs prevents exposing PII through operational logs. Enabling easy data purge or anonymization supports retention policies and helps fulfill user rights. The other options fail because they involve collecting unnecessary data, skipping encryption, allowing open access, ignoring controls, or blocking data deletion, all of which undermine privacy protections.

Privacy by design means building protection into the system from the start. For an address management system, the strongest approach combines data minimization, encryption, access controls, log masking, and flexible data erasure. Minimizing PII storage reduces the amount of sensitive information you hold. Encrypting data at rest and in transit keeps information protected even if storage or networks are breached. Strict access controls ensure only authorized users can view or modify addresses. Masking sensitive fields in logs prevents exposing PII through operational logs. Enabling easy data purge or anonymization supports retention policies and helps fulfill user rights. The other options fail because they involve collecting unnecessary data, skipping encryption, allowing open access, ignoring controls, or blocking data deletion, all of which undermine privacy protections.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy