All of the following are accurate regarding the use of technical security controlsEXCEPT?
A.
Technical security controls are part of a data governance strategy.
B.
Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.
C.
Most privacy legislation lists the types of technical security controls that must be implemented.
D.
A person with security knowledge should be involved with the deployment of technical security controls.
The Answer Is:
C
This question includes an explanation.
Explanation:
Comprehensive and Detailed Explanation:
While privacy laws require appropriate technical security controls, most laws do not specify exactly which controls must be used. Instead, they mandate organizations to adopt "appropriate technical and organizational measures".
Option A (Part of data governance strategy) is correct because security controls support data protection and privacy governance.
Option B (Often satisfy multiple jurisdictions) is correct since common security measures (e.g., encryption, access controls) align with various privacy regulations.
Option D (Security expert involvement) is correct because deploying security controls requires specialized knowledge.
[Reference:CIPM Official Textbook, Module: Privacy and Data Security – Section on Legal Requirements for Technical Controls., , ]
CIPM PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"