Save The PI/SPI Securely: Option 1 & 2
Save The PI/SPI Securely: Option 1 & 2
QUESTION 20 OF 20
What will be the responsibilities of Data Controller
Option 1 & 2
QUESTION 19 OF 20
Which of the following can be referred as insecure data processing
QUESTION 18 OF 20
Any PI & SPI can be processed only in accordance with the consent of
Data Controller
Data Processer
Data Subject
None
QUESTION 17 OF 20
Which of the following are examples of Personal and Sensitive Personal Information:
Name, Address, Date of Birth, Telephone Number, Fax Number, Email Address
PAN Number, PF account number, UIDAI Aadhar number , Bank Account/ Credit Card
Number
QUESTION 16 OF 20
Associates may find PI/SPI data while
QUESTION 15 OF 20
TechM is committed to protect the Personal Information or Sensitive Personal Information
of
Employees
Customers
None of them
QUESTION 14 OF 20
What are the measures to keep personal information secure?
Keeping the file cabinets locked
QUESTION 13 OF 20
What are the impacts of Data Breach as per Data Protection Regulation?
All of above
QUESTION 12 OF 20
Who in TechM is responsible for protecting and safeguarding your personal data
submitted to HR?
Security Officer
QUESTION 11 OF 20
Example of Sensitive Personal Information is
First name
Occupation
Password
QUESTION 10 OF 20
Database administrators can identify PII/SPI data in which of the following scenarios:
Production database
Backup data
Option 1&2
QUESTION 7 OF 20
Which of the following is a Sensitive Personal Data
Passport number
First Name
Option 1 &2
QUESTION 6 OF 20
How many principles does Tech Mahindra have under Data Privacy policy?
8 Principles
No Principles
6 Principles
3 Principles
QUESTION 5 OF 20
Personal identifiable Information includes
Individual's address
Individual's Name
Privacy Trainings
GAP Analysis
QUESTION 1 OF 20
What will be the responsibilities of Data Processor at the end of customer engagement?
Do nothing