Data Privacy Assignment 2
Data Privacy Assignment 2
2.Complying with all regulatory requirements. Common compliance risks involve illegal practices and include fraud, theft, bribery,
money laundering and embezzlement. Privacy breaches. A common compliance risk
is the violation of privacy laws. Hacking, viruses and malware are some of the cyber
risks that affect organizations.
3. Improving data security. Make sure your computer is properly patched and updated. This is often the best
way to ensure its adequately protected. Your security applications are only as good
as their most recent update. Since hackers and ransomware strains are constantly
adapting to exploit weaknesses in earlier software versions, it is advisable to update
these applications regularly.
4. . Evidence-based Decision Making Confounding variables, sampling bias, correlation versus causation, insufficient data
to correctly point out what is an outlier and what isn’t, poorly chosen axis or time
periods, even measurement error… the list of risks in statistical analysis are many
and far more common than most people realize yet people are increasingly
conditioned to blindly believe a statement like “x was a statistically significant
change due to y.”
5. Monitoring processes Risk monitoring is the process which tracks and evaluates the levels of risk in an
organization. ... The findings which are produced by risk monitoring processes can
be used to help to create new strategies and update older strategies which may have
proved to be ineffective.
Governance Outcome and Regulatory Compliance
Performance Areas Practice Standards
1. Quality Management 1. International Standards Organization
2. Professional Organization
2. Business Process Management 3. Competency Framework Product
3. Program Management
4. Project Management
5. Financial Management
6. Asset Management
7. Human Resource