Which practices constitute privacy by design for an address management system?

Enhance your skills with the CSS Mastery – Address Management System Test. Flashcards, multiple choice questions with hints and explanations. Boost confidence for your test!

Multiple Choice

Which practices constitute privacy by design for an address management system?

Explanation:
Privacy by design means building protection into the system from the start. For an address management system, the strongest approach combines data minimization, encryption, access controls, log masking, and flexible data erasure. Minimizing PII storage reduces the amount of sensitive information you hold. Encrypting data at rest and in transit keeps information protected even if storage or networks are breached. Strict access controls ensure only authorized users can view or modify addresses. Masking sensitive fields in logs prevents exposing PII through operational logs. Enabling easy data purge or anonymization supports retention policies and helps fulfill user rights. The other options fail because they involve collecting unnecessary data, skipping encryption, allowing open access, ignoring controls, or blocking data deletion, all of which undermine privacy protections.

Privacy by design means building protection into the system from the start. For an address management system, the strongest approach combines data minimization, encryption, access controls, log masking, and flexible data erasure. Minimizing PII storage reduces the amount of sensitive information you hold. Encrypting data at rest and in transit keeps information protected even if storage or networks are breached. Strict access controls ensure only authorized users can view or modify addresses. Masking sensitive fields in logs prevents exposing PII through operational logs. Enabling easy data purge or anonymization supports retention policies and helps fulfill user rights. The other options fail because they involve collecting unnecessary data, skipping encryption, allowing open access, ignoring controls, or blocking data deletion, all of which undermine privacy protections.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy