Sensitive Personal Information/Data (High Risk Data)/Special Categories of Data
(US) Sensitive personal information
is generally synonymous with high risk data. The data, should it suffer loss of confidentiality, integrity, or
availability, could have a significant detrimental or adverse impact to both
the business (firm) and affected individuals. This type of data generally includes social security numbers, medical,
financial, and other highly confidential or private types of personal
information. The confidentiality of high
risk data generally governed by law.
(EU) Information concerning a data
subject’s racial or ethnic origin, political opinions, religious beliefs, trade
union activities, physical or mental health, sexual life, or details of
criminal offences. That which is more
significantly related to the notion of a reasonable expectation of
privacy. One’s medical or financial
information is often considered sensitive personal information, but other types
of personal information might be as well.
The information about an individual that can directly or indirectly distinguish or trace an individual’s identity, associate or link an individual to private information, distinguish one person from another, or could be used to re-identify anonymous ...
Any information relating to an identified or identifiable natural person 'data subject' by reference to an identifier such as a name, an identification number, location data, online identifier or to one or more factors specific to the physical, ...
Personal Data Breach
A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. In other words, if any information relating to an individual ...
A systematic process of evaluating the potential risks that may be involved in a projected activity or undertaking. In other words, identify potential hazards and analyze what could happen if a hazard occurs, specifically as it pertains to data ...
Risk Assessment Factors (IAPP)
Number of breaches; number of outages; unauthorized access; lost assets; software viruses; investigations.