The concept of data adequacy is based on the principle of _________.
Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:
I) Increase control over their personal data
II) Choose whether to use services anonymously or not
III) Obtain informed consent about sharing their personal data
IV) Opt-out of behavioral advertising or any other use of data
Which of the following is not an objective of POR?
In the landmark case _______________ the Honourable Supreme Court of India reaffirmed the status of Right to Privacy as a Fundamental Right under Part III of the constitution.
Which of the following factors is least likely to be considered while implementing or augmenting data security solution for privacy protection?
Which of the following are key contributors that would enhance the complexity in implementing security measures for protection of personal information? (Choose all that apply.)
Which of the following statement is incorrect?
Which of the following is not in line with the modern definition of Consent?
Your district council releases an interactive map of orange trees in the district which shows that the locality in which your house is located has the highest concentration of orange trees. Does the council map contain your personal information?
What are the three main approaches for assessing privacy? Tick all that apply.