[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTLUH40jjvYA2CBhbjmqtISzfmhIASx_eZ-riKoDyQ08":3},{"sections":4,"resultAnalysis":696,"id":697,"version":698,"newVersion":22,"label":699,"isPinned":22,"isShared":22,"sharingToken":9,"isRevision":22,"isBlockAnalysisShared":42,"nbReferences":700,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":701,"logoUrl":702,"description":703,"scheduleIntervalDays":9,"versionNumber":32,"dateCreation":704,"dateUpdate":705,"dateArchived":9,"archived":22,"type":706,"typeIndex":707,"typeColor":9,"typeIcon":9,"typeText":708,"creator":709,"objectType":9,"defaultOwners":717,"tags":718,"privacyHubs":9,"nbQuestions":728,"nbQuestionsRequired":11,"nbDatas":11,"deadLineDays":9},[5,242,471],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":241},"590e2bd2-a968-44ba-a3fe-0b76fa080edb","two-correct-answers","GDPR Introduction questionary",null,"Default",0,"SectionType_Default","\u003Cp>Please select two correct answers.\u003C/p>",[15,43,66,88,110,132,154,176,197,219],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":23,"displayConditions":9,"answers":24,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"4d476c6f-7052-45e7-b6dc-e5c894e0581b","what-is-a-data-protection-impact-assessment-dpia-used-for-under-gdpr","What is a Data Protection Impact Assessment (DPIA) used for under GDPR?","Checkbox",8,"Multi choice list",false,[],[25,29,34,38],{"id":26,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":28},"66084eda-c333-4112-8862-9848dc96c621","To encrypt sensitive data",[],{"id":30,"color":9,"rangeValue":9,"label":31,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":33},"a09b417f-930c-43d3-a673-78f2a47497c0","To assess and mitigate privacy risks",1,[],{"id":35,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":37},"1cd13e87-64e8-4899-b296-680e392ce7e9"," To classify data into categories",[],{"id":39,"color":9,"rangeValue":9,"label":40,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":41},"097aa720-1daf-47e6-9fa1-9621e113b905","To conduct regular security audits",[],true,{"id":44,"slug":45,"label":46,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":47,"displayConditions":9,"answers":48,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"e61875c6-ee47-4d1a-a62a-5288c8bd1f6f","which-rights-do-data-subjects-have-under-gdpr","Which rights do data subjects have under GDPR?",[],[49,54,58,62],{"id":50,"color":9,"rangeValue":9,"label":51,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":53},"884da90a-c85f-4ebd-a6dd-7f18982d59b4","The right to request a copy of all personal data held about them",0.5,[],{"id":55,"color":9,"rangeValue":9,"label":56,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":57},"8c592e1c-ddc7-4580-b435-f410a0c4a550","The right to be forgotten and have their data deleted",[],{"id":59,"color":9,"rangeValue":9,"label":60,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":61},"8b0752e5-8c41-426d-885c-e476e8643cd4","The right to unlimited data access for any purpose",[],{"id":63,"color":9,"rangeValue":9,"label":64,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":65},"a071c195-8271-46ea-a2bb-40ceed5ae2fc","The right to data portability to any organization",[],{"id":67,"slug":68,"label":69,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":70,"displayConditions":9,"answers":71,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"79ebd11c-522c-4645-9d3e-7ef899e878d7","what-is-the-primary-role-of-a-data-protection-officer-dpo-under-gdpr","What is the primary role of a Data Protection Officer (DPO) under GDPR?",[],[72,76,80,84],{"id":73,"color":9,"rangeValue":9,"label":74,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":75},"bee46941-ce8b-4e11-b6d2-e7f1498b557a","Ensuring compliance with GDPR regulations",[],{"id":77,"color":9,"rangeValue":9,"label":78,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":79},"14385254-a10a-4b4c-92af-cae6aa77dd20","Developing marketing strategies",[],{"id":81,"color":9,"rangeValue":9,"label":82,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":83},"50fb2612-efdf-45c6-a0c6-bdeed46913fa"," Managing employee payroll",[],{"id":85,"color":9,"rangeValue":9,"label":86,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":87},"04d61e3c-ee94-44ae-af4f-1deda9076211","Overseeing physical security measures",[],{"id":89,"slug":90,"label":91,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":92,"displayConditions":9,"answers":93,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"70d604e0-a0db-4fb4-a675-b876e89e3d31","in-the-context-of-gdpr-what-constitutes-explicit-consent-for-data-processing","In the context of GDPR, what constitutes \"explicit consent\" for data processing?",[],[94,98,102,106],{"id":95,"color":9,"rangeValue":9,"label":96,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":97},"ed5f486a-74d7-48ce-aae4-268e7cad90fb","Silence or inaction by the data subject",[],{"id":99,"color":9,"rangeValue":9,"label":100,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":101},"a55a443d-fb5c-4c00-a1c0-397a9efd130b","Opt-in checkboxes or written statements",[],{"id":103,"color":9,"rangeValue":9,"label":104,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":105},"eb8704a2-44c9-4fc9-8fa0-e5c7a47b36e2","Verbal agreement over the phone",[],{"id":107,"color":9,"rangeValue":9,"label":108,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":109},"138e5b0b-f769-4f87-9f19-82eb23c2bc9e"," Sending promotional emails",[],{"id":111,"slug":112,"label":113,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":114,"displayConditions":9,"answers":115,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"a6fc82b0-09e7-490d-ac82-0e0cb7d7cd91","what-is-the-maximum-fine-that-can-be-imposed-for-gdpr-violations","What is the maximum fine that can be imposed for GDPR violations?",[],[116,120,124,128],{"id":117,"color":9,"rangeValue":9,"label":118,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":119},"ef38df7d-f5c6-40bc-a87b-ccc36f67c10f","10,000 €",[],{"id":121,"color":9,"rangeValue":9,"label":122,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":123},"76514c29-3d9e-4e20-82ee-e4e51b854c71","100,000 €",[],{"id":125,"color":9,"rangeValue":9,"label":126,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":127},"eaed385b-541c-457b-ad22-0ae90e4df1b6","20 million € or 4% of annual global turnover (whichever is higher)",[],{"id":129,"color":9,"rangeValue":9,"label":130,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":131},"9b97f934-93fb-4d22-8402-1f7871704044","1 million €",[],{"id":133,"slug":134,"label":135,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":136,"displayConditions":9,"answers":137,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"fca94d50-66c5-478b-8ba3-86b422901246","under-gdpr-what-is-the-right-to-rectification","Under GDPR, what is the \"right to rectification\"?",[],[138,142,146,150],{"id":139,"color":9,"rangeValue":9,"label":140,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":141},"c8799906-60a7-4177-8cb3-9add88d49b4f","The right to access personal data",[],{"id":143,"color":9,"rangeValue":9,"label":144,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":145},"f8568323-d006-4250-ac8a-5528cb3179ca","The right to correct inaccurate personal data",[],{"id":147,"color":9,"rangeValue":9,"label":148,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":149},"a21913a7-8848-4a4c-be7d-5f66d97d66a2","The right to delete all personal data",[],{"id":151,"color":9,"rangeValue":9,"label":152,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":153},"f9e3a161-c20e-42b8-9aca-166022a8af71","The right to publicly share personal data",[],{"id":155,"slug":156,"label":157,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":158,"displayConditions":9,"answers":159,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"f5e40497-18d1-4cea-b344-fbd75934790b","when-does-a-data-breach-need-to-be-reported-to-the-supervisory-authority-under-gdpr","When does a data breach need to be reported to the supervisory authority under GDPR? ",[],[160,164,168,172],{"id":161,"color":9,"rangeValue":9,"label":162,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":163},"7e2452ec-02b7-4b95-a043-ab23cb34fafd","Within 1 year of discovery",[],{"id":165,"color":9,"rangeValue":9,"label":166,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":167},"0d27d397-665d-4896-9135-c67c6d63f0f0","Within 72 hours of becoming aware of it",[],{"id":169,"color":9,"rangeValue":9,"label":170,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":171},"3c37f8a9-61a9-4d40-9218-e265b38a3cae","Within 30 days of discovery",[],{"id":173,"color":9,"rangeValue":9,"label":174,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":175},"45353b58-bc6a-43b4-8b08-f18a69a82007","Data breaches do not need to be reported",[],{"id":177,"slug":178,"label":179,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":180,"displayConditions":9,"answers":181,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"3f323d82-3c4b-4ae6-b7f0-eac7d537cd3a","what-is-the-right-to-data-portability-under-gdpr","What is the \"right to data portability\" under GDPR?",[],[182,186,190,193],{"id":183,"color":9,"rangeValue":9,"label":184,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":185},"277cca81-d704-4c77-ba04-8f7827a15bad","The right to request all personal data to be deleted",[],{"id":187,"color":9,"rangeValue":9,"label":188,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":189},"070fe15c-ebab-4e61-acd0-e16388e717f2","The right to receive personal data in a structured, commonly used, and machine-readable format",[],{"id":191,"color":9,"rangeValue":9,"label":152,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":192},"bf1d5b7d-854c-4cff-af5e-6aad40843b85",[],{"id":194,"color":9,"rangeValue":9,"label":195,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":196},"33e253ae-87d6-48dd-ba3d-aebec2fec706","The right to access personal data of others",[],{"id":198,"slug":199,"label":200,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":201,"displayConditions":9,"answers":202,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"38758a9b-61c4-4db5-9474-a03cdcefc732","who-is-considered-the-data-controller-under-gdpr","Who is considered the \"data controller\" under GDPR?",[],[203,207,211,215],{"id":204,"color":9,"rangeValue":9,"label":205,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":206},"03a157e9-da15-4ea8-ae65-2db7c31531bd","The individual data subject",[],{"id":208,"color":9,"rangeValue":9,"label":209,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":210},"306922db-23b5-4505-8a13-0a3eb3b659fe","The organization that determines the purposes and means of processing personal data",[],{"id":212,"color":9,"rangeValue":9,"label":213,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":214},"9ee5b6f1-3d79-4f40-a623-83708e58c4ed","The organization's IT department",[],{"id":216,"color":9,"rangeValue":9,"label":217,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":218},"3f72fc7a-db01-49b1-b10b-1c3aed6fd951","The organization's marketing team",[],{"id":220,"slug":221,"label":222,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":223,"displayConditions":9,"answers":224,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"2b2bd7e4-6ce8-48f5-8360-13a476a4c863","what-does-gdpr-require-organizations-to-do-regarding-data-protection-by-design-and-by-default","What does GDPR require organizations to do regarding data protection by design and by default?",[],[225,229,233,237],{"id":226,"color":9,"rangeValue":9,"label":227,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":228},"5337fb56-fe6c-4bc0-8ba6-d75a9e83e630","Conduct quarterly penetration tests on all systems",[],{"id":230,"color":9,"rangeValue":9,"label":231,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":232},"523c5cbf-1e2f-42d4-9838-17af5caeb81b","Implement security measures from the start of any project involving personal data",[],{"id":234,"color":9,"rangeValue":9,"label":235,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":236},"fdf3dbf8-8d75-400e-b7b9-fdd0d06c938b","Appoint a Data Protection Officer (DPO) for every project",[],{"id":238,"color":9,"rangeValue":9,"label":239,"slug":9,"description":9,"score":52,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":240},"b82786dd-c68a-4db9-8b45-de241a54303c","Encrypt all data at rest and in transit",[],[],{"id":243,"slug":244,"label":245,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":246,"questions":247,"sections":470},"c75734a2-5dc9-4d60-824c-daabdb985bd6","initial","Privacy Security Assessment","\u003Cp>Please select only one correct answer.\u003C/p>",[248,274,296,317,339,360,382,403,426,448],{"id":249,"slug":250,"label":251,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":256,"displayConditions":9,"answers":257,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"d6a3cc17-7101-433c-b075-0d53a608882e","how-can-an-organization-ensure-that-its-employees-are-aware-of-privacy-related-risks","How can an organization ensure that its employees are aware of privacy-related risks?","\u003Cp>Only one correct answer.\u003C/p>","Radio",7,"Unique choice list",[],[258,262,266,270],{"id":259,"color":9,"rangeValue":9,"label":260,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":261},"d7c697cd-8eb9-4061-8355-92bb9bb4c61f"," Conduct regular information security training",[],{"id":263,"color":9,"rangeValue":9,"label":264,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":265},"80820e15-54b3-4148-b88b-6f965625db7c","Encrypt all sensitive data",[],{"id":267,"color":9,"rangeValue":9,"label":268,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":269},"7df17e2d-0dae-48b6-aa0e-be1b90163453","Implement strong firewall protection",[],{"id":271,"color":9,"rangeValue":9,"label":272,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":273},"37d6fdb3-e710-430e-8630-5bf6e4ce5c0c","Issue unique identifiers to users",[],{"id":275,"slug":276,"label":277,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":278,"displayConditions":9,"answers":279,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"df22ad35-723e-4212-a84e-13edb7c7dbd8","what-action-should-an-organization-take-to-limit-data-processing-to-what-is-necessary-data-minimization","What action should an organization take to limit data processing to what is necessary (data minimization)?",[],[280,284,288,292],{"id":281,"color":9,"rangeValue":9,"label":282,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":283},"e6f4781e-1244-4093-8003-d14e49393167","Encrypt all data",[],{"id":285,"color":9,"rangeValue":9,"label":286,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":287},"c506e787-43b5-45d5-ac38-948907d2f0f6","Implement an information classification policy",[],{"id":289,"color":9,"rangeValue":9,"label":290,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":291},"ccdf2c98-bc8f-4659-b393-2d952fa37020","Pseudonymise or anonymise data",[],{"id":293,"color":9,"rangeValue":9,"label":294,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":295},"57dafd37-660a-490b-9389-c558b738129a","Conduct periodic reminders for employees",[],{"id":297,"slug":298,"label":299,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":300,"displayConditions":9,"answers":301,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"c8666fea-b7c4-4dd3-91a1-83b3be0aaa77","what-should-be-done-to-protect-confidential-data-on-documents","What should be done to protect confidential data on documents?",[],[302,306,310,313],{"id":303,"color":9,"rangeValue":9,"label":304,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":305},"84f7d678-936c-43b7-8f99-9f107020695d","Install a VPN (virtual private network) for remote working",[],{"id":307,"color":9,"rangeValue":9,"label":308,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":309},"f07df444-db01-41d4-9754-61f3d78e7b44","Conduct regular information security training",[],{"id":311,"color":9,"rangeValue":9,"label":286,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":312},"13b32be6-4dbb-47f6-87d1-c4adda4c0e3a",[],{"id":314,"color":9,"rangeValue":9,"label":315,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":316},"47fae5af-d898-4032-949c-eb0d9b7c2384","Limit physical connection to USB sticks",[],{"id":318,"slug":319,"label":320,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":321,"displayConditions":9,"answers":322,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"8194814f-a1b2-4aa1-9d96-c1b3dee54d38","what-does-it-mean-to-implement-an-information-classification-policy","What does it mean to \"Implement an information classification policy\"?",[],[323,327,331,335],{"id":324,"color":9,"rangeValue":9,"label":325,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":326},"9b85f575-da26-49ca-84f8-08bef061f509","To encrypt all sensitive data for security purposes.",[],{"id":328,"color":9,"rangeValue":9,"label":329,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":330},"39141182-c3ae-42c0-8d57-b2c61920dd34"," To assign unique identifiers to individual documents.",[],{"id":332,"color":9,"rangeValue":9,"label":333,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":334},"334d36bf-aa2c-427c-af35-e71b8e5837cf","To provide automatic session lockout on all computer systems.",[],{"id":336,"color":9,"rangeValue":9,"label":337,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":338},"893c8523-019f-460d-b2bf-26ee8dc95938","To categorize and label data based on its sensitivity and importance.",[],{"id":340,"slug":341,"label":342,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":343,"displayConditions":9,"answers":344,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"76ee5f24-8f7c-4cfa-bb17-a71be033c0d1","what-measure-should-be-taken-to-ensure-secure-remote-working","What measure should be taken to ensure secure remote working?",[],[345,348,352,356],{"id":346,"color":9,"rangeValue":9,"label":282,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":347},"7f29950c-cfd3-4345-9cf2-3680eef4bc07",[],{"id":349,"color":9,"rangeValue":9,"label":350,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":351},"c1eeb8c5-2fe0-42bd-9c80-9977920e4d98","Set up a VPN",[],{"id":353,"color":9,"rangeValue":9,"label":354,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":355},"3552d338-ef2b-44ad-9e39-2bcbbdd55f8c","Provide automatic session lockout",[],{"id":357,"color":9,"rangeValue":9,"label":358,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":359},"99657c79-616c-4949-bc6d-746907248df6","Remove obsolete access permissions",[],{"id":361,"slug":362,"label":363,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":364,"displayConditions":9,"answers":365,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"6e5e7413-227f-42eb-907c-3c416c2488db","what-is-the-purpose-of-pseudonymising-or-anonymising-data","What is the purpose of pseudonymising or anonymising data?",[],[366,370,374,378],{"id":367,"color":9,"rangeValue":9,"label":368,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":369},"0155e3d6-e785-4c92-b264-816bb3aeeb50","To prevent data breaches",[],{"id":371,"color":9,"rangeValue":9,"label":372,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":373},"0e3ab2f3-479c-46eb-a45e-d316368012c5","To limit the reidentification of individuals",[],{"id":375,"color":9,"rangeValue":9,"label":376,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":377},"08a16889-be64-4286-9d76-481efe9f2248","To create strong passwords",[],{"id":379,"color":9,"rangeValue":9,"label":380,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":381},"032f75a8-ce2a-4768-b01d-5e6cd3df64fa","To protect physical premises",[],{"id":383,"slug":384,"label":385,"tooltipHtml":9,"descriptionHtml":386,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":387,"displayConditions":9,"answers":388,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"62267cca-9e12-401f-9b44-49a6e6c7a082","how-can-an-organization-protect-personal-devices-used-for-work-byod","How can an organization protect personal devices used for work (BYOD)?","\u003Cp>\u003Cem>FYI : BYOD means Bring Your Own Device, it refers to the usage of personnal hardware on professionnal premises.\u003C/em>\u003C/p>\u003Cp>Only one correct answer.\u003C/p>",[],[389,392,396,399],{"id":390,"color":9,"rangeValue":9,"label":308,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":391},"d8cd616f-ec9e-42e2-840a-fc023c4fd92d",[],{"id":393,"color":9,"rangeValue":9,"label":394,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":395},"ad17d640-f4df-42a7-9bdf-a882d4c1d226","Set up intrusion alarms",[],{"id":397,"color":9,"rangeValue":9,"label":272,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":398},"43423880-7d85-4766-8a42-b418036f5939",[],{"id":400,"color":9,"rangeValue":9,"label":401,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":402},"160107a8-d232-4f00-806c-e73c8ae7a76f","Implement a telework safety policy",[],{"id":404,"slug":405,"label":406,"tooltipHtml":9,"descriptionHtml":407,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":408,"displayConditions":9,"answers":409,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"ddc5b70e-adbc-481b-a4f0-e508ee92b0f3","what-is-the-purpose-of-issuing-a-confidentiality-agreement-to-employees","What is the purpose of issuing a confidentiality agreement to employees?","\u003Cp>\u003Cem>Only one correct answer.\u003C/em>\u003C/p>",[],[410,414,418,422],{"id":411,"color":9,"rangeValue":9,"label":412,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":413},"0943476d-cde5-4168-b471-9036243d89ac","To limit physical connection to USB sticks",[],{"id":415,"color":9,"rangeValue":9,"label":416,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":417},"b4eb1f60-f141-47df-a826-fd4b77e0d4ee","To ensure data minimization",[],{"id":419,"color":9,"rangeValue":9,"label":420,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":421},"7a1cf696-9ec8-4800-a159-5e4ffbce7021","To secure personal devices used for work",[],{"id":423,"color":9,"rangeValue":9,"label":424,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":425},"8e92e115-e477-46c0-91b3-f7eae5216e0a","To establish confidentiality obligations",[],{"id":427,"slug":428,"label":429,"tooltipHtml":9,"descriptionHtml":252,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":430,"displayConditions":9,"answers":431,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"6ca5d21d-c3ad-473f-8ef9-9937b8e5cd47","how-can-an-organization-ensure-that-data-protection-is-part-of-the-design-and-default-settings-of-its-systems","How can an organization ensure that data protection is part of the design and default settings of its systems?",[],[432,436,440,444],{"id":433,"color":9,"rangeValue":9,"label":434,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":435},"23dc7cd0-f364-42b2-a78f-d74d7103e4f0","Establishing a virtual private network (VPN) for remote work.",[],{"id":437,"color":9,"rangeValue":9,"label":438,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":439},"83f2d2bb-7e75-4da7-9a47-5b47d13fc237","Incorporating data protection principles as part of system design and default settings.",[],{"id":441,"color":9,"rangeValue":9,"label":442,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":443},"6074162c-7c46-47e0-911f-9aefd409bc7b","Enabling automatic session lockout for user accounts.",[],{"id":445,"color":9,"rangeValue":9,"label":446,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":447},"b7befc00-5da3-4ba3-aa15-cdef454d04a5","Conducting periodic training sessions for employees on data protection.",[],{"id":449,"slug":450,"label":451,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":452,"displayConditions":9,"answers":453,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"420f1de5-0780-4b95-b5b5-d2d87ca51bf4","which-of-the-following-is-a-key-component-of-a-data-retention-policy","Which of the following is a key component of a \"Data Retention Policy\"?",[],[454,458,462,466],{"id":455,"color":9,"rangeValue":9,"label":456,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":457},"80b687e1-d7ff-483e-a07b-ed0b3fb7952d","Sharing personal data with third parties.",[],{"id":459,"color":9,"rangeValue":9,"label":460,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":461},"62ea1572-58d6-4375-bd43-c214bb34a3d8","Keeping personal data indefinitely.",[],{"id":463,"color":9,"rangeValue":9,"label":464,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":465},"236f7d2d-5491-4ed7-8746-7aa94a8a2501","Defining how long personal data will be retained and when it will be deleted.",[],{"id":467,"color":9,"rangeValue":9,"label":468,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":469},"07ef9854-2b6b-4856-8606-862fb8e7503c","Encrypting personal data for storage.",[],[],{"id":472,"slug":473,"label":474,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":246,"questions":475,"sections":695},"a514dbfc-e696-4f03-9df4-7378c814e8a4","dpo-missions","DPO Missions",[476,498,520,542,564,586,607,629,651,673],{"id":477,"slug":478,"label":479,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":480,"displayConditions":9,"answers":481,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"0b1eb22d-0e58-46e4-a277-e361f57e76bf","what-is-one-of-the-primary-responsibilities-of-a-data-privacy-officer-dpo","What is one of the primary responsibilities of a Data Privacy Officer (DPO)?",[],[482,486,490,494],{"id":483,"color":9,"rangeValue":9,"label":484,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":485},"eb9f1860-91be-45a1-a08e-9ff13845307c","Managing the organization's marketing campaigns.",[],{"id":487,"color":9,"rangeValue":9,"label":488,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":489},"2bbb9132-3162-4663-995c-5ffacbdbdc6a","Overseeing the company's financial operations.",[],{"id":491,"color":9,"rangeValue":9,"label":492,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":493},"ebeab366-5003-4240-bd63-43e350e326b9","Ensuring compliance with data protection regulations.",[],{"id":495,"color":9,"rangeValue":9,"label":496,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":497},"d7b52690-0698-4f44-9757-f0675105ce9a","Handling employee payroll.",[],{"id":499,"slug":500,"label":501,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":502,"displayConditions":9,"answers":503,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"c85cb0a1-c43e-42b6-8554-17b1ea3e122e","which-of-the-following-tasks-falls-under-the-role-of-a-data-privacy-officer","Which of the following tasks falls under the role of a Data Privacy Officer?",[],[504,508,512,516],{"id":505,"color":9,"rangeValue":9,"label":506,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":507},"0203aa17-9c96-4800-8922-4961048033ab","Developing new product features.",[],{"id":509,"color":9,"rangeValue":9,"label":510,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":511},"3779b8f5-fd70-4a70-9970-0177293f80aa","Managing the company's social media accounts.",[],{"id":513,"color":9,"rangeValue":9,"label":514,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":515},"38d0c69d-33dc-449e-a8e7-a87162d42793","Conducting privacy impact assessments (PIAs).",[],{"id":517,"color":9,"rangeValue":9,"label":518,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":519},"6ecf2ee1-ca56-4060-9ca6-9184d3a6808c","Creating marketing materials.",[],{"id":521,"slug":522,"label":523,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":524,"displayConditions":9,"answers":525,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"7d10cf31-d747-4121-834d-f762dd3e73ed","what-does-a-data-privacy-officer-often-do-to-promote-data-privacy-within-an-organization","What does a Data Privacy Officer often do to promote data privacy within an organization?",[],[526,530,534,538],{"id":527,"color":9,"rangeValue":9,"label":528,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":529},"60f2b49b-ee25-4687-a14f-2dc4b8af2556","Conducting regular financial audits.",[],{"id":531,"color":9,"rangeValue":9,"label":532,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":533},"1f04e0c5-17cd-417e-b89c-be239a83b2f3","Providing IT support to employees.",[],{"id":535,"color":9,"rangeValue":9,"label":536,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":537},"308804df-b0c8-43e7-bbb3-8371e6fb1a3b","Raising awareness about data protection and privacy.",[],{"id":539,"color":9,"rangeValue":9,"label":540,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":541},"ae6f669e-3275-4c3c-bbce-624f531368b6","Handling customer complaints.",[],{"id":543,"slug":544,"label":545,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":546,"displayConditions":9,"answers":547,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"da186a85-0f2b-41e8-8765-4b116d076be3","how-does-a-data-privacy-officer-assist-in-responding-to-data-breach-incidents","How does a Data Privacy Officer assist in responding to data breach incidents?",[],[548,552,556,560],{"id":549,"color":9,"rangeValue":9,"label":550,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":551},"57d0618f-57ea-4324-8d6a-f5893eeeca00","By promoting data sharing with external parties.",[],{"id":553,"color":9,"rangeValue":9,"label":554,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":555},"01eae8c1-da38-4445-a24e-74e0d4dae221","By deleting all data related to the breach.",[],{"id":557,"color":9,"rangeValue":9,"label":558,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":559},"fa261257-4373-4787-ac8d-3ad21b010087","By coordinating the organization's response and reporting the breach to authorities.",[],{"id":561,"color":9,"rangeValue":9,"label":562,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":563},"1f05b2e4-ded5-4783-8033-a96daaa05c56","By increasing data collection.",[],{"id":565,"slug":566,"label":567,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":568,"displayConditions":9,"answers":569,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"641f7a67-0e9b-4b66-b9e0-972030cae432","what-is-the-role-of-a-data-privacy-officer-in-relation-to-data-subject-requests","What is the role of a Data Privacy Officer in relation to data subject requests?",[],[570,574,578,582],{"id":571,"color":9,"rangeValue":9,"label":572,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":573},"f27f0329-360e-489e-883a-34a9b2266a6e","Handling data subject requests in compliance with data protection laws.",[],{"id":575,"color":9,"rangeValue":9,"label":576,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":577},"c914277e-b67e-467c-8b43-5c91c909af28"," Ignoring data subject requests to protect the organization.",[],{"id":579,"color":9,"rangeValue":9,"label":580,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":581},"bc706c27-0430-443d-984b-a115d4c827cf","Ensuring all data subject requests are granted immediately.",[],{"id":583,"color":9,"rangeValue":9,"label":584,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":585},"aeb7cb09-ed28-46cc-a095-b44d259f818b","Forwarding all data subject requests to the IT department.",[],{"id":587,"slug":588,"label":589,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":590,"displayConditions":9,"answers":591,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"6dd505ce-8038-41fb-aebe-74db405804d0","what-does-a-data-privacy-officer-do-to-monitor-and-maintain-data-protection-policies-and-procedures","What does a Data Privacy Officer do to monitor and maintain data protection policies and procedures?",[],[592,596,600,603],{"id":593,"color":9,"rangeValue":9,"label":594,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":595},"ec33074b-f2fe-4e05-9067-c6cd3202d73c","Conducting financial transactions.",[],{"id":597,"color":9,"rangeValue":9,"label":598,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":599},"c88f61dd-93c4-4a91-af3e-971076c7f3f8","Regularly reviewing and updating privacy policies.",[],{"id":601,"color":9,"rangeValue":9,"label":484,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":602},"bff4e0d8-172b-43c2-88b1-95f08224a2ad",[],{"id":604,"color":9,"rangeValue":9,"label":605,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":606},"72d99f1a-3d24-486e-aee4-29af6ea33c82","Handling employee HR records.",[],{"id":608,"slug":609,"label":610,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":611,"displayConditions":9,"answers":612,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"cdd8a033-501d-42c9-97f5-474f43731108","how-does-a-data-privacy-officer-contribute-to-employee-training-and-awareness","How does a Data Privacy Officer contribute to employee training and awareness?",[],[613,617,621,625],{"id":614,"color":9,"rangeValue":9,"label":615,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":616},"8f64827b-2c32-4466-8e6f-a3faaad69d91","Managing the organization's physical security.",[],{"id":618,"color":9,"rangeValue":9,"label":619,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":620},"97d50434-5b5f-41b6-8158-1080ad4c7e62","Providing training on product development.",[],{"id":622,"color":9,"rangeValue":9,"label":623,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":624},"f638c3f7-1f90-426d-9875-21717bb35839","Leading the company's sales team.",[],{"id":626,"color":9,"rangeValue":9,"label":627,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":628},"ec26574d-8c4d-44fe-b0dd-031fa767b3a5","Conducting information security training and awareness sessions.",[],{"id":630,"slug":631,"label":632,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":633,"displayConditions":9,"answers":634,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"5ca251d0-e59a-47c3-9de8-04e47be8f196","in-what-way-does-a-data-privacy-officer-assist-in-ensuring-vendor-compliance-with-data-protection-regulations","In what way does a Data Privacy Officer assist in ensuring vendor compliance with data protection regulations?",[],[635,639,643,647],{"id":636,"color":9,"rangeValue":9,"label":637,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":638},"69cbf4fc-2f98-426a-9cdd-37ce1d9542b3","By not involving vendors in data processing.",[],{"id":640,"color":9,"rangeValue":9,"label":641,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":642},"57fbda61-4e99-4908-908c-13f0aec88d1f","By ignoring vendor practices.",[],{"id":644,"color":9,"rangeValue":9,"label":645,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":646},"6e880272-87c7-420d-8e51-5938d54a0c7a","By sharing all data with vendors.",[],{"id":648,"color":9,"rangeValue":9,"label":649,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":650},"e88d7051-98fa-40ec-aba2-8d6ae659348f","By conducting vendor audits and assessments.",[],{"id":652,"slug":653,"label":654,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":655,"displayConditions":9,"answers":656,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"bb8158b2-76dc-440e-8291-a3c11df6901c","what-is-the-role-of-a-data-privacy-officer-in-liaising-with-regulatory-authorities","What is the role of a Data Privacy Officer in liaising with regulatory authorities?",[],[657,661,665,669],{"id":658,"color":9,"rangeValue":9,"label":659,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":660},"b556c882-9426-4c02-b232-d3fcee71d2b7","Avoiding all communication with regulatory authorities.",[],{"id":662,"color":9,"rangeValue":9,"label":663,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":664},"d3387cfe-663e-41f8-8a27-5bc6ae5b54ae","Coordinating with regulatory authorities as required by law.",[],{"id":666,"color":9,"rangeValue":9,"label":667,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":668},"99e03991-c0e5-48cf-bdd0-8527a58dac42","Notifying regulatory authorities about any minor issues.",[],{"id":670,"color":9,"rangeValue":9,"label":671,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":672},"b034f726-6050-4030-8de7-2e488f3292c6","Taking legal action against regulatory authorities.",[],{"id":674,"slug":675,"label":676,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":253,"typeIndex":254,"typeColor":9,"typeIcon":9,"typeText":255,"dynamicSelectType":9,"editableOptions":22,"complianceRules":677,"displayConditions":9,"answers":678,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":42,"native":22},"5af97da0-af35-4042-92ab-678ed0f8eb86","how-does-a-data-privacy-officer-contribute-to-risk-management-within-the-organization","How does a Data Privacy Officer contribute to risk management within the organization?",[],[679,683,687,691],{"id":680,"color":9,"rangeValue":9,"label":681,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":682},"e6cc9c21-0a06-4922-9d0d-64739d257fdf","By taking unnecessary risks to boost revenue.",[],{"id":684,"color":9,"rangeValue":9,"label":685,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":686},"99dcdd56-0d44-4141-811a-9553921d5a81","By outsourcing all risk management tasks.",[],{"id":688,"color":9,"rangeValue":9,"label":689,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":690},"6255c2f7-fd4a-44f9-ba0f-2d115a739250","By avoiding all risks to maintain the status quo.",[],{"id":692,"color":9,"rangeValue":9,"label":693,"slug":9,"description":9,"score":32,"nonApplicable":22,"tooltip":9,"goodAnswer":42,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":694},"06a70749-867b-4b7c-aac9-22df5f4b30f3","By identifying, assessing, and mitigating data protection risks.",[],[],[],"3dae1927-2ed6-4f04-337d-08dbce23f78b","1.0","Data Protection and Privacy Compliance knowledge Assessment",2,"v0.1","https://static.dastra.eu/tenant-3/audit/wp1AnvM3R3h8es/knowledge-base-150.png","Test your knowledge of data protection and privacy in general","2023-10-16T14:51:08.9523862","2025-09-16T14:37:38.5630661","Formation",6,"Training",{"id":710,"displayName":711,"familyName":712,"givenName":713,"email":714,"active":42,"color":715,"avatarUrl":716,"tenantId":11},31,"Jérôme de Mercey","de Mercey","Jérôme","jerome.demercey@dastra.eu","#99C691","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png",[],[719],{"id":720,"label":721,"type":722,"typeIndex":723,"typeColor":724,"typeIcon":725,"typeText":726,"color":727},"5d13e13b-84c0-44a1-8e42-3e9f684542d7","E-learning","AuditTemplate",9,"#83d162","ds-icon-audit","Questionnaire template","#4E6374",30]