CISSP Practice Question – Privacy, Monitoring, and Ethics
A company implements new monitoring software that captures screenshots of employee workstations every five minutes to ensure productivity. However, some employees handle client financial data and access third-party critical infrastructure systems as part of their work.
What is the MOST appropriate action before deploying the monitoring system?
A. Proceed with deployment since monitoring is part of legitimate business interests.
B. Obtain written consent from employees acknowledging they are subject to monitoring.
C. Conduct a privacy impact assessment (PIA) to evaluate legal, ethical, and security implications.
D. Encrypt all collected screenshots to protect sensitive data.
2
18 comments
Vincent Primiani
7
CISSP Practice Question – Privacy, Monitoring, and Ethics
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by