Data Security Assessment 2024

As part of our annual IT Governance assessment we are required to complete a level of training in data security. The training consists of a Workbook and an Assessment.

The workbook sets out the principles of Data Security. A paper copy of the workbook is available upstairs and in reception.

It is also on the shared drive H://Data_Security/Data_security_workbook2019.doc

Please read the Data Security Workbook and then complete this assessment which will be scored.  Please don’t forget to add your name at the bottom of the form!

Data Security Assessment 2024

As part of our annual assessment we are required to complete a level of training in data security. The training consists of a Workbook and an Assessment.

Question 1: Which of the following statements on the types of information used in health and care is correct? Tick one option from the answers listed below.
Question 2: Which of the following statements on the topic of confidentiality is correct? Tick one option from the answers listed below.
Question 3: Which of the following statements on the Data Protection Act 1998 is correct? Tick one option from the answers listed below.
Question 4: Which of the following statements on the Freedom of Information Act is correct? Tick one option from the answers listed below.
Question 5: Which of the following represents an example of good practice in record keeping? Tick one option from the answers listed below.
Question 6: Which of the following represents an example of good practice in physical security? Tick one option from the answers listed below.
Question 7: Which of the following should not be used to send personal information unless absolutely necessary? Tick one option from the answers listed below.
Question 8: Which of the following is likely to increase the risk of a breach when sending personal information? Tick one option from the answers listed below.
Question 9: Which of the following statements best describes how to respond to an incident? Tick one option from the answers listed below.
Question 10: Which of the following is least likely to create a security risk? Tick one option from the answers listed below.
Question 11: Which of the following is characteristic of a secure password? Tick one option from the answers listed below.
Question 12: Under which of the following circumstances is it acceptable to use your work-provided digital asset for personal browsing? Tick one option from the answers listed below.
Question 13: Which of the following is the best course of action if you receive a phishing email? Tick one option from the answers listed below.
Question 14: Consider the following statement. “If your computer is running slowly you should disable the anti-virus software.” Tick one option from the answers listed below.
Question 15: Which of the following represents an example of good practice in data security? Tick one option from the answers listed below.
Name