Confidentiality, privacy, encryption, DLP, and privacy-law obligations.
This chapter separates confidentiality from privacy and explains the controls that support each objective. ISC questions here often depend on knowing whether the issue is unauthorized access, inappropriate use, or failure to comply with privacy obligations.