Skip to content
CSF Tools Logo

CSF Tools

  • Home
  • Visualizations
  • References
  • Blog
  • NIST Privacy Framework
  • Privacy Framework v1.0
  • ID-P: Identify-P
  • ID.RA-P: Risk Assessment

ID.RA-P2: Data analytic inputs and outputs are identified and evaluated for bias

Description

[csf.tools Note: Subcategories do not have detailed descriptions.]

  • Home
  • Disclaimer
  • Privacy Policy
  • Contact Us

Share

  • Facebook
  • Twitter
  • LinkedIn
  • Reddit
  • Mail
Security Visualizations

Frameworks and Controls

  • NIST Cybersecurity Framework
    • Cybersecurity Framework v1.1 [Summary]
  • NIST Privacy Framework
    • Privacy Framework v1.0 [Summary]
      • ID-P: Identify-P
        • ID.IM-P: Inventory And Mapping
        • ID.BE-P: Business Environment
        • ID.RA-P: Risk Assessment
          • ID.RA-P1: Contextual factors related to the systems/products/services and the data actions are identified (e.g., individuals’ demographics and privacy interests or perceptions, data sensitivity and/or types, visibility of data processing to individuals and third parties).
          • ID.RA-P2: Data analytic inputs and outputs are identified and evaluated for bias
          • ID.RA-P3: Potential problematic data actions and associated problems are identified
          • ID.RA-P4: Problematic data actions, likelihoods, and impacts are used to determine and prioritize risk
          • ID.RA-P5: Risk responses are identified, prioritized, and implemented
        • ID.DE-P: Data Processing Ecosystem Risk Management
      • GV-P: Govern-P
      • CT-P: Control-P
      • CM-P: Communicate-P
      • PR-P: Protect-P
  • NIST Special Publication 800-53
    • NIST SP 800-53, Revision 4 [Summary]
    • NIST SP 800-53, Revision 5 [Summary]
  • NIST Special Publication 800-171
    • NIST SP 800-171 Revision 2 [Summary]
  • CSA Cloud Controls Matrix
    • Cloud Controls Matrix v3.0.1 [Summary]
  • CIS Critical Security Controls
    • Critical Security Controls v7.1 [Summary]
    • Critical Security Controls v8 [Summary]
  • STRIDE-LM Threat Model
  • Home
  • Visualizations
  • References
  • Blog
CSF Tools Privacy Policy Proudly powered by WordPress