Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

Rationalizing requirements in order to comply with the various privacy requirements required by applicable law and regulation does NOT include which of the following?

Options:

A.

Harmonizing shared obligations and privacy rights across varying legislation and/or regulators.


B.

Implementing a solution that significantly addresses shared obligations and privacy rights.


C.

Applying the strictest standard for obligations and privacy rights that doesn't violate privacy laws elsewhere.


D.

Addressing requirements that fall outside the common obligations and rights (outliers) on a case-by-case basis.


Expert Solution
Questions # 32:

SCENARIO

Please use the following to answer the next question:

The risk committee of your organization is particularly concerned not only by the number and frequency of data breaches reported to it over the past 12 months, but also the inconsistency in responses and poor incident response turnaround times.

Upon reviewing the current incident response plan (IRP), it was discovered that while the business continuity plan (BCP) had been updated on time, the IRP, linked to the BCP, was last updated over three years ago.

What additional procedure and/or process would best reduce future incidents?

Options:

A.

Contact internal teams impacted by incidents.


B.

Notify stakeholders of changes.


C.

Ensure the IRP is on the same scheduled review cycle as the BCP.


D.

Add comments to record past actions.


Expert Solution
Questions # 33:

PbD is the framework that?

Options:

A.

Dictates the design of the system development life cycle.


B.

Establishes risk-based expectations for privacy management.


C.

Embeds privacy into the design of technology, systems and practices.


D.

Guides organizations in designing, implementing and managing privacy programs in line with privacy laws and best practices.


Expert Solution
Questions # 34:

When developing a privacy program and selecting a program sponsor or "champion" the least important consideration should be that they?

Options:

A.

Are a part of the organization's top management


B.

Have the authority to approve policy and provide funding.


C.

Will be an effective advocate and understand the importance of privacy.


D.

Have accountability for the organization's privacy and/or information security, risk, compliance or legal decisions.


Expert Solution
Questions # 35:

You are the privacy officer at a university. Recently, the police have contacted you as they suspect that one of your students is using a library computer to commit financial fraud. The police would like your assistance in investigating this individual and are requesting computer logs and usage data of the student.

What Is your first step in responding to the request?

Options:

A.

Refuse the request as the police do not have a warrant.


B.

Provide the data to police and record it for your own archives.


C.

Contact the university's legal counsel to determine if the request is lawful.


D.

Review policies, procedures and legislation to determine the university's obligation to co-operate with the police.


Expert Solution
Questions # 36:

SCENARIO

Please use the following to answer the next QUESTION:

Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the Society’s store had been hacked. The thefts could have been employee-related.

Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third parties. However, as Jason Roland, your SCS account representative, points

out, it took only a phone call from you to clarify expectations and the “misunderstanding” has not occurred again.

As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters, however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of revenue are essential.

Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”

Lately, you have been hearing about cloud computing and you know it’s fast becoming the new paradigm for various applications. However, you have heard mixed reviews about the potential impacts on privacy protection. You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.

What is the best way for your vendor to be clear about the Society’s breach notification expectations?

Options:

A.

Include notification provisions in the vendor contract


B.

Arrange regular telephone check-ins reviewing expectations


C.

Send a memorandum of understanding on breach notification


D.

Email the regulations that require breach notifications


Expert Solution
Questions # 37:

In a sample metric template, what does “target” mean?

Options:

A.

The suggested volume of data to collect


B.

The percentage of completion


C.

The threshold for a satisfactory rating


D.

The frequency at which the data is sampled


Expert Solution
Questions # 38:

All of the following changes will likely trigger a data inventory update EXCEPT?

Options:

A.

Outsourcing the Customer Relationship Management (CRM) function.


B.

Acquisition of a new subsidiary.


C.

Onboarding of a new vendor.


D.

Passage of a new privacy regulation.


Expert Solution
Questions # 39:

A company's human resources (HR) group is working with their information security team lo tag data within their systems as ''special data" or "sensitive data" What is the most probable reason for the group to do so?

Options:

A.

To ensure the data is fully controlled and used for only authorized purposes.


B.

To apply the organization's data deletion standard.


C.

To create a robust record of processing activities.


D.

To prepare for an upcoming regulatory audit under GDPR.


Expert Solution
Questions # 40:

An organization's privacy officer was just notified by the benefits manager that she accidentally sent out the retirement enrollment report of all employees to a wrong vendor.

Which of the following actions should the privacy officer take first?

Options:

A.

Perform a risk of harm analysis.


B.

Report the incident to law enforcement.


C.

Contact the recipient to delete the email.


D.

Send firm-wide email notification to employees.


Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions