Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following is TRUE about the Data Protection Impact Assessment (DPIA) process as required under the General Data Protection Regulation (GDPR)?

Options:

A.

The DPIA result must be reported to the corresponding supervisory authority.


B.

The DPIA report must be published to demonstrate the transparency of the data processing.


C.

The DPIA must include a description of the proposed processing operation and its purpose.


D.

The DPIA is required if the processing activity entails risk to the rights and freedoms of an EU individual.


Expert Solution
Questions # 52:

Which of the following is an example of Privacy by Design (PbD)?

Options:

A.

A company hires a professional to structure a privacy program that anticipates the increasing demands of new laws.


B.

The human resources group develops a training program for employees to become certified in privacy policy.


C.

A labor union insists that the details of employers' data protection methods be documented in a new contract.


D.

The information technology group uses privacy considerations to inform the development of new networking software.


Expert Solution
Questions # 53:

SCENARIO

Please use the following to answer the next QUESTION.

Manasa is a product manager at Omnipresent Omnimedia, where she is responsible for leading the development of the company’s flagship product, the Handy Helper. The Handy Helper is an application that can be used in the home to manage family calendars, do online shopping, and schedule doctor appointments.

After having had a successful launch in the United States, the Handy Helper is about to be made available for purchase worldwide.

The packaging and user guide for the Handy Helper indicate that it is a “privacy friendly” product suitable for the whole family, including children, but does not provide any further detail or privacy notice. In order to use the application, a family creates a single account, and the primary user has access to all information about the other users. Upon start up, the primary user must check a box consenting to receive marketing emails from Omnipresent Omnimedia and selected marketing partners in order to be able to use the application.

Sanjay, the head of privacy at Omnipresent Omnimedia, was working on an agreement with a European distributor of Handy Helper when he fielded many Questions about the product from the distributor. Sanjay needed to look more closely at the product in order to be able to answer the Questions as he was not involved in the product development process.

In speaking with the product team, he learned that the Handy Helper collected and stored all of a user’s sensitive medical information for the medical appointment scheduler. In fact, all of the user’s information is stored by Handy Helper for the additional purpose of creating additional products and to analyze usage of the product. This data is all stored in the cloud and is encrypted both during transmission and at rest.

Consistent with the CEO’s philosophy that great new product ideas can come from anyone, all Omnipresent Omnimedia employees have access to user data under a program called “Eureka.” Omnipresent Omnimedia is hoping that at some point in the future, the data will reveal insights that could be used to create a fully automated application that runs on artificial intelligence, but as of yet, Eureka is not well-defined and is considered a long-term goal.

What security controls are missing from the Eureka program?

Options:

A.

Storage of medical data in the cloud is not permissible under the General Data Protection Regulation (GDPR)


B.

Data access is not limited to those who “need to know” for their role


C.

Collection of data without a defined purpose might violate the fairness principle


D.

Encryption of the data at rest prevents European users from having the right of access and the right of portability of their data


Expert Solution
Questions # 54:

The General Data Protection Regulation (GDPR) specifies fines that may be levied against data controllers for certain infringements. Which of the following will be subject to administrative fines of up to 10 000 000 EUR, or in the case of an undertaking, up to 2% of the total worldwide annual turnover of the preceding financial year?

Options:

A.

Failure to demonstrate that consent was given by the data subject to the processing of their personal data where it is used as the basis for processing


B.

Failure to implement technical and organizational measures to ensure data protection is enshrined by design and default


C.

Failure to process personal information in a manner compatible with its original purpose


D.

Failure to provide the means for a data subject to rectify inaccuracies in personal data


Expert Solution
Questions # 55:

What is the key privacy objective in undertaking an evaluation of technical controls?

Options:

A.

To review and evaluate gaps in targeted internal privacy awareness training.


B.

To determine if the current privacy framework is adequate for the company's needs.


C.

To evaluate and mitigate third-party risk associated with service provider relationships.


D.

To identify and mitigate privacy risks associated with technical systems and data processing activities.


Expert Solution
Questions # 56:

SCENARIO

Please use the following to answer the next QUESTION:

John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe.

During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.

John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.

At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off- premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.

Which of the following is NOT an obligation of MessageSafe as the email continuity service provider for A&M LLP?

Options:

A.

Privacy compliance.


B.

Security commitment.


C.

Certifications to relevant frameworks.


D.

Data breach notification to A&M LLP.


Expert Solution
Questions # 57:

What is the main purpose of a privacy program audit?

Options:

A.

To mitigate the effects of a privacy breach.


B.

To justify a privacy department budget increase.


C.

To make decisions on privacy staff roles and responsibilities.


D.

To ensure the adequacy of data protection procedures.


Expert Solution
Questions # 58:

SCENARIO

Please use the following to answer the next QUESTION:

Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the

practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.

Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/ printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.

Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.

Richard needs to closely monitor the vendor in charge of creating the firm's database mainly because of what?

Options:

A.

The vendor will be required to report any privacy violations to the appropriate authorities.


B.

The vendor may not be aware of the privacy implications involved in the project.


C.

The vendor may not be forthcoming about the vulnerabilities of the database.


D.

The vendor will be in direct contact with all of the law firm's personal data.


Expert Solution
Questions # 59:

In addition to regulatory requirements and business practices, what important factors must a global privacy strategy consider?

Options:

A.

Monetary exchange.


B.

Geographic features.


C.

Political history.


D.

Cultural norms.


Expert Solution
Questions # 60:

While trying to e-mail her manager, an employee has e-mailed a list of all the company's customers, including their bank details, to an employee with the same name at a different company. Which of the following would be the first stage in the incident response plan under the General Data Protection Regulation (GDPR)?

Options:

A.

Notification to data subjects.


B.

Containment of impact of breach.


C.

Remediation offers to data subjects.


D.

Notification to the Information Commissioner's Office (ICO).


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions