Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

SCENARIO

Please use the following to answer the next QUESTION:

It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It's a great deal, and after a month, more than half the organization's employees have signed on and acquired new laptops. Walking through the facility, you see them happily customizing and comparing notes on their new computers, and at the end of the day, most take their laptops with them, potentially carrying personal data to their homes or other unknown locations. It's enough to give you data- protection nightmares, and you've pointed out to the information technology Director and many others in the organization the potential hazards of this new practice, including the inevitability of eventual data loss or theft.

Today you have in your office a representative of the organization's marketing department who shares with you, reluctantly, a story with potentially serious consequences. The night before, straight from work, with laptop in hand, he went to the Bull and Horn Pub to play billiards with his friends. A fine night of sport and socializing began, with the laptop "safely" tucked on a bench, beneath his jacket. Later that night, when it was time to depart, he retrieved the jacket, but the laptop was gone. It was not beneath the bench or on another bench nearby. The waitstaff had not seen it. His friends were not playing a joke on him. After a sleepless night, he confirmed it this morning, stopping by the pub to talk to the cleanup crew. They had not found it. The laptop was missing. Stolen, it seems. He looks at you, embarrassed and upset.

You ask him if the laptop contains any personal data from clients, and, sadly, he nods his head, yes. He believes it contains files on about 100 clients, including names, addresses and governmental identification numbers. He sighs and places his head in his hands in despair.

Which is the best way to ensure that data on personal equipment is protected?

Options:

A.

User risk training.


B.

Biometric security.


C.

Encryption of the data.


D.

Frequent data backups.


Expert Solution
Questions # 62:

“Collection”, “access” and “destruction” are aspects of what privacy management process?

Options:

A.

The data governance strategy


B.

The breach response plan


C.

The metric life cycle


D.

The business case


Expert Solution
Questions # 63:

When a data breach incident has occurred. the first priority is to determine?

Options:

A.

Who caused the breach.


B.

How the breach occurred.


C.

How to contain the breach.


D.

When the breach occurred.


Expert Solution
Questions # 64:

SCENARIO

Please use the following to answer the next QUESTION:

Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the Society’s store had been hacked. The thefts could have been employee-related.

Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third parties. However, as Jason Roland, your SCS account representative, points

out, it took only a phone call from you to clarify expectations and the “misunderstanding” has not occurred again.

As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters, however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of revenue are essential.

Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”

Lately, you have been hearing about cloud computing and you know it’s fast becoming the new paradigm for various applications. However, you have heard mixed reviews about the potential impacts on privacy protection. You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.

What is the best way for your vendor to be clear about the Society’s breach notification expectations?

Options:

A.

Include notification provisions in the vendor contract


B.

Arrange regular telephone check-ins reviewing expectations


C.

Send a memorandum of understanding on breach notification


D.

Email the regulations that require breach notifications


Expert Solution
Questions # 65:

When vetting third-party processors of data protected by the GDPR. why is it important to know the physical location of stored personal data from clients?

Options:

A.

To determine their incidence response time.


B.

To determine the country laws that would govern the contract.


C.

To determine the likelihood of a security breach in the location.


D.

To ensure the country has adequate protection or if safeguards are required.


Expert Solution
Questions # 66:

Which of the following is NOT recommended for effective Identity Access Management?

Options:

A.

Demographics.


B.

Unique user IDs.


C.

User responsibility.


D.

Credentials (e.g.. password).


Expert Solution
Questions # 67:

SCENARIO

Please use the following to answer the next QUESTION:

Henry Home Furnishings has built high-end furniture for nearly forty years. However, the new owner, Anton, has found some degree of disorganization after touring the company headquarters. His uncle Henry had always focused on production – not data processing – and Anton is concerned. In several storage rooms, he has found paper files, disks, and old computers that appear to contain the personal data of current and former employees and customers. Anton knows that a single break-in could irrevocably damage the company's relationship with its loyal customers. He intends to set a goal of guaranteed zero loss of personal information.

To this end, Anton originally planned to place restrictions on who was admitted to the physical premises of the company. However, Kenneth – his uncle's vice president and longtime confidante – wants to hold off on Anton's idea in favor of converting any paper records held at the company to electronic storage. Kenneth believes this process would only take one or two years. Anton likes this idea; he envisions a password- protected system that only he and Kenneth can access.

Anton also plans to divest the company of most of its subsidiaries. Not only will this make his job easier, but it will simplify the management of the stored data. The heads of subsidiaries like the art gallery and kitchenware store down the street will be responsible for their own information management. Then, any unneeded

subsidiary data still in Anton's possession can be destroyed within the next few years.

After learning of a recent security incident, Anton realizes that another crucial step will be notifying customers. Kenneth insists that two lost hard drives in Question are not cause for concern; all of the data was encrypted and not sensitive in nature. Anton does not want to take any chances, however. He intends on sending notice letters to all employees and customers to be safe.

Anton must also check for compliance with all legislative, regulatory, and market requirements related to privacy protection. Kenneth oversaw the development of the company's online presence about ten years ago, but Anton is not confident about his understanding of recent online marketing laws. Anton is assigning another trusted employee with a law background the task of the compliance assessment. After a thorough analysis, Anton knows the company should be safe for another five years, at which time he can order another check.

Documentation of this analysis will show auditors due diligence.

Anton has started down a long road toward improved management of the company, but he knows the effort is worth it. Anton wants his uncle's legacy to continue for many years to come.

What would the company's legal team most likely recommend to Anton regarding his planned communication with customers?

Options:

A.

To send consistent communication.


B.

To shift to electronic communication.


C.

To delay communications until local authorities are informed.


D.

To consider under what circumstances communication is necessary.


Expert Solution
Questions # 68:

You would like to better understand how your organization can demonstrate compliance with international privacy standards and identify gaps for remediation. What steps could you take to achieve this objective?

Options:

A.

Carry out a second-party audit.


B.

Consult your local privacy regulator.


C.

Conduct an annual self assessment.


D.

Engage a third-party to conduct an audit.


Expert Solution
Questions # 69:

Which of the following helps build trust with customers and stakeholders?

Options:

A.

Only publish what is legally necessary to reduce your liability.


B.

Enable customers to view and change their own personal information within a dedicated portal.


C.

Publish your privacy policy using broad language to ensure all of your organization’s activities are captured.


D.

Provide a dedicated privacy space with the privacy policy, explanatory documents and operation frameworks.


Expert Solution
Questions # 70:

A minimum requirement for carrying out a Data Protection Impact Assessment (DPIA) would include?

Options:

A.

Processing on a large scale of special categories of data.


B.

Monitoring of a publicly accessible area on a large scale.


C.

Assessment of the necessity and proportionality.


D.

Assessment of security measures.


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions