Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

When supporting the business and data privacy program expanding into a new jurisdiction, it is important to do all of the following EXCEPT?

Options:

A.

Identify the stakeholders.


B.

Appoint a new Privacy Officer (PO) for that jurisdiction.


C.

Perform an assessment of the laws applicable in that new jurisdiction.


D.

Consider culture and whether the privacy framework will need to account for changes in culture.


Expert Solution
Questions # 62:

After an incident, all of the following are potential objectives for improvements to the way an organization handles breach management EXCEPT?

Options:

A.

Contacting regulators.


B.

Reviewing lessons learned.


C.

Ensuring appropriate privacy/security funding.


D.

Getting commitment from stakeholders related to any process updates.


Expert Solution
Questions # 63:

All of the following are accurate regarding the use of technical security controls EXCEPT?

Options:

A.

Technical security controls are part of a data governance strategy.


B.

Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.


C.

Most privacy legislation lists the types of technical security controls that must be implemented.


D.

A person with security knowledge should be involved with the deployment of technical security controls.


Expert Solution
Questions # 64:

Incipia Corporation just trained the last of its 300 employees on their new privacy policies and procedures.

If Incipia wanted to analyze the effectiveness of the training over the next 6 months, which form of trend analysis should they use?

Options:

A.

Cyclical.


B.

Irregular.


C.

Statistical.


D.

Standard variance.


Expert Solution
Questions # 65:

When building a data privacy program, what is a good starting point to understand the scope of privacy program needs?

Options:

A.

Perform Data Protection Impact Assessments (DPIAs).


B.

Perform Risk Assessments


C.

Complete a Data Inventory.


D.

Review Audits.


Expert Solution
Questions # 66:

Which of the following indicates you have developed the right privacy framework for your organization?

Options:

A.

It includes a privacy assessment of each major system.


B.

It improves the consistency of the privacy program.


C.

It works at a different type of organization.


D.

It identifies all key stakeholders by name.


Expert Solution
Questions # 67:

Which of the following is NOT an important factor to consider when developing a data retention policy?

Options:

A.

Technology resource.


B.

Business requirement.


C.

Organizational culture.


D.

Compliance requirement


Expert Solution
Questions # 68:

SCENARIO

Please use the following to answer the next QUESTION:

As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.

Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”

You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite, already considering your next steps.

You are charged with making sure that privacy safeguards are in place for new products and initiatives. What is the best way to do this?

Options:

A.

Hold a meeting with stakeholders to create an interdepartmental protocol for new initiatives


B.

Institute Privacy by Design principles and practices across the organization


C.

Develop a plan for introducing privacy protections into the product development stage


D.

Conduct a gap analysis after deployment of new products, then mend any gaps that are revealed


Expert Solution
Questions # 69:

SCENARIO

Please use the following to answer the next QUESTION:

Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy priorities will be, Penny has set up meetings with a number of colleagues to hear about the work that they have been doing and their compliance efforts.

Penny’s colleague in Marketing is excited by the new sales and the company’s plans, but is also concerned that Penny may curtail some of the growth opportunities he has planned. He tells her “I heard someone in the breakroom talking about some new privacy laws but I really don’t think it affects us. We’re just a small company. I mean we just sell accessories online, so what’s the real risk?” He has also told her that he works with a number of small companies that help him get projects completed in a hurry. “We’ve got to meet our deadlines otherwise we lose money. I just sign the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes time that we just don’t have.”

In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken a number of precautions to protect its website from malicious activity, it has not taken the same level of care of its physical files or internal infrastructure. Penny’s colleague in IT has told her that a former employee lost an encrypted USB key with financial data on it when he left. The company nearly lost access to their customer database last year after they fell victim to a phishing attack. Penny is told by her IT colleague that the IT team “didn’t know what to do or who should do what. We hadn’t been trained on it but we’re a small team though, so it worked out OK in the end.” Penny is concerned that these issues will compromise Ace Space’s privacy and data protection.

Penny is aware that the company has solid plans to grow its international sales and will be working closely with the CEO to give the organization a data “shake up”. Her mission is to cultivate a strong privacy culture within the company.

Penny has a meeting with Ace Space’s CEO today and has been asked to give her first impressions and an overview of her next steps.

What information will be LEAST crucial from a privacy perspective in Penny’s review of vendor contracts?

Options:

A.

Audit rights


B.

Liability for a data breach


C.

Pricing for data security protections


D.

The data a vendor will have access to


Expert Solution
Questions # 70:

SCENARIO

Please use the following lo answer the next question:

You are the privacy manager within the privacy office of a National Forest Parks and Recreation Department. While having lunch with a colleague from the IT division, you learn that the IT director has put out a request for proposal (RFP) which calls for a system that collects the personal data of park attendees.

You consult with a few other colleagues in IT and learn that the RFP is worded such that it leaves it to the vendors to demonstrate what information they would collect from people who enter parks anywhere in the country, either in a vehicle or on foot. A partial list of the information collected includes:

• personal identifiers such as name, address, age, gender;

• vehicle registration information:

• facial images of park attendees;

• health information (e.g.. physical disabilities, use of mobility devices)

The stated purpose of the RFP is to:

"Improve the National Forest. Parks, and Recreation Department's ability to track and monitor service usage thereby Increasing the robustness of our customer data and to improve service offerings.''

Companies have already started submitting proposals for software solutions that address these information gathering practices. There is only one week left before the RFP closes.

The IT department has put together an RFP evaluation team but no one from the privacy office has been a Dart of the RFP ud to this point. This occurred deposite the fact….

Which of the following data protection actions has been implemented by the National Forest Parks and Recreation Department?

Options:

A.

Policy creation.


B.

Data minimization.


C.

Sufficient engagement with the privacy team.


D.

Identification of all of the sources, types and uses of personal information

(PI).


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions