Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

Integrating privacy requirements into functional areas across the organization happens at which stage of the privacy operational life cycle?

Options:

A.

Assessing data.


B.

Protecting personal data.


C.

Sustaining program performance.


D.

Responding to requests and incidents.


Expert Solution
Questions # 72:

SCENARIO

Please use the following lo answer the next question:

The board risk committee of your organization is particularly concerned not only by the number and frequency of data breaches reported to it over the past 12 months, but also the inconsistency in responses and poor incident response turnaround times.

Upon reviewing the current incident response plan (IRP), it was discovered that while the business continuity plan (BCP> had been updated on time, the IRP, linked to BCP. was last updated over three years ago.

The board risk committee has noted this as high risk especially since company policy is to review and update policies and plans annually. Consequently, the newly appointed data protection officer (DPO) was requested to provide a paper on how she would remediate the situation.

As a seasoned data privacy professional, you have been requested to assist the new DPO.

Your first recommendation in addressing the board risk committee's concerns is to?

Options:

A.

Integrate the IRP into the BCP so it is not a stand-alone document.


B.

Conduct a table-top exercise based on the version of the IRP that is currently on record.


C.

Focus on training and awareness sessions in order to familiarize relevant staff with current policies and procedures.


D.

Update the IRP with the applicable emergency contact information, policies and procedures, as well as timelines and action steps.


Expert Solution
Questions # 73:

What is one obligation that the General Data Protection Regulation (GDPR) imposes on data processors?

Options:

A.

To honor all data access requests from data subjects.


B.

To inform data subjects about the identity and contact details of the controller.


C.

To implement appropriate technical and organizational measures that ensure an appropriate level of security.


D.

To carry out data protection impact assessments in cases where processing is likely to result in high risk to the rights and freedoms of individuals.


Expert Solution
Questions # 74:

SCENARIO

Please use the following to answer the next question

You were recently hired by InStyte Date Corp as a privacy manager to help InStyle Data Corp become compliant with a new data protection law

The law mandates that businesses have reasonable and appropriate security measures in place to protect personal data. Violations of that mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don t comply with the new law

You are paved with a security manager and tasked with reviewing InStyle Data Corp s current state and advising the business how it can meet the "reasonable and appropriate security" requirement InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data mapping InStyte Data Corp has also developed security-related policies ad hoc and many have never been implemented The various teams involved in the creation and testing of InStyle Data Corp s products experience significant turnover and do not have well defined roles There's little documentation addressing what personal data is processed by which product and for what purpose

Work needs to begin on this project immediately so that InStyle Data Corp can become compliant by the time the law goes into effect. You and you partner discover that InStyle Data Corp regularly sends files containing sensitive personal data back to its customers through email sometimes using InStyle Data Corp employees personal email accounts. You also team that InStyle Data Corp s privacy and information security teams are not informed of new personal data flows, new products developed by InStyte Data Corp that process personal data, or updates to existing InStyle Data Corp products that may change what or how the personal data is processed until after the product or update has gone have.

Through a review of InStyle Date Corp’s test and development environment logs, you discover InStyle Data Corp sometimes gives login credentials to any InStyle Data Corp employee or contractor who requests them. The test environment only contains dummy data but the development environment contains personal data including Social Security Numbers, hearth ^formation and financial information All credentialed InStyle Data Corp employees and contractors have the ability to after and delete personal data in both environments regardless of their role or what project they are working on.

You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to measure implementation InStyle Data Corp implements all of the recommended security controls You review the processes roles, controls and measures taken to appropriately protect the personal data at every stop However, you realize there is no plan for monitoring and nothing in place addressing sanctions for violations of the updated policies and procedures InStyle Data Corp pushes back, stating they do not have the resources for such monitoring.

What aspect of the data management life cycle will still be unaddressed it you cannot find the resources to become compliant?

Options:

A.

Auditability.


B.

Enforcement


C.

Irretrievability


D.

Access management


Expert Solution
Questions # 75:

If an organization maintains a separate ethics office, to whom would its officer typically report to in order to retain the greatest degree of independence?

Options:

A.

The Board of Directors.


B.

The Chief Financial Officer.


C.

The Human Resources Director.


D.

The organization's General Counsel.


Expert Solution
Questions # 76:

SCENARIO

Please use the following to answer the next QUESTION:

As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically Questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.

Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”

You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite, already considering your next steps.

The company has achieved a level of privacy protection that established new best practices for the industry. What is a logical next step to help ensure a high level of protection?

Options:

A.

Brainstorm methods for developing an enhanced privacy framework


B.

Develop a strong marketing strategy to communicate the company’s privacy practices


C.

Focus on improving the incident response plan in preparation for any breaks in protection


D.

Shift attention to privacy for emerging technologies as the company begins to use them


Expert Solution
Questions # 77:

Which most accurately describes the reasons an organization will conduct a PIA?

Options:

A.

To assess an organization's compliance with applicable laws, regulations, standards, and internal procedures.


B.

To establish an inventory of its data processing activities in compliance with Article 30 of the GDPR.


C.

To identify and reduce the privacy risks to individuals at the commencement of a project.


D.

To analyze the impact of an incident response and determine next steps.


Expert Solution
Questions # 78:

What should be the first major goal of a company developing a new privacy program?

Options:

A.

To survey potential funding sources for privacy team resources.


B.

To schedule conversations with executives of affected departments.


C.

To identify potential third-party processors of the organization's information.


D.

To create Data Lifecycle Management policies and procedures to limit data collection.


Expert Solution
Questions # 79:

Which of the following best demonstrates the effectiveness of a firm’s privacy incident response process?

Options:

A.

The decrease of security breaches


B.

The decrease of notifiable breaches


C.

The increase of privacy incidents reported by users


D.

The decrease of mean time to resolve privacy incidents


Expert Solution
Questions # 80:

Which of the documents below assists the Privacy Manager in identifying and responding to a request from an individual about what personal information the organization holds about then with whom the information is shared?

Options:

A.

Risk register


B.

Privacy policy


C.

Records retention schedule


D.

Personal information inventory


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions