Pass the IAPP Certified Information Privacy Professional CIPP-E Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions
Questions # 21:

If a company is planning to use closed-circuit television (CCTV) on its premises and is concerned with GDPR compliance, it should first do all of the following EXCEPT?

Options:

A.

Notify the appropriate data protection authority.


B.

Perform a data protection impact assessment (DPIA).


C.

Create an information retention policy for those who operate the system.


D.

Ensure that safeguards are in place to prevent unauthorized access to the footage.


Expert Solution
Questions # 22:

Which of the following would require designating a data protection officer?

Options:

A.

Processing is carried out by an organization employing 250 persons or more.


B.

Processing is carried out for the purpose of providing for-profit goods or services to individuals in the EU.


C.

The core activities of the controller or processor consist of processing operations of financial information or information relating to children.


D.

The core activities of the controller or processor consist of processing operations that require systematic monitoring of data subjects on a large scale.


Expert Solution
Questions # 23:

In relation to third countries and international organizations, which of the following shall, along with the supervisory authorities, take appropriate steps to develop international cooperation mechanisms for the enforcement of data protection legislation?

Options:

A.

The European Parliament


B.

The Council of the European Union.


C.

The designated Data Protection Officers


D.

The European Commission


Expert Solution
Questions # 24:

SCENARIO

Please use the following to answer the next question:

Due to rapidly expanding workforce, Company A has decided to outsource its payroll function to Company B. Company B is an established payroll service provider with a sizable client base and a solid reputation in the industry.

Company B’s payroll solution for Company A relies on the collection of time and attendance data obtained via a biometric entry system installed in each of Company A’s factories. Company B won’t hold any biometric data itself, but the related data will be uploaded to Company B’s UK servers and used to provide the payroll service. Company B’s live systems will contain the following information for each of Company A’s employees:

    Name

    Address

    Date of Birth

    Payroll number

    National Insurance number

    Sick pay entitlement

    Maternity/paternity pay entitlement

    Holiday entitlement

    Pension and benefits contributions

    Trade union contributions

Jenny is the compliance officer at Company A. She first considers whether Company A needs to carry out a data protection impact assessment in relation to the new time and attendance system, but isn’t sure whether or not this is required.

Jenny does know, however, that under the GDPR there must be a formal written agreement requiring Company B to use the time and attendance data only for the purpose of providing the payroll service, and to apply appropriate technical and organizational security measures for safeguarding the data. Jenny suggests that Company B obtain advice from its data protection officer. The company doesn’t have a DPO but agrees, in the interest of finalizing the contract, to sign up for the provisions in full. Company A enters into the contract.

Weeks later, while still under contract with Company A, Company B embarks upon a separate project meant to enhance the functionality of its payroll service, and engages Company C to help. Company C agrees to extract all personal data from Company B’s live systems in order to create a new database for Company B.

This database will be stored in a test environment hosted on Company C’s U.S. server. The two companies agree not to include any data processing provisions in their services agreement, as data is only being used for IT testing purposes.

Unfortunately, Company C’s U.S. server is only protected by an outdated IT security system, and suffers a cyber security incident soon after Company C begins work on the project. As a result, data relating to Company A’s employees is visible to anyone visiting Company C’s website. Company A is unaware of this until Jenny receives a letter from the supervisory authority in connection with the investigation that ensues. As soon as Jenny is made aware of the breach, she notifies all affected employees.

The GDPR requires sufficient guarantees of a company’s ability to implement adequate technical and organizational measures. What would be the most realistic way that Company B could have fulfilled this requirement?

Options:

A.

Hiring companies whose measures are consistent with recommendations of accrediting bodies.


B.

Requesting advice and technical support from Company A’s IT team.


C.

Avoiding the use of another company’s data to improve their own services.


D.

Vetting companies’ measures with the appropriate supervisory authority.


Expert Solution
Questions # 25:

SCENARIO

Please use the following to answer the next question:

TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company’s outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.’s foundering business.

During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories – age, income, ethnicity – that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website’s traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website’s effectiveness. Oliver enthusiastically engages Techiva for these services.

Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.’s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva’s system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company’s system of access control must be reconsidered.

After Leon has informed his manager, what is Techiva’s legal responsibility as a processor?

Options:

A.

They must report it to TripBliss Inc.


B.

They must conduct a full systems audit.


C.

They must report it to the supervisory authority.


D.

They must inform customers who have used the website.


Expert Solution
Questions # 26:

SCENARIO

Please use the following to answer the next question:

Jane Stan's her new role as a Data Protection Officer (DPO) at a Malta-based company that allows anyone to buy and sell cryptocurrencies via its online platform. The company stores and processes the personal data of its customers in a dedicated data center located m Malta |EU).

People wishing to trade cryptocurrencies are required to open an online account on the platform. They then must successfully pass a KYC due diligence procedure aimed at preventing money laundering and ensuring compliance with applicable financial regulations.

The non-European customers are also required to waive all their GDPR rights by reading a disclaimer written in bold and belong a checkbox on a separate page in order to get their account approved on the platform.

The customers must likewise accept the terms of service of the platform. The terms of service also include a privacy policy section, saying, among other things, that if a

What is potentially wrong with the backup system operated in the AWS cloud?

Options:

A.

The AWS servers are located in the EU but in a country different than the location of the corporate headquarters.


B.

It is unlawful to process any personal data in a cloud unless the cloud is certified as GOPR-compliant by a competent supervisory authority.


C.

The data storage period has to be revised, and a data processing agreement w*h AWS must be signed


D.

AWS is a U S company, and no personal data of European residents may be transferred to it without explicit written consent from data subjects.


Expert Solution
Questions # 27:

Read the following steps:

    Discover which employees are accessing cloud services and from which devices and apps Lock down the data in those apps and devices

    Monitor and analyze the apps and devices for compliance

    Manage application life cycles

    Monitor data sharing

An organization should perform these steps to do which of the following?

Options:

A.

Pursue a GDPR-compliant Privacy by Design process.


B.

Institute a GDPR-compliant employee monitoring process.


C.

Maintain a secure Bring Your Own Device (BYOD) program.


D.

Ensure cloud vendors are complying with internal data use policies.


Expert Solution
Questions # 28:

Under the GDPR, where personal data is not obtained directly from the data subject, a controller is exempt from directly providing information about processing to the data subject if?

Options:

A.

The data subject already has information regarding how his data will be used


B.

The provision of such information to the data subject would be too problematic


C.

Third-party data would be disclosed by providing such information to the data subject


D.

The processing of the data subject’s data is protected by appropriate technical measures


Expert Solution
Questions # 29:

SCENARIO

Please use the following to answer the next question:

TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company’s outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.’s foundering business.

During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories – age, income, ethnicity – that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website’s traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website’s effectiveness. Oliver enthusiastically engages Techiva for these services.

Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.’s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva’s system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company’s system of access control must be reconsidered.

If TripBliss Inc. decides not to report the incident to the supervisory authority, what would be their BEST defense?

Options:

A.

The resulting obligation to notify data subjects would involve disproportionate effort.


B.

The incident resulted from the actions of a third-party that were beyond their control.


C.

The destruction of the stolen data makes any risk to the affected data subjects unlikely.


D.

The sensitivity of the categories of data involved in the incident was not substantial enough.


Expert Solution
Questions # 30:

Which of the following entities would most likely be exempt from complying with the GDPR?

Options:

A.

A South American company that regularly collects European customers’ personal data.


B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.


C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.


D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 21-30 out of questions