Pass the IAPP Certified Information Privacy Professional CIPP-E Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

A company wishes to transfer personal data to a country outside of the European Union/EEA In order to do so, they are planning an assessment of the country's laws and practices, knowing that these may impinge upon the transfer safeguards they intend to use

All of the following factors would be relevant for the company to consider EXCEPT'?

Options:

A.

Any onward transfers, such as transfers of personal data to a sub-processor in the same or another third country.


B.

The process of modernization in the third country concerned and their access to emerging technologies that rely on international transfers of personal data


C.

The technical, financial, and staff resources available to an authority m the third country concerned that may access the personal data to be transferred


D.

The contractual clauses between the data controller or processor established in the European Union/EEA and the recipient of the transfer established in the third country concerned


Expert Solution
Questions # 42:

SCENARIO

Please use the following to answer the next question:

Liem, an online retailer known for its environmentally friendly shoes, has recently expanded its presence in Europe. Anxious to achieve market dominance, Liem teamed up with another eco friendly company, EcoMick, which sells accessories like belts and bags. Together the companies drew up a series of marketing campaigns designed to highlight the environmental and economic benefits of their products. After months of planning, Liem and EcoMick entered into a data sharing agreement to use the same marketing database, MarketIQ, to send the campaigns to their respective contacts.

Liem and EcoMick also entered into a data processing agreement with MarketIQ, the terms of which included processing personal data only upon Liem and EcoMick’s instructions, and making available to them all information necessary to demonstrate compliance with GDPR obligations.

Liem and EcoMick then procured the services of a company called JaphSoft, a marketing optimization firm that uses machine learning to help companies run successful campaigns. Clients provide JaphSoft with the personal data of individuals they would like to be targeted in each campaign. To ensure protection of its

clients’ data, JaphSoft implements the technical and organizational measures it deems appropriate. JaphSoft works to continually improve its machine learning models by analyzing the data it receives from its clients to determine the most successful components of a successful campaign. JaphSoft then uses such models in providing services to its client-base. Since the models improve only over a period of time as more information is collected, JaphSoft does not have a deletion process for the data it receives from clients. However, to ensure compliance with data privacy rules, JaphSoft pseudonymizes the personal data by removing identifying

information from the contact information. JaphSoft’s engineers, however, maintain all contact information in the same database as the identifying information.

Under its agreement with Liem and EcoMick, JaphSoft received access to MarketIQ, which included contact information as well as prior purchase history for such contacts, to create campaigns that would result in the most views of the two companies’ websites. A prior Liem customer, Ms. Iman, received a marketing campaign from JaphSoft regarding Liem’s as well as EcoMick’s latest products. While Ms. Iman recalls checking a box to receive information in the future regarding Liem’s products, she has never shopped EcoMick, nor provided her personal data to that company.

JaphSoft’s use of pseudonymization is NOT in compliance with the CDPR because?

Options:

A.

JaphSoft failed to first anonymize the personal data.


B.

JaphSoft pseudonymized all the data instead of deleting what it no longer needed.


C.

JaphSoft was in possession of information that could be used to identify data subjects.


D.

JaphSoft failed to keep personally identifiable information in a separate database.


Expert Solution
Questions # 43:

SCENARIO

Please use the following to answer the next question:

BHealthy, a company based in Italy, is ready to launch a new line of natural products, with a focus on sunscreen. The last step prior to product launch is for BHealthy to conduct research to decide how extensively to market its new line of sunscreens across Europe. To do so, BHealthy teamed up with Natural Insight, a company specializing in determining pricing for natural products. BHealthy decided to share its existing customer information – name, location, and prior purchase history – with Natural Insight. Natural Insight intends to use this information to train its algorithm to help determine the price point at which BHealthy can sell its new sunscreens.

Prior to sharing its customer list, BHealthy conducted a review of Natural Insight’s security practices and concluded that the company has sufficient security measures to protect the contact information. Additionally, BHealthy’s data processing contractual terms with Natural Insight require continued implementation of technical and organization measures. Also indicated in the contract are restrictions on use of the data provided by BHealthy for any purpose beyond provision of the services, which include use of the data for continued improvement of Natural Insight’s machine learning algorithms.

Under the GDPR, what are Natural Insight’s security obligations with respect to the customer information it received from BHealthy?

Options:

A.

Appropriate security that takes into account the industry practices for protecting customer contact information and purchase history.


B.

Only the security measures assessed by BHealthy prior to entering into the data processing contract.


C.

Absolute security since BHealthy is sharing personal data, including purchase history, with Natural Insight.


D.

The level of security that a reasonable data subject whose data is processed would expect in relation to the data subject’s purchase history.


Expert Solution
Questions # 44:

To comply with the GDPR and the EU Court of Justice's decision in Schrems II, the European Commission issued what are commonly referred to as the new standard contractual clauses (SCCs). As a result, businesses must do all of the following EXCEPT?

Options:

A.

Consider the new optional docking clause, which expressly permits adding new parties to the SCCs.


B.

Migrate all contracts entered into before September 27, 2021, that use the old SCCs to the new SCCs by December 27, 2022.


C.

Take steps to flow down the new SCCs to relevant parts of their supply chain using the new SCCs as of September 27, 2021, if the business is a data importer.


D.

Implement the new SCCs in the U.K. following Brexit, as the U.K. Information Commissioner's Office does not have the authority to publish its own set of SCCs.


Expert Solution
Questions # 45:

SCENARIO

Please use the following to answer the next question:

Why was Jackie correct in not completing a transfer impact assessment for HRYourWay?

Options:

A.

HRYourWay was ultimately not selected


B.

HRYourWay is not located in a third country.


C.

ProStorage will obtain consent for all transfers.


D.

ProStorage can rely on its Binding Corporate Rules


Expert Solution
Questions # 46:

A U.S. company’s website sells widgets. Which of the following factors would NOT in itself subject the company to the GDPR?

Options:

A.

The widgets are offered in EU and priced in euro.


B.

The website is in English and French, and is accessible in France.


C.

An affiliate office is located in France but the processing is in the U.S.


D.

The website places cookies to monitor the EU website user behavior.


Expert Solution
Questions # 47:

What was the aim of the European Data Protection Directive 95/46/EC?

Options:

A.

To harmonize the implementation of the European Convention of Human Rights across all member states.


B.

To implement the OECD Guidelines on the Protection of Privacy and trans-border flows of Personal Data.


C.

To completely prevent the transfer of personal data out of the European Union.


D.

To further reconcile the protection of the fundamental rights of individuals with the free flow of data from one member state to another.


Expert Solution
Questions # 48:

What was the main failing of Convention 108 that led to the creation of the Data Protection Directive (Directive 95/46/EC)?

Options:

A.

IT did not account for the rapid growth of the Internet


B.

It did not include protections for sensitive personal data


C.

It was implemented in a fragmented manner by a small number of states.


D.

Its penalties for violations of data protection rights were widely viewed as r sufficient.


Expert Solution
Questions # 49:

With respect to international transfers of personal data, the European Data Protection Board (EDPB) confirmed that derogations may be relied upon under what condition?

Options:

A.

If the data controller has received preapproval from a Data Protection Authority (DPA), after submitting the appropriate documents.


B.

When it has been determined that adequate protection can be performed.


C.

Only if the Data Protection Impact Assessment (DPIA) shows low risk.


D.

Only as a last resort and when interpreted restrictively.


Expert Solution
Questions # 50:

SCENARIO

Please use the following to answer the next question:

You have just been hired by a toy manufacturer based in Hong Kong. The company sells a broad range of dolls, action figures and plush toys that can be found internationally in a wide variety of retail stores. Although the manufacturer has no offices outside Hong Kong and in fact does not employ any staff outside Hong Kong, it has entered into a number of local distribution contracts. The toys produced by the company can be found in all popular toy stores throughout Europe, the United States and Asia. A large portion of the company’s

revenue is due to international sales.

The company now wishes to launch a new range of connected toys, ones that can talk and interact with children. The CEO of the company is touting these toys as the next big thing, due to the increased possibilities offered: The figures can answer children’s Questions: on various subjects, such as mathematical calculations or the weather. Each figure is equipped with a microphone and speaker and can connect to any smartphone or tablet via Bluetooth. Any mobile device within a 10-meter radius can connect to the toys via Bluetooth as well. The figures can also be associated with other figures (from the same manufacturer) and interact with each other for an enhanced play experience.

When a child asks the toy a QUESTION, the request is sent to the cloud for analysis, and the answer is generated on cloud servers and sent back to the figure. The answer is given through the figure’s integrated

speakers, making it appear as though that the toy is actually responding to the child’s QUESTION. The packaging of the toy does not provide technical details on how this works, nor does it mention that this feature requires an internet connection. The necessary data processing for this has been outsourced to a data center located in South Africa. However, your company has not yet revised its consumer-facing privacy policy to indicate this.

In parallel, the company is planning to introduce a new range of game systems through which consumers can play the characters they acquire in the course of playing the game. The system will come bundled with a portal that includes a Near-Field Communications (NFC) reader. This device will read an RFID tag in the action figure, making the figure come to life onscreen. Each character has its own stock features and abilities, but it is also possible to earn additional ones by accomplishing game goals. The only information stored in the tag relates to the figures’ abilities. It is easy to switch characters during the game, and it is possible to bring the figure to locations outside of the home and have the character’s abilities remain intact.

In light of the requirements of Article 32 of the GDPR (related to the Security of Processing), which practice should the company institute?

Options:

A.

Encrypt the data in transit over the wireless Bluetooth connection.


B.

Include dual-factor authentication before each use by a child in order to ensure a minimum amount of security.


C.

Include three-factor authentication before each use by a child in order to ensure the best level of security possible.


D.

Insert contractual clauses into the contract between the toy manufacturer and the cloud service provider, since South Africa is outside the European Union.


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions