Pass the IAPP Certified Information Privacy Professional CIPP-E Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions
Questions # 71:

Since blockchain transactions are classified as pseudonymous, are they considered to be within the material scope of the GDPR, or outside of it?

Options:

A.

Outside the material scope of the GDPR, because transactions do not include personal data about data subjects in the European Union.


B.

Outside the material scope of the GDPR, because transactions are for personal or household purposes.


C.

Within the material scope of the GDPR to the extent that transactions include data subjects in the European Union.


D.

Within the material scope of the GDPR but outside of the territorial scope, because blockchains are decentralized.


Expert Solution
Questions # 72:

Which aspect of processing does the GDPR allow processors to determine for themselves?

Options:

A.

The question of whether the controller needs to be informed about the substitution of another processor carrying out specific processing activities on behalf of the controller.


B.

Their own purposes for the processing, if such purposes are compatible with those for which the personal data were initially collected.


C.

The parameters of their marketing campaigns using personal data relating to the controller's customers.


D.

Their own type of hardware or software and the specific security measures for the processing.


Expert Solution
Questions # 73:

When is data sharing agreement MOST likely to be needed?

Options:

A.

When anonymized data is being shared.


B.

When personal data is being shared between commercial organizations acting as joint data controllers.


C.

When personal data is being proactively shared by a controller to support a police investigation.


D.

When personal data is being shared with a public authority with powers to require the personal data to be disclosed.


Expert Solution
Questions # 74:

Tanya is the Data Protection Officer for Curtains Inc., a GDPR data controller. She has recommended that the company encrypt all personal data at rest. Which GDPR principle is she following?

Options:

A.

Accuracy


B.

Storage Limitation


C.

Integrity and confidentiality


D.

Lawfulness, fairness and transparency


Expert Solution
Questions # 75:

In which scenario is a Controller most likely required to undertake a Data Protection Impact Assessment?

Options:

A.

When the controller is collecting email addresses from individuals via an online registration form for marketing purposes.


B.

When personal data is being collected and combined with other personal data to profile the creditworthiness of individuals.


C.

When the controller is required to have a Data Protection Officer.


D.

When personal data is being transferred outside of the EEA.


Expert Solution
Questions # 76:

SCENARIO

Please use the following to answer the next question:

Anna and Frank both work at Granchester University. Anna is a lawyer responsible for data protection, while Frank is a lecturer in the engineering department. The University maintains a number of types of records:

    Student records, including names, student numbers, home addresses, pre-university information, university attendance and performance records, details of special educational needs and financial information.

    Staff records, including autobiographical materials (such as curricula, professional contact files, student evaluations and other relevant teaching files).

    Alumni records, including birthplaces, years of birth, dates of matriculation and conferrals of degrees. These records are available to former students after registering through Granchester’s Alumni portal. Department for Education records, showing how certain demographic groups (such as first-generation students) could be expected, on average, to progress. These records do not contain names or identification numbers.

    Under their security policy, the University encrypts all of its personal data records in transit and at rest.

In order to improve his teaching, Frank wants to investigate how his engineering students perform in relational to Department for Education expectations. He has attended one of Anna’s data protection training courses and knows that he should use no more personal data than necessary to accomplish his goal. He creates a

program that will only export some student data: previous schools attended, grades originally obtained, grades currently obtained and first time university attended. He wants to keep the records at the individual student level. Mindful of Anna’s training, Frank runs the student numbers through an algorithm to transform them into different reference numbers. He uses the same algorithm on each occasion so that he can update each record over time.

One of Anna’s tasks is to complete the record of processing activities, as required by the GDPR. After receiving her email reminder, as required by the GDPR. After receiving her email reminder, Frank informs Anna about his performance database.

Ann explains to Frank that, as well as minimizing personal data, the University has to check that this new use of existing data is permissible. She also suspects that, under the GDPR, a risk analysis may have to be carried out before the data processing can take place. Anna arranges to discuss this further with Frank after she has

done some additional research.

Frank wants to be able to work on his analysis in his spare time, so he transfers it to his home laptop (which is not encrypted). Unfortunately, when Frank takes the laptop into the University he loses it on the train. Frank has to see Anna that day to discuss compatible processing. He knows that he needs to report security incidents, so he decides to tell Anna about his lost laptop at the same time.

Anna will find that a risk analysis is NOT necessary in this situation as long as?

Options:

A.

The data subjects are no longer current students of Frank’s


B.

The processing will not negatively affect the rights of the data subjects


C.

The algorithms that Frank uses for the processing are technologically sound


D.

The data subjects gave their unambiguous consent for the original processing


Expert Solution
Questions # 77:

Under the Data Protection Law Enforcement Directive of the EU, a government can carry out covert investigations involving personal data, as long it is set forth by law and constitutes a measure that is both necessary and what?

Options:

A.

Prudent.


B.

Important.


C.

Proportionate.


D.

DPA-approved.


Expert Solution
Questions # 78:

Which of the following was the first legally binding international instrument in the area of data protection?

Options:

A.

Convention 108.


B.

General Data Protection Regulation.


C.

Universal Declaration of Human Rights.


D.

EU Directive on Privacy and Electronic Communications.


Expert Solution
Questions # 79:

Which of the following is NOT exempt from the material scope of the GDPR. insofar as the processing of personal data is concerned?

Options:

A.

A natural person in the course of a large-scale but purely personal or household activity.


B.

A natural person processing data foe a small-scale, purely personal or household activity.


C.

A natural person in the course of processing purely personal or household data on behalf of a spouse who is beyond the age of majority.


D.

A natural person in the course of activity conducted purely tor a personally-owned sole proprietorship.


Expert Solution
Questions # 80:

SCENARIO

Please use the following to answer the next question:

Liem, an online retailer known for its environmentally friendly shoes, has recently expanded its presence in Europe. Anxious to achieve market dominance, Liem teamed up with another eco friendly company, EcoMick, which sells accessories like belts and bags. Together the companies drew up a series of marketing campaigns designed to highlight the environmental and economic benefits of their products. After months of planning, Liem and EcoMick entered into a data sharing agreement to use the same marketing database, MarketIQ, to send the campaigns to their respective contacts.

Liem and EcoMick also entered into a data processing agreement with MarketIQ, the terms of which included processing personal data only upon Liem and EcoMick’s instructions, and making available to them all information necessary to demonstrate compliance with GDPR obligations.

Liem and EcoMick then procured the services of a company called JaphSoft, a marketing optimization firm that uses machine learning to help companies run successful campaigns. Clients provide JaphSoft with the personal data of individuals they would like to be targeted in each campaign. To ensure protection of its

clients’ data, JaphSoft implements the technical and organizational measures it deems appropriate. JaphSoft works to continually improve its machine learning models by analyzing the data it receives from its clients to determine the most successful components of a successful campaign. JaphSoft then uses such models in providing services to its client-base. Since the models improve only over a period of time as more information

is collected, JaphSoft does not have a deletion process for the data it receives from clients. However, to ensure compliance with data privacy rules, JaphSoft pseudonymizes the personal data by removing identifying

information from the contact information. JaphSoft’s engineers, however, maintain all contact information in the same database as the identifying information.

Under its agreement with Liem and EcoMick, JaphSoft received access to MarketIQ, which included contact information as well as prior purchase history for such contacts, to create campaigns that would result in the most views of the two companies’ websites. A prior Liem customer, Ms. Iman, received a marketing campaign from JaphSoft regarding Liem’s as well as EcoMick’s latest products. While Ms. Iman recalls checking a box to receive information in the future regarding Liem’s products, she has never shopped EcoMick, nor provided her personal data to that company.

For what reason would JaphSoft be considered a controller under the GDPR?

Options:

A.

It determines how long to retain the personal data collected.


B.

It has been provided access to personal data in the MarketIQ database.


C.

It uses personal data to improve its products and services for its client-base through machine learning.


D.

It makes decisions regarding the technical and organizational measures necessary to protect the personal data.


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 71-80 out of questions