Pass the IAPP Certified Information Privacy Professional CIPP-US Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which entity within the Department of Health and Human Services (HHS) is the primary enforcer of the Health Insurance Portability and Accountability Act (HIPAA) “Privacy Rule”?

Options:

A.

Office for Civil Rights.


B.

Office of Social Services.


C.

Office of Inspector General.


D.

Office of Public Health and Safety.


Expert Solution
Questions # 42:

Which of the following is an example of federal preemption?

Options:

A.

The Payment Card Industry’s (PCI) ability to self-regulate and enforce data security standards for payment card data.


B.

The U.S. Federal Trade Commission’s (FTC) ability to enforce against unfair and deceptive trade practices across sectors and industries.


C.

The California Consumer Privacy Act (CCPA) regulating businesses that have no physical brick-and-mortal presence in California, but which do business there.


D.

The U.S. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act prohibiting states from passing laws that impose greater obligations on senders of email marketing.


Expert Solution
Questions # 43:

The Video Privacy Protection Act of 1988 restricted which of the following?

Options:

A.

Which purchase records of audio visual materials may be disclosed


B.

When downloading of copyrighted audio visual materials is allowed


C.

When a user’s viewing of online video content can be monitored


D.

Who advertisements for videos and video games may target


Expert Solution
Questions # 44:

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

Based on the incident, the FTC’s enforcement actions against the marketer would most likely include what violation?

Options:

A.

Intruding upon the privacy of a family with young children.


B.

Collecting information from a child under the age of thirteen.


C.

Failing to notify of a breach of children’s private information.


D.

Disregarding the privacy policy of the children’s marketing industry.


Expert Solution
Questions # 45:

What information did the Red Flag Program Clarification Act of 2010 add to the original Red Flags rule?

Options:

A.

The most common methods of identity theft.


B.

The definition of what constitutes a creditor.


C.

The process for proper disposal of sensitive data.


D.

The components of an identity theft detection program.


Expert Solution
Questions # 46:

What privacy concept grants a consumer the right to view and correct errors on his or her credit report?

Options:

A.

Access.


B.

Notice.


C.

Action.


D.

Choice.


Expert Solution
Questions # 47:

Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?

Options:

A.

They prescribe working environments that are safe and comfortable.


B.

They limit the amount of time a potential employee can be interviewed.


C.

They promote a workforce of employees with diverse skills and interests.


D.

They limit the types of information that employers can collect about employees.


Expert Solution
Questions # 48:

SCENARIO

Please use the following to answer the next QUESTION

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.

Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able

to gain access to Filtration Station’s network and was able to steal data relating to employees in the company’s Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.

The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.

The Board has asked Otto whether the company will need to comply with the new California Consumer Privacy Law (CCPA). What should Otto tell the Board?

Options:

A.

That CCPA will apply to the company only after the California Attorney General determines that it will enforce the statute.


B.

That the company is governed by CCPA, but does not need to take any additional steps because it follows CPBR.


C.

That business contact information could be considered personal information governed by CCPA.


D.

That CCPA only applies to companies based in California, which exempts the company from compliance.


Expert Solution
Questions # 49:

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

At this stage of the investigation, what should the data privacy leader review first?

Options:

A.

Available data flow diagrams


B.

The text of the original complaint


C.

The company’s data privacy policies


D.

Prevailing regulation on this subject


Expert Solution
Questions # 50:

Which power was NOT granted to the California Privacy Protection Agency by the California Privacy Rights Act (CPRA)?

Options:

A.

Adopting and updating CCPA regulations


B.

Investigating possible violations of the CCPA on the agency's own initiative.


C.

Overriding decisions of the Attorney General regarding CCPA enforcement


D.

Imposing administrative fines for violations of the CCPA


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions