Pass the IAPP Certified Information Privacy Professional CIPP-US Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which action is prohibited under the Electronic Communications Privacy Act of 1986?

Options:

A.

Intercepting electronic communications and unauthorized access to stored communications


B.

Monitoring all employee telephone calls


C.

Accessing stored communications with the consent of the sender or recipient of the message


D.

Monitoring employee telephone calls of a personal nature


Expert Solution
Questions # 52:

According to the FTC Report of 2012, what is the main goal of Privacy by Design?

Options:

A.

Obtaining consumer consent when collecting sensitive data for certain purposes


B.

Establishing a system of self-regulatory codes for mobile-related services


C.

Incorporating privacy protections throughout the development process


D.

Implementing a system of standardization for privacy notices


Expert Solution
Questions # 53:

Which jurisdiction must courts have in order to hear a particular case?

Options:

A.

Subject matter jurisdiction and regulatory jurisdiction


B.

Subject matter jurisdiction and professional jurisdiction


C.

Personal jurisdiction and subject matter jurisdiction


D.

Personal jurisdiction and professional jurisdiction


Expert Solution
Questions # 54:

Which of the following is most likely to provide privacy protection to private-sector employees in the United States?

Options:

A.

State law, contract law, and tort law


B.

The Federal Trade Commission Act (FTC Act)


C.

Amendments one, four, and five of the U.S. Constitution


D.

The U.S. Department of Health and Human Services (HHS)


Expert Solution
Questions # 55:

The rules for “e-discovery” mainly prevent which of the following?

Options:

A.

A conflict between business practice and technological safeguards


B.

The loss of information due to poor data retention practices


C.

The practice of employees using personal devices for work


D.

A breach of an organization’s data retention program


Expert Solution
Questions # 56:

In what way is the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act intended to help consumers?

Options:

A.

By providing consumers with free spam-filtering software.


B.

By requiring a company to receive an opt-in before sending any advertising e-mails.


C.

By prohibiting companies from sending objectionable content through unsolicited e-mails.


D.

By requiring companies to allow consumers to opt-out of future e-mails.


Expert Solution
Questions # 57:

Under the Driver’s Privacy Protection Act (DPPA), which of the following parties would require consent of an individual in order to obtain his or her Department of Motor Vehicle information?

Options:

A.

Law enforcement agencies performing investigations.


B.

Insurance companies needing to investigate claims.


C.

Attorneys gathering information related to lawsuits.


D.

Marketers wishing to distribute bulk materials.


Expert Solution
Questions # 58:

The CFO of a pharmaceutical company is duped by a phishing email and discloses many of the company’s employee personnel files to an online predator. The files include employee contact information, job applications, performance reviews, discipline records, and job descriptions.

Which of the following state laws would be an affected employee’s best recourse against the employer?

Options:

A.

The state social security number confidentiality statute.


B.

The state personnel record review statute.


C.

The state data destruction statute.


D.

The state UDAP statute.


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions