CIPM Exam - Page 5 - ExamTopics
CIPM Exam - Page 5 - ExamTopics
SCENARIO -
You were recently hired by InStyle Data Corp. as a privacy manager to help InStyle Data Corp. became compliant with a new data protection law.
The law mandates that businesses have reasonable and appropriate security measures in place to protect personal data. Violations of that
mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don't comply with the new law.
You are paired with a security manager and tasked with reviewing InStyle Data Corp.'s current state and advising the business how it can meet the
“reasonable and appropriate security’ requirement. InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data
mapping. InStyle Data Corp. has also developed security-related policies ad hoc and many have never been implemented. The various teams
involved in the creation and testing of InStyle Data Corp.'s products experience significant turnover and do not have well defined roles. There's
little documentation addressing what personal data is processed by which product and for what purpose.
Work needs to begin on this project immediately so that InStyle Data Corp. can become compliant by the time the law goes into effect. You and
your partner discover that InStyle Data Corp. regularly sends files containing sensitive personal data back to its customers, through email,
sometimes using InStyle Data Corp employees personal email accounts. You also learn that InStyle Data Corp.'s privacy and information security
teams are not informed of new personal data flows, new products developed by InStyle Data Corp. that process personal data, or updates to
existing InStyle Data Corp. products that may change what or how the personal data is processed until after the product or update has gone live.
Through a review of InStyle Data Corp’ test and development environment logs, you discover InStyle Data Corp. sometimes gives login credentials
to any InStyle Data Corp. employee or contractor who requests them. The test environment only contains dummy data, but the development
environment contains personal data, including Social Security Numbers, health information, and financial information. All credentialed InStyle
Data Corp. employees and contractors have the ability to alter and delete personal data in both environments regardless of their role or what
You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to
measure implementation. InStyle Data Corp. implements all of the recommended security controls. You review the processes, roles, controls, and
measures taken to appropriately protect the personal data at every step. However, you realize there is no plan for monitoring and nothing in place
addressing sanctions for violations of the updated policies and procedures. InStyle Data Corp. pushes back, stating they do not have the
In order to mitigate the risk of new data flows, products, or updates that cause InStyle Data Corp. to be noncompliant with the new law you should
establish?
A. A process whereby privacy and security would be consulted right before the do-live date for the new data flows, products, or updates.
B. Best practices that require employees to sign an attestation that they understand the sensitivity of new data flows, products, or updates.
C. Access controls based on need-to-know basis for InStyle Data Corp. employees so that not everyone has access to personal data in data
D. Requirements for a Privacy Impact Assessment (PIA) / Data Privacy Impact Assessment (DPIA) as part of the business’ standard process
Correct Answer: D
The least useful metric for optimizing the design of your data subject request workflow is tracking the number of data subjects who?
Correct Answer: A
During a merger and acquisition, the most comprehensive review of privacy risks and gaps occurs when conducting what activity?
D. Integration.
Correct Answer: C
When vetting third-party processors of data protected by the General Data Protection Regulation (GDPR), why is it important to know the physical
D. To ensure the country has adequate protection or if safeguards are required. Most Voted
Correct Answer: D
Which of the following conditions will definitely trigger a Data Protection Impact Assessment (DPIA)?
C. When a new system is deployed to track an individual’s location or behavior. Most Voted
Correct Answer: C
Which of the following information must be provided by the data controller when complying with the General Data Protection Regulation (GDPR)
Correct Answer: A
Post-liquidation, a company that has acquired assets would require separate consent from a data subject if personally identifiable data were being
Correct Answer: B
Question #208 Topic 1
Correct Answer: C
A “right to erasure” request could be rejected if the processing of personal data is for?
Correct Answer: B
A marketing team regularly exports spreadsheets to use for analysis including customer name, birthdate and home address. These spreadsheets
are routinely shared between members of various teams via email even with employees that do not need such granular data.
A. Set up security measures in the company’s email client to prevent spreadsheets with customer information to accidentally being sent to
external recipients.
B. Anonymize exportable data by creating categories of information, like age range and geographic region. Most Voted
C. Allow the free exchange of information to continue but require spreadsheets be password protected.
D. Allow only certain users to export customer data from the database.
Correct Answer: B
The best way to help ensure that reasonable and appropriate security measures are in place to protect personal data is to establish?
A. A stricter credentialling process so that only employees, and not contractors, have access to sensitive personal data.
B. A privilege management process so that only certain employees or contractors have the ability to alter or delete personal data. Most Voted
C. A physical security policy that prohibits contractors from bringing personal devices into any environment, but permits employees to do so.
D. A quarterly audit of both the test and development environments to validate alterations or deletions of any data by employees and
contractors.
Correct Answer: B
As the Data Protection Officer (DPO) for the growing company, Vision 3468, what would be the most cost effective way to monitor changes in laws
and regulations?
Correct Answer: D
A. A mid-level manager within the business is responsible for accepting privacy risks.
B. Privacy governance across the organization is mostly managed by one team or person.
D. A Chief Privacy Officer (CPO) sets privacy program priorities with input from privacy champions from relevant areas of the business.
Most Voted
Correct Answer: C
SCENARIO -
Liam is the newly appointed IT Compliance Manager at Mesa, a US-based outdoor clothing brand with a global E-commerce presence. During his
second week, he is contacted by the company's IT Audit Manager, who informs him that the auditing team will be conducting a review of Mesa's
A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to privacy compliance before leaving the company.
Liam is told that a consent management tool had been added to the website and they commissioned a privacy risk evaluation from a small
consulting firm last year that determined that their risk exposure was relatively low given their current control environment. After reading the
consultant's report, Liam realized that the scope of the assessment was limited to breach notification laws in the US and the Payment Card
Not wanting to let down his new team, Liam kept his concerns about the report to himself and figured he could try to put some additional controls
into place before the audit. Having some privacy compliance experience in his last role, Liam thought he might start by having discussions with
The E-commerce Director informed him that they were still using the cookie consent tool forcibly placed on the home screen by the CIO, but could
not understand the point since their office was not located in California or Europe. The Marketing Director touted his department's success with
purchasing email lists and taking a shotgun approach to direct marketing. Both Directors highlighted their tracking tools on the website to
enhance customer experience while learning more about where else the customer had shopped. The more people Liam met with, the more it
became apparent that privacy awareness and the general control environment at Mesa needed help.
With three weeks before the audit, Liam updated Mesa’s Privacy Notice himself, which was taken and revised from a competitor's website. He also
wrote policies and procedures outlining the roles and responsibilities for privacy within Mesa and distributed the document to all departments he
During this time, Liam also filled the backlog of data subject requests for deletion that had been sent to him by the Customer Service Manager.
Liam worked with application owners to remove these individual's information and order history from the Customer Relationship Management
(CRM) tool, the Enterprise Resource Planning (ERP), the data warehouse, and the email server.
At the audit kick-off meeting, Liam explained to his boss and her team that there may still be some room for improvement, but he thought the risk
had been mitigated to an appropriate level based on the work he had done thus far.
After the audit had been completed, the Audit Manager and Liam met to discuss her team's findings, and much to his dismay, Liam was told that
none of the work he had completed prior to the audit followed best practices for governance and risk mitigation. In fact, his actions only opened
the company up to additional risk and scrutiny. Based on these findings, Liam worked with external counsel and an established privacy consultant
What maturity level should the internal audit assign to Mesa’s privacy policies and procedures if they use the Privacy Maturity Model (PMM)?
B. Defined.
C. Managed.
D. Repeatable.
Correct Answer: A
SCENARIO -
Liam is the newly appointed IT Compliance Manager at Mesa, a US-based outdoor clothing brand with a global E-commerce presence. During his
second week, he is contacted by the company's IT Audit Manager, who informs him that the auditing team will be conducting a review of Mesa's
A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to privacy compliance before leaving the company.
Liam is told that a consent management tool had been added to the website and they commissioned a privacy risk evaluation from a small
consulting firm last year that determined that their risk exposure was relatively low given their current control environment. After reading the
consultant's report, Liam realized that the scope of the assessment was limited to breach notification laws in the US and the Payment Card
Not wanting to let down his new team, Liam kept his concerns about the report to himself and figured he could try to put some additional controls
into place before the audit. Having some privacy compliance experience in his last role, Liam thought he might start by having discussions with
The E-commerce Director informed him that they were still using the cookie consent tool forcibly placed on the home screen by the CIO, but could
not understand the point since their office was not located in California or Europe. The Marketing Director touted his department's success with
purchasing email lists and taking a shotgun approach to direct marketing. Both Directors highlighted their tracking tools on the website to
enhance customer experience while learning more about where else the customer had shopped. The more people Liam met with, the more it
became apparent that privacy awareness and the general control environment at Mesa needed help.
With three weeks before the audit, Liam updated Mesa’s Privacy Notice himself, which was taken and revised from a competitor's website. He also
wrote policies and procedures outlining the roles and responsibilities for privacy within Mesa and distributed the document to all departments he
During this time, Liam also filled the backlog of data subject requests for deletion that had been sent to him by the Customer Service Manager.
Liam worked with application owners to remove these individual's information and order history from the Customer Relationship Management
(CRM) tool, the Enterprise Resource Planning (ERP), the data warehouse, and the email server.
At the audit kick-off meeting, Liam explained to his boss and her team that there may still be some room for improvement, but he thought the risk
had been mitigated to an appropriate level based on the work he had done thus far.
After the audit had been completed, the Audit Manager and Liam met to discuss her team's findings, and much to his dismay, Liam was told that
none of the work he had completed prior to the audit followed best practices for governance and risk mitigation. In fact, his actions only opened
the company up to additional risk and scrutiny. Based on these findings, Liam worked with external counsel and an established privacy consultant
What key error related to program governance did Liam make prior to the audit kick-off meeting?
C. He did not obtain approval of the newly written policies from senior management.
D. He did not properly escalate his concerns around the scope of the previous privacy review and develop a remediation plan with leadership
Correct Answer: D
SCENARIO -
Liam is the newly appointed IT Compliance Manager at Mesa, a US-based outdoor clothing brand with a global E-commerce presence. During his
second week, he is contacted by the company's IT Audit Manager, who informs him that the auditing team will be conducting a review of Mesa's
A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to privacy compliance before leaving the company.
Liam is told that a consent management tool had been added to the website and they commissioned a privacy risk evaluation from a small
consulting firm last year that determined that their risk exposure was relatively low given their current control environment. After reading the
consultant's report, Liam realized that the scope of the assessment was limited to breach notification laws in the US and the Payment Card
Not wanting to let down his new team, Liam kept his concerns about the report to himself and figured he could try to put some additional controls
into place before the audit. Having some privacy compliance experience in his last role, Liam thought he might start by having discussions with
The E-commerce Director informed him that they were still using the cookie consent tool forcibly placed on the home screen by the CIO, but could
not understand the point since their office was not located in California or Europe. The Marketing Director touted his department's success with
purchasing email lists and taking a shotgun approach to direct marketing. Both Directors highlighted their tracking tools on the website to
enhance customer experience while learning more about where else the customer had shopped. The more people Liam met with, the more it
became apparent that privacy awareness and the general control environment at Mesa needed help.
With three weeks before the audit, Liam updated Mesa’s Privacy Notice himself, which was taken and revised from a competitor's website. He also
wrote policies and procedures outlining the roles and responsibilities for privacy within Mesa and distributed the document to all departments he
During this time, Liam also filled the backlog of data subject requests for deletion that had been sent to him by the Customer Service Manager.
Liam worked with application owners to remove these individual's information and order history from the Customer Relationship Management
(CRM) tool, the Enterprise Resource Planning (ERP), the data warehouse, and the email server.
At the audit kick-off meeting, Liam explained to his boss and her team that there may still be some room for improvement, but he thought the risk
had been mitigated to an appropriate level based on the work he had done thus far.
After the audit had been completed, the Audit Manager and Liam met to discuss her team's findings, and much to his dismay, Liam was told that
none of the work he had completed prior to the audit followed best practices for governance and risk mitigation. In fact, his actions only opened
the company up to additional risk and scrutiny. Based on these findings, Liam worked with external counsel and an established privacy consultant
Why do Mesa's E-commerce and marketing efforts need to be compliant with the General Data Protection Regulation (GDPR)?
A. Mesa has a global E-commerce presence and may have customers in Europe. Most Voted
D. Mesa is US-based.
Correct Answer: A
SCENARIO -
Liam is the newly appointed IT Compliance Manager at Mesa, a US-based outdoor clothing brand with a global E-commerce presence. During his
second week, he is contacted by the company's IT Audit Manager, who informs him that the auditing team will be conducting a review of Mesa's
A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to privacy compliance before leaving the company.
Liam is told that a consent management tool had been added to the website and they commissioned a privacy risk evaluation from a small
consulting firm last year that determined that their risk exposure was relatively low given their current control environment. After reading the
consultant's report, Liam realized that the scope of the assessment was limited to breach notification laws in the US and the Payment Card
Not wanting to let down his new team, Liam kept his concerns about the report to himself and figured he could try to put some additional controls
into place before the audit. Having some privacy compliance experience in his last role, Liam thought he might start by having discussions with
The E-commerce Director informed him that they were still using the cookie consent tool forcibly placed on the home screen by the CIO, but could
not understand the point since their office was not located in California or Europe. The Marketing Director touted his department's success with
purchasing email lists and taking a shotgun approach to direct marketing. Both Directors highlighted their tracking tools on the website to
enhance customer experience while learning more about where else the customer had shopped. The more people Liam met with, the more it
became apparent that privacy awareness and the general control environment at Mesa needed help.
With three weeks before the audit, Liam updated Mesa’s Privacy Notice himself, which was taken and revised from a competitor's website. He also
wrote policies and procedures outlining the roles and responsibilities for privacy within Mesa and distributed the document to all departments he
During this time, Liam also filled the backlog of data subject requests for deletion that had been sent to him by the Customer Service Manager.
Liam worked with application owners to remove these individual's information and order history from the Customer Relationship Management
(CRM) tool, the Enterprise Resource Planning (ERP), the data warehouse, and the email server.
At the audit kick-off meeting, Liam explained to his boss and her team that there may still be some room for improvement, but he thought the risk
had been mitigated to an appropriate level based on the work he had done thus far.
After the audit had been completed, the Audit Manager and Liam met to discuss her team's findings, and much to his dismay, Liam was told that
none of the work he had completed prior to the audit followed best practices for governance and risk mitigation. In fact, his actions only opened
the company up to additional risk and scrutiny. Based on these findings, Liam worked with external counsel and an established privacy consultant
A. Prepare.
B. Audit.
D. Follow-up.
Correct Answer: C
Under the General Data Protection Regulation (GDPR), international data transfer is allowed using the mechanisms in all of the following scenarios
A. Are part of the same group of enterprise using approved Binding Corporate Rules (BCRs).
Correct Answer: C
Which of the following is NOT an important factor to consider when developing a data retention policy?
A. Technology resource.
B. Business requirement.
Correct Answer: C
D. ISO 27701.
Correct Answer: C
Question #221 Topic 1
Formosa International operates in 20 different countries including the United States and France.
What organizational approach would make complying with a number of different regulations easier?
A. Data mapping.
C. Rationalizing requirements.
Correct Answer: C
The most direct way to ensure you are effectively communicating your privacy mission throughout your organization is to?
D. Review the quantity of Data Protection Impact Assessments (DPIAs) to ensure completeness for every project.
Correct Answer: B
If done correctly, how can a Data Protection Impact Assessment (DPIA) create a win/win scenario for organizations and individuals?
A. By quickly identifying potentially problematic data attributes and reducing the risk exposure.
B. By allowing Data Controllers to solicit feedback from individuals about how they feel about the potential data processing.
C. By enabling Data Controllers to be proactive in their analysis of processing activities and ensuring compliance with the law.
D. By better informing about the risks associated with the processing activity and improving the organization’s transparency with individuals.
Most Voted
Correct Answer: D
Which of the following is NOT recommended for effective Identity Access Management?
C. User responsibility.
Correct Answer: A
You would like to better understand how your organization can demonstrate compliance with international privacy standards and identify gaps for
Correct Answer: D
If your organization has a recurring issue with colleagues not reporting personal data breaches, all of the following are advisable to do EXCEPT?
A. Review reporting activity on breaches to understand when incidents are being reported and when they are not to improve communication
and training.
B. Improve communication to reinforce to everyone that breaches must be reported and how they should be reported.
C. Provide role-specific training to areas where breaches are happening so they are more aware.
D. Distribute a phishing exercise to all employees to test their ability to recognize a threat attempt.
Correct Answer: D
Question #227 Topic 1
SCENARIO -
Today is your first day at a fast growing international real estate firm headquartered in New York, with offices in Canada and Germany. You are the
While touring the office to meet your new colleagues and learn the layout of the office, you notice piles of printing jobs left on the printer in the
copy room. You also note a recycle bin and garbage can near the printers. With a quick glance, you see a completed loan application form print
out with applicant name, social security number and home address lying in the recycle bin. You make a note to follow up immediately.
You are then introduced to the head of IT who gives you a warm welcome and explains his star project this year - enterprise CRM (Customer
Relationship Management) mobility. He is very proud that he is leading this innovation that allows firm-wide employees to access the existing
CRM database remotely from anywhere on the Internet. The business value of this mobility initiative is significant. Since he doesn't have internal
web development expertise, he outsourced the development work to a small IT firm in New York that has just successfully delivered another IT
After the tour you start working on a plan based on your observations. One immediate action is to schedule a meeting with the head of IT to
Which of the following actions should you take to measure the firm's privacy compliance status?
Correct Answer: C
SCENARIO -
Today is your first day at a fast growing international real estate firm headquartered in New York, with offices in Canada and Germany. You are the
While touring the office to meet your new colleagues and learn the layout of the office, you notice piles of printing jobs left on the printer in the
copy room. You also note a recycle bin and garbage can near the printers. With a quick glance, you see a completed loan application form print
out with applicant name, social security number and home address lying in the recycle bin. You make a note to follow up immediately.
You are then introduced to the head of IT who gives you a warm welcome and explains his star project this year - enterprise CRM (Customer
Relationship Management) mobility. He is very proud that he is leading this innovation that allows firm-wide employees to access the existing
CRM database remotely from anywhere on the Internet. The business value of this mobility initiative is significant. Since he doesn't have internal
web development expertise, he outsourced the development work to a small IT firm in New York that has just successfully delivered another IT
After the tour you start working on a plan based on your observations. One immediate action is to schedule a meeting with the head of IT to
All of the following would address your concern of the printer room EXCEPT?
Correct Answer: C
SCENARIO -
Today is your first day at a fast growing international real estate firm headquartered in New York, with offices in Canada and Germany. You are the
While touring the office to meet your new colleagues and learn the layout of the office, you notice piles of printing jobs left on the printer in the
copy room. You also note a recycle bin and garbage can near the printers. With a quick glance, you see a completed loan application form print
out with applicant name, social security number and home address lying in the recycle bin. You make a note to follow up immediately.
You are then introduced to the head of IT who gives you a warm welcome and explains his star project this year - enterprise CRM (Customer
Relationship Management) mobility. He is very proud that he is leading this innovation that allows firm-wide employees to access the existing
CRM database remotely from anywhere on the Internet. The business value of this mobility initiative is significant. Since he doesn't have internal
web development expertise, he outsourced the development work to a small IT firm in New York that has just successfully delivered another IT
After the tour you start working on a plan based on your observations. One immediate action is to schedule a meeting with the head of IT to
While reviewing the contract with the firm the CRM mobility project was outsourced to, all of the following should be mandatory EXCEPT?
A. Right to audit.
B. Breach notification.
C. Security Commitment.
Correct Answer: D
Which of the following forms of monitoring is best described as ‘auditing’ when aligning with privacy program goals?
C. Ensuring third parties have appropriate security and privacy requirements in place.
D. Evaluating the privacy risks associated with processing personal information in relation to a project, product, or service.
Correct Answer: A
Question #231 Topic 1
A systems audit uncovered a shared drive folder containing sensitive employee data with no access controls and therefore was available for all
Correct Answer: D
While trying to e-mail her manager, an employee has e-mailed a list of all the company's customers, including their bank details, to an employee
Which of the following would be the first stage in the incident response plan under the General Data Protection Regulation (GDPR)?
Correct Answer: B
Question #233 Topic 1
You have just taken on the role of Data Governance Director at an energy corporation based in London, England. The company has been trading for
over 25 years and you soon team that so far, the company has done little to control the use of customer information.
During the first few weeks you establish that despite attempts by your predecessor, the company has held onto all customer records digitally in
various systems, including their customer records management system, their invoicing system, their call recording system, their marketing
There have been a fair number of minor data breaches in recent months and a couple of larger ones, which have meant that not only has the
company's reputation been damaged but they have also had to report some of the bigger breaches to the regulator. One of these breaches led to
the credit risk scores of over 150,000 customers being deliberately leaked to the company’s largest competitor.
You also discover that some customers have asked for their data to be deleted following a number of marketing campaigns. Even though the
company has told the customers that they have done what was asked, you team that all the company did was remove these customers from their
marketing lists - in other words, all their data is still in the various digital systems for marketing, invoicing and records management.
On top of all this, you learn that if a customer service agent based in the energy corporation's US call center cannot find the details of the specific
customer they are talking to on the phone, the agent will just add notes of the telephone conversation in whichever customer record the agent can
find. What this means is that some customer records are very inaccurate, and this causes delays in compensation payments, poor reviews on
independent review sites and the energy regulator in the UK is thinking of suspending the company's license.
As artificial intelligence is seen as the new energy future linking to the Internet of Things (IoT), the company has partnered with another company
specializing in ingesting huge amounts of data into cloud-based warehouses. This data is then used to profile customers, so they get an idea of
which ones are most likely to buy their new cutting-edge technology that is being offered via their new business partner. Many of the new devices
on offer mean that both companies will be able to gather even more data about their customers, including geo-location, IP addresses, which
electrical devices their customers use in their homes and when they use them the most.
The company is very excited for the future and how all this new tech can help them beat the competition but you have a big task ahead of you to
C. The customers who are agreeing to new devices being installed in their homes.
D. The various data storage systems (e.g., records management, invoicing, marketing).
Correct Answer: B
You have just taken on the role of Data Governance Director at an energy corporation based in London, England. The company has been trading for
over 25 years and you soon team that so far, the company has done little to control the use of customer information.
During the first few weeks you establish that despite attempts by your predecessor, the company has held onto all customer records digitally in
various systems, including their customer records management system, their invoicing system, their call recording system, their marketing
There have been a fair number of minor data breaches in recent months and a couple of larger ones, which have meant that not only has the
company's reputation been damaged but they have also had to report some of the bigger breaches to the regulator. One of these breaches led to
the credit risk scores of over 150,000 customers being deliberately leaked to the company’s largest competitor.
You also discover that some customers have asked for their data to be deleted following a number of marketing campaigns. Even though the
company has told the customers that they have done what was asked, you team that all the company did was remove these customers from their
marketing lists - in other words, all their data is still in the various digital systems for marketing, invoicing and records management.
On top of all this, you learn that if a customer service agent based in the energy corporation's US call center cannot find the details of the specific
customer they are talking to on the phone, the agent will just add notes of the telephone conversation in whichever customer record the agent can
find. What this means is that some customer records are very inaccurate, and this causes delays in compensation payments, poor reviews on
independent review sites and the energy regulator in the UK is thinking of suspending the company's license.
As artificial intelligence is seen as the new energy future linking to the Internet of Things (IoT), the company has partnered with another company
specializing in ingesting huge amounts of data into cloud-based warehouses. This data is then used to profile customers, so they get an idea of
which ones are most likely to buy their new cutting-edge technology that is being offered via their new business partner. Many of the new devices
on offer mean that both companies will be able to gather even more data about their customers, including geo-location, IP addresses, which
electrical devices their customers use in their homes and when they use them the most.
The company is very excited for the future and how all this new tech can help them beat the competition but you have a big task ahead of you to
Which of the following should be your top priority for getting data use under control?
A. Making sure the data warehouse is secure with strong firewalls and antivirus software.
B. Ensuring the business is transparent with customers over how their data is to be used.
C. Ensuring the company's records management and privacy policies are effective. Most Voted
Correct Answer: C
You have just taken on the role of Data Governance Director at an energy corporation based in London, England. The company has been trading for
over 25 years and you soon team that so far, the company has done little to control the use of customer information.
During the first few weeks you establish that despite attempts by your predecessor, the company has held onto all customer records digitally in
various systems, including their customer records management system, their invoicing system, their call recording system, their marketing
There have been a fair number of minor data breaches in recent months and a couple of larger ones, which have meant that not only has the
company's reputation been damaged but they have also had to report some of the bigger breaches to the regulator. One of these breaches led to
the credit risk scores of over 150,000 customers being deliberately leaked to the company’s largest competitor.
You also discover that some customers have asked for their data to be deleted following a number of marketing campaigns. Even though the
company has told the customers that they have done what was asked, you team that all the company did was remove these customers from their
marketing lists - in other words, all their data is still in the various digital systems for marketing, invoicing and records management.
On top of all this, you learn that if a customer service agent based in the energy corporation's US call center cannot find the details of the specific
customer they are talking to on the phone, the agent will just add notes of the telephone conversation in whichever customer record the agent can
find. What this means is that some customer records are very inaccurate, and this causes delays in compensation payments, poor reviews on
independent review sites and the energy regulator in the UK is thinking of suspending the company's license.
As artificial intelligence is seen as the new energy future linking to the Internet of Things (IoT), the company has partnered with another company
specializing in ingesting huge amounts of data into cloud-based warehouses. This data is then used to profile customers, so they get an idea of
which ones are most likely to buy their new cutting-edge technology that is being offered via their new business partner. Many of the new devices
on offer mean that both companies will be able to gather even more data about their customers, including geo-location, IP addresses, which
electrical devices their customers use in their homes and when they use them the most.
The company is very excited for the future and how all this new tech can help them beat the competition but you have a big task ahead of you to
Following the marketing campaigns, which of the following should have been prioritized by the company?
B. Putting in place new processes for valid deletion requests. Most Voted
Correct Answer: B
When developing a privacy program and selecting a program sponsor or "champion" the most important consideration should be that they?
C. Have the authority to approve policy and provide funding. Most Voted
Correct Answer: D
Implementation of a Privacy Program Framework (PPF) requires that you do all of the following EXCEPT?
Correct Answer: A
Which of the following is least relevant to establishing a culture of data privacy at a company?
D. Monitoring compliance.
Correct Answer: A
Question #239 Topic 1
D. Conducting a root cause analysis on privacy incidents to recommend response improvements Most Voted
Correct Answer: D
Which of the following helps build trust with customers and stakeholders?
C. Publish your privacy notice using broad language to ensure all of your organization's activities are captured.
D. Provide a dedicated privacy space with the privacy notice, explanatory documents and operation frameworks.
Correct Answer: D
Which of the following is the most likely way an independent privacy organization might work to promote sound privacy practices?
Correct Answer: A
Which is the best first step in establishing a baseline regarding privacy in an organization?
C. Collecting information on the organization's compliance with privacy regulations and standards.
D. Designating a person responsible for the development and implementation of the organization's privacy program.
Correct Answer: C
What are the advantages for a company that chooses a hybrid of centralized and decentralized management practices?
A. Clearly defined company goals that employees can pursue according to their specific roles. Most Voted
C. Flexible departments with great diversity and little need for structure.
Correct Answer: A
Which of the following is least likely to address individual program needs and specific organizational goals identified in privacy framework
development?
Correct Answer: C
Question #245 Topic 1
Creating a privacy governance model for an organization that is required to appoint data protection officers under the GDPR poses what additional
challenge?
Correct Answer: B
When developing a privacy program and selecting a program sponsor or "champion" the least important consideration should be that they?
D. Have accountability for the organization's privacy and/or information security, risk, compliance, or legal decisions.
Correct Answer: A
In the European Union, the GDPR gives Supervisory Authorities the right to which of the following actions?
Correct Answer: A
Understanding the sensitivity of personal data that an organization holds is a crucial step for a privacy professional attempting to do what?
C. Form a starting point for assessing the adequacy of the privacy program. Most Voted
Correct Answer: C
All of the following are components of a data collection notice EXCEPT identification of?
D. The lawful interests pursued by the responsible party collecting the information.
Correct Answer: C
When implementing an organization's privacy program, what right should be granted to the data subject?
D. To verify that an organization uses the highest level of privacy protection available.
Correct Answer: A