CIPM Exam - Page 3 - ExamTopics
CIPM Exam - Page 3 - ExamTopics
Which term describes a piece of personal data that alone may not identify an individual?
A. Unbundled data
B. A singularity
C. Non-aggregated infopoint
Correct Answer: D
SCENARIO -
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for
several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget
vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit
card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the
Society’s store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third
parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters,
however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues
of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data
cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a
small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”
You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared
conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.
After conducting research, you discover a primary data protection issue with cloud computing. Which of the following should be your biggest
concern?
Correct Answer: B
SCENARIO -
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for
several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget
vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit
card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the
Society’s store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third
parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters,
however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues
of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data
cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a
small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”
You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared
conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.
What is the best way to prevent the Finnish vendor from transferring data to another party?
Correct Answer: C
SCENARIO -
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for
several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget
vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit
card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the
Society’s store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third
parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters,
however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues
of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data
cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a
small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”
You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared
conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.
What process can best answer your questions about the vendor’s data security safeguards?
Correct Answer: B
SCENARIO -
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for
several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget
vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit
card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the
Society’s store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third
parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters,
however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues
of sales of items such as shirts and coffee cups from the store have been significant. The Society’s operating budget is slim, and all sources of
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data
cloud. “The good news,” he says, “is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a
small charge to pass through to you, it won’t be exorbitant, especially considering the advantages of a cloud.”
You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared
conventions and technologies for privacy protection. You make a note to find out if Jason’s Finnish provider is signing on.
What is the best way for your vendor to be clear about the Society’s breach notification expectations?
Correct Answer: A
Correct Answer: B
Correct Answer: D
An organization is establishing a mission statement for its privacy program. Which of the following statements would be the best to use?
A. This privacy program encourages cross-organizational collaboration which will stop all data breaches
B. Our organization was founded in 2054 to reduce the chance of a future disaster like the one that occurred ten years ago. All individuals
from our area of the country should be concerned about a future disaster. However, with our privacy program, they should not be concerned
C. The goal of the privacy program is to protect the privacy of all individuals who support our organization. To meet this goal, we must work to
D. In the next 20 years, our privacy program should be able to eliminate 80% of our current breaches. To do this, everyone in our organization
must complete our annual privacy training course and all personally identifiable information must be inventoried.
Correct Answer: C
SCENARIO -
You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the
Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks
clarity and detail, but you presume that data was lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that the vendor improperly shared
information about your customers. He called the vendor and confirmed that your company recently surveyed exactly 2000 individuals about their
most recent healthcare experience and sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the
database as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell you they set aside 2000 stamped
postcards because that should reduce the time it takes to get the notice in the mail. One side is limited to their logo, but the other side is blank
and they will accept whatever you want to write. You put their offer on hold and begin to develop the text around the space constraints. You are
The notification explains that your company recently hired a vendor to store information about their most recent experience at St. Sebastian
Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information and no longer has control of it. All 2000 affected individuals
are invited to sign-up for email notifications about their information. They simply need to go to your company’s website and watch a quick
advertisement, then provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation, you want to diffuse the blame
across your colleagues. Over the next eight hours, everyone emails their comments back and forth. The consultant who leads the incident-
response team notes that it is his first day with the company, but he has been in other industries for 45 years and will do his best. One of the three
lawyers on the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the day, they vote to proceed
with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the decision to have your company
offer credit monitoring services. A quick internet search finds a credit monitoring company with a convincing name: Credit Under Lock and Key
(CRUDLOK). Your sales rep has never handled a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
Send an enrollment invitation to everyone the day after the contract is signed.
Enroll someone with just their first name and the last-4 of their national identifier.
Monitor each enrollee’s credit for two years from the date of enrollment.
Send a monthly email with their credit rating and offers for credit-related services at market rates.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later you sit down and document all that
went well and all that could have gone better. You put it in a file to reference the next time an incident occurs.
Which of the following elements of the incident did you adequately determine?
Correct Answer: B
SCENARIO -
You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the
Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks
clarity and detail, but you presume that data was lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that the vendor improperly shared
information about your customers. He called the vendor and confirmed that your company recently surveyed exactly 2000 individuals about their
most recent healthcare experience and sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the
database as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell you they set aside 2000 stamped
postcards because that should reduce the time it takes to get the notice in the mail. One side is limited to their logo, but the other side is blank
and they will accept whatever you want to write. You put their offer on hold and begin to develop the text around the space constraints. You are
The notification explains that your company recently hired a vendor to store information about their most recent experience at St. Sebastian
Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information and no longer has control of it. All 2000 affected individuals
are invited to sign-up for email notifications about their information. They simply need to go to your company’s website and watch a quick
advertisement, then provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation, you want to diffuse the blame
across your colleagues. Over the next eight hours, everyone emails their comments back and forth. The consultant who leads the incident-
response team notes that it is his first day with the company, but he has been in other industries for 45 years and will do his best. One of the three
lawyers on the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the day, they vote to proceed
with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the decision to have your company
offer credit monitoring services. A quick internet search finds a credit monitoring company with a convincing name: Credit Under Lock and Key
(CRUDLOK). Your sales rep has never handled a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
Send an enrollment invitation to everyone the day after the contract is signed.
Enroll someone with just their first name and the last-4 of their national identifier.
Monitor each enrollee’s credit for two years from the date of enrollment.
Send a monthly email with their credit rating and offers for credit-related services at market rates.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later you sit down and document all that
went well and all that could have gone better. You put it in a file to reference the next time an incident occurs.
Regarding the notification, which of the following would be the greatest concern?
A. Informing the affected individuals that data from other individuals may have also been affected.
B. Collecting more personally identifiable information than necessary to provide updates to the affected individuals. Most Voted
C. Using a postcard with the logo of the vendor who make the mistake instead of your company’s logo.
D. Trusting a vendor to send out a notice when they already failed once by not encrypting the database.
Correct Answer: D
SCENARIO -
You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the
Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks
clarity and detail, but you presume that data was lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that the vendor improperly shared
information about your customers. He called the vendor and confirmed that your company recently surveyed exactly 2000 individuals about their
most recent healthcare experience and sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the
database as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell you they set aside 2000 stamped
postcards because that should reduce the time it takes to get the notice in the mail. One side is limited to their logo, but the other side is blank
and they will accept whatever you want to write. You put their offer on hold and begin to develop the text around the space constraints. You are
The notification explains that your company recently hired a vendor to store information about their most recent experience at St. Sebastian
Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information and no longer has control of it. All 2000 affected individuals
are invited to sign-up for email notifications about their information. They simply need to go to your company’s website and watch a quick
advertisement, then provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation, you want to diffuse the blame
across your colleagues. Over the next eight hours, everyone emails their comments back and forth. The consultant who leads the incident-
response team notes that it is his first day with the company, but he has been in other industries for 45 years and will do his best. One of the three
lawyers on the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the day, they vote to proceed
with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the decision to have your company
offer credit monitoring services. A quick internet search finds a credit monitoring company with a convincing name: Credit Under Lock and Key
(CRUDLOK). Your sales rep has never handled a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
Send an enrollment invitation to everyone the day after the contract is signed.
Enroll someone with just their first name and the last-4 of their national identifier.
Monitor each enrollee’s credit for two years from the date of enrollment.
Send a monthly email with their credit rating and offers for credit-related services at market rates.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later you sit down and document all that
went well and all that could have gone better. You put it in a file to reference the next time an incident occurs.
Correct Answer: A
SCENARIO -
You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the
Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks
clarity and detail, but you presume that data was lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that the vendor improperly shared
information about your customers. He called the vendor and confirmed that your company recently surveyed exactly 2000 individuals about their
most recent healthcare experience and sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the
database as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell you they set aside 2000 stamped
postcards because that should reduce the time it takes to get the notice in the mail. One side is limited to their logo, but the other side is blank
and they will accept whatever you want to write. You put their offer on hold and begin to develop the text around the space constraints. You are
The notification explains that your company recently hired a vendor to store information about their most recent experience at St. Sebastian
Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information and no longer has control of it. All 2000 affected individuals
are invited to sign-up for email notifications about their information. They simply need to go to your company’s website and watch a quick
advertisement, then provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation, you want to diffuse the blame
across your colleagues. Over the next eight hours, everyone emails their comments back and forth. The consultant who leads the incident-
response team notes that it is his first day with the company, but he has been in other industries for 45 years and will do his best. One of the three
lawyers on the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the day, they vote to proceed
with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the decision to have your company
offer credit monitoring services. A quick internet search finds a credit monitoring company with a convincing name: Credit Under Lock and Key
(CRUDLOK). Your sales rep has never handled a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
Send an enrollment invitation to everyone the day after the contract is signed.
Enroll someone with just their first name and the last-4 of their national identifier.
Monitor each enrollee’s credit for two years from the date of enrollment.
Send a monthly email with their credit rating and offers for credit-related services at market rates.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later you sit down and document all that
went well and all that could have gone better. You put it in a file to reference the next time an incident occurs.
Regarding the credit monitoring, which of the following would be the greatest concern?
B. Signing a contract with CRUDLOK which lasts longer than one year
C. The company did not collect enough identifiers to monitor one’s credit Most Voted
D. You are going to notify affected individuals via a letter followed by an email
Correct Answer: A
SCENARIO -
You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the
Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks
clarity and detail, but you presume that data was lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that the vendor improperly shared
information about your customers. He called the vendor and confirmed that your company recently surveyed exactly 2000 individuals about their
most recent healthcare experience and sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the
database as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell you they set aside 2000 stamped
postcards because that should reduce the time it takes to get the notice in the mail. One side is limited to their logo, but the other side is blank
and they will accept whatever you want to write. You put their offer on hold and begin to develop the text around the space constraints. You are
The notification explains that your company recently hired a vendor to store information about their most recent experience at St. Sebastian
Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information and no longer has control of it. All 2000 affected individuals
are invited to sign-up for email notifications about their information. They simply need to go to your company’s website and watch a quick
advertisement, then provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation, you want to diffuse the blame
across your colleagues. Over the next eight hours, everyone emails their comments back and forth. The consultant who leads the incident-
response team notes that it is his first day with the company, but he has been in other industries for 45 years and will do his best. One of the three
lawyers on the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the day, they vote to proceed
with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the decision to have your company
offer credit monitoring services. A quick internet search finds a credit monitoring company with a convincing name: Credit Under Lock and Key
(CRUDLOK). Your sales rep has never handled a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
Send an enrollment invitation to everyone the day after the contract is signed.
Enroll someone with just their first name and the last-4 of their national identifier.
Monitor each enrollee’s credit for two years from the date of enrollment.
Send a monthly email with their credit rating and offers for credit-related services at market rates.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later you sit down and document all that
went well and all that could have gone better. You put it in a file to reference the next time an incident occurs.
Which of the following was done CORRECTLY during the above incident?
C. The speed at which you sat down to reflect and document the incident Most Voted
D. Finding a vendor who will offer the affected individuals additional services
Correct Answer: C
Correct Answer: C
Under which circumstances would people who work in human resources be considered a secondary audience for privacy metrics?
C. They do not have privacy policy as their main task Most Voted
Correct Answer: C
SCENARIO -
As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the
chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous
within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also
was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have
been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s
business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within
three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-
up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data
protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims
to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work
responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest
standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to
be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”
You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite,
You are charged with making sure that privacy safeguards are in place for new products and initiatives. What is the best way to do this?
A. Hold a meeting with stakeholders to create an interdepartmental protocol for new initiatives
B. Institute Privacy by Design principles and practices across the organization Most Voted
C. Develop a plan for introducing privacy protections into the product development stage
D. Conduct a gap analysis after deployment of new products, then mend any gaps that are revealed
Correct Answer: B
SCENARIO -
As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the
chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous
within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also
was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have
been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s
business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within
three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-
up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data
protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims
to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work
responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest
standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to
be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”
You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite,
The CEO likes what he’s seen of the company’s improved privacy program, but wants additional assurance that it is fully compliant with industry
standards and reflects emerging best practices. What would best help accomplish this goal?
Correct Answer: A
SCENARIO -
As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the
chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous
within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also
was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have
been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s
business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within
three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-
up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data
protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims
to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work
responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest
standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to
be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”
You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite,
The company has achieved a level of privacy protection that established new best practices for the industry. What is a logical next step to help
C. Focus on improving the incident response plan in preparation for any breaks in protection Most Voted
D. Shift attention to privacy for emerging technologies as the company begins to use them
Correct Answer: C
SCENARIO -
As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the
chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous
within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also
was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have
been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s
business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within
three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-
up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data
protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims
to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work
responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest
standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to
be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”
You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite,
What metric can Goddard use to assess whether costs associated with implementing new privacy protections are justified?
A. Compliance ratio
B. Cost-effective mean
D. Implementation measure
Correct Answer: C
SCENARIO -
As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the
chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous
within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also
was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have
been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s
business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within
three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-
up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data
protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims
to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work
responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest
standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to
be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”
You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite,
You give a presentation to your CEO about privacy program maturity. What does it mean to have a “managed” privacy program, according to the
A. Procedures or processes exist, however they are not fully documented and do not cover all relevant aspects.
B. Procedures and processes are fully documented and implemented, and cover all relevant aspects.
C. Reviews are conducted to assess the effectiveness of the controls in place. Most Voted
D. Regular review and feedback are used to ensure continuous improvement toward optimization of the given process.
Correct Answer: C
Which of the following best demonstrates the effectiveness of a firm’s privacy incident response process?
Correct Answer: D
A. Any project that involves the use of personal data requires a PIA
C. The PIA must be conducted at the early stages of the project lifecycle Most Voted
D. The results from a previous information audit can be leveraged in a PIA process
Correct Answer: C
SCENARIO -
Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to
change the hotel’s on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into
supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to
small groups. Interest in the training increased, leading Briseño to work with corporate HR specialists and software engineers to offer the program
in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseño’s program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and
offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the
program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As
the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of
PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the
hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course
certification tests. When a user opened a new account, all information was saved by default, including the user’s name, date of birth, contact
information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their
credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint
their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT’s profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e-learning providers. By 2011, Pacific
Suites was out of the online certification business and PHT was dissolved. The training program’s systems and records remained in Pacific Suites’
digital archives, un-accessed and unused. Briseño and Silva-Hayes moved on to work for other companies, and there was no plan for handling the
archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations.
They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information
of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data
and registration accounts of Pacific Hospitality Training’s customers. The result of the hack was the exfiltration of the credit card numbers of
recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified
credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has
procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database
was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was
compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
In the Information Technology engineers had originally set the default for customer credit card information to “Do Not Save,” this action would
A. Use limitation
C. Harm minimization
Correct Answer: B
SCENARIO -
Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to
change the hotel’s on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into
supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to
small groups. Interest in the training increased, leading Briseño to work with corporate HR specialists and software engineers to offer the program
in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseño’s program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and
offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the
program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As
the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of
PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the
hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course
certification tests. When a user opened a new account, all information was saved by default, including the user’s name, date of birth, contact
information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their
credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint
their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT’s profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e-learning providers. By 2011, Pacific
Suites was out of the online certification business and PHT was dissolved. The training program’s systems and records remained in Pacific Suites’
digital archives, un-accessed and unused. Briseño and Silva-Hayes moved on to work for other companies, and there was no plan for handling the
archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations.
They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information
of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data
and registration accounts of Pacific Hospitality Training’s customers. The result of the hack was the exfiltration of the credit card numbers of
recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified
credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has
procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database
was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was
compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
A. Collecting too much information and keeping it for too long Most Voted
Correct Answer: A
SCENARIO -
Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to
change the hotel’s on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into
supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to
small groups. Interest in the training increased, leading Briseño to work with corporate HR specialists and software engineers to offer the program
in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseño’s program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and
offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the
program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As
the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of
PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the
hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course
certification tests. When a user opened a new account, all information was saved by default, including the user’s name, date of birth, contact
information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their
credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint
their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT’s profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e-learning providers. By 2011, Pacific
Suites was out of the online certification business and PHT was dissolved. The training program’s systems and records remained in Pacific Suites’
digital archives, un-accessed and unused. Briseño and Silva-Hayes moved on to work for other companies, and there was no plan for handling the
archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations.
They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information
of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data
and registration accounts of Pacific Hospitality Training’s customers. The result of the hack was the exfiltration of the credit card numbers of
recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified
credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has
procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database
was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was
compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
How would a strong data life cycle management policy have helped prevent the breach?
A. Information would have been ranked according to importance and stored in separate locations
B. The most sensitive information would have been immediately erased and destroyed
C. The most important information would have been regularly assessed and tested for security
D. Information would have been categorized and assigned a deadline for destruction Most Voted
Correct Answer: D
SCENARIO -
Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to
change the hotel’s on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into
supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to
small groups. Interest in the training increased, leading Briseño to work with corporate HR specialists and software engineers to offer the program
in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseño’s program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and
offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the
program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As
the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of
PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the
hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course
certification tests. When a user opened a new account, all information was saved by default, including the user’s name, date of birth, contact
information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their
credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint
their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT’s profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e-learning providers. By 2011, Pacific
Suites was out of the online certification business and PHT was dissolved. The training program’s systems and records remained in Pacific Suites’
digital archives, un-accessed and unused. Briseño and Silva-Hayes moved on to work for other companies, and there was no plan for handling the
archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations.
They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information
of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data
and registration accounts of Pacific Hospitality Training’s customers. The result of the hack was the exfiltration of the credit card numbers of
recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified
credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has
procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database
was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was
compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
How was Pacific Suites responsible for protecting the sensitive information of its offshoot, PHT?
A. As the parent company, it should have transferred personnel to oversee the secure handling of PHT’s data.
B. As the parent company, it should have performed an assessment of PHT’s infrastructure and confirmed complete separation of the two
networks.
C. As the parent company, it should have ensured its existing data access and storage procedures were integrated into PHT’s system.
Most Voted
D. As the parent company, it should have replaced PHT’s electronic files with hard-copy documents stored securely on site.
Correct Answer: C
SCENARIO -
Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to
change the hotel’s on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into
supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to
small groups. Interest in the training increased, leading Briseño to work with corporate HR specialists and software engineers to offer the program
in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseño’s program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and
offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the
program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online. As
the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of
PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the
hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course
certification tests. When a user opened a new account, all information was saved by default, including the user’s name, date of birth, contact
information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their
credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint
their certifications, and sign up and pay for new courses. Between 2002 and 2008, PHT issued more than 700,000 professional certifications.
PHT’s profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e-learning providers. By 2011, Pacific
Suites was out of the online certification business and PHT was dissolved. The training program’s systems and records remained in Pacific Suites’
digital archives, un-accessed and unused. Briseño and Silva-Hayes moved on to work for other companies, and there was no plan for handling the
archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations.
They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information
of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data
and registration accounts of Pacific Hospitality Training’s customers. The result of the hack was the exfiltration of the credit card numbers of
recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified
credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has
procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database
was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was
compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
What must Pacific Suite’s primary focus be as it manages this security breach?
Correct Answer: A
A Human Resources director at a company reported that a laptop containing employee payroll data was lost on the train. Which action should the
Correct Answer: D
A. Phishing attacks
B. Authorization errors
Correct Answer: C
The General Data Protection Regulation (GDPR) specifies fines that may be levied against data controllers for certain infringements. Which of the
following will be subject to administrative fines of up to 10 000 000 EUR, or in the case of an undertaking, up to 2% of the total worldwide annual
A. Failure to demonstrate that consent was given by the data subject to the processing of their personal data where it is used as the basis for
processing
B. Failure to implement technical and organizational measures to ensure data protection is enshrined by design and default Most Voted
C. Failure to process personal information in a manner compatible with its original purpose
D. Failure to provide the means for a data subject to rectify inaccuracies in personal data
Correct Answer: B
SCENARIO -
Manasa is a product manager at Omnipresent Omnimedia, where she is responsible for leading the development of the company’s flagship
product, the Handy Helper. The Handy Helper is an application that can be used in the home to manage family calendars, do online shopping, and
schedule doctor appointments. After having had a successful launch in the United States, the Handy Helper is about to be made available for
purchase worldwide.
The packaging and user guide for the Handy Helper indicate that it is a “privacy friendly” product suitable for the whole family, including children,
but does not provide any further detail or privacy notice. In order to use the application, a family creates a single account, and the primary user
has access to all information about the other users. Upon start up, the primary user must check a box consenting to receive marketing emails
from Omnipresent Omnimedia and selected marketing partners in order to be able to use the application.
Sanjay, the head of privacy at Omnipresent Omnimedia, was working on an agreement with a European distributor of Handy Helper when he fielded
many questions about the product from the distributor. Sanjay needed to look more closely at the product in order to be able to answer the
In speaking with the product team, he learned that the Handy Helper collected and stored all of a user’s sensitive medical information for the
medical appointment scheduler. In fact, all of the user’s information is stored by Handy Helper for the additional purpose of creating additional
products and to analyze usage of the product. This data is all stored in the cloud and is encrypted both during transmission and at rest.
Consistent with the CEO’s philosophy that great new product ideas can come from anyone, all Omnipresent Omnimedia employees have access to
user data under a program called “Eureka.” Omnipresent Omnimedia is hoping that at some point in the future, the data will reveal insights that
could be used to create a fully automated application that runs on artificial intelligence, but as of yet, Eureka is not well-defined and is considered
a long-term goal.
A. Storage of medical data in the cloud is not permissible under the General Data Protection Regulation (GDPR)
B. Data access is not limited to those who “need to know” for their role Most Voted
C. Collection of data without a defined purpose might violate the fairness principle
D. Encryption of the data at rest prevents European users from having the right of access and the right of portability of their data
Correct Answer: B
B. To enable regulators to understand trends and developments that may shape the law
C. To ensure organizations have accountability for the sufficiency of their security measures
D. To allow individuals to take any actions required to protect themselves from possible consequences Most Voted
Correct Answer: D
Under the General Data Protection Regulation (GDPR), which situation would be LEAST likely to require a Data Protection Impact Assessment
(DPIA)?
C. A Human Resources department using a tool to monitor its employees’ internet activity
D. An online magazine using a mailing list to send a generic daily digest to marketing emails Most Voted
Correct Answer: D
Under the General Data Protection Regulation (GDPR), which of the following situations would LEAST likely require a controller to notify a data
subject?
A. An encrypted USB key with sensitive personal data is stolen Most Voted
B. A direct marketing email is sent with recipients visible in the ‘cc’ field
C. Personal data of a group of individuals is erroneously sent to the wrong mailing list
D. A hacker publishes usernames, phone numbers and purchase history online after a cyber-attack
Correct Answer: A
SCENARIO -
Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in
California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and
has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy
priorities will be, Penny has set up meetings with a number of colleagues to hear about the work that they have been doing and their compliance
efforts.
Penny’s colleague in Marketing is excited by the new sales and the company’s plans, but is also concerned that Penny may curtail some of the
growth opportunities he has planned. He tells her “I heard someone in the breakroom talking about some new privacy laws but I really don’t think
it affects us. We’re just a small company. I mean we just sell accessories online, so what’s the real risk?” He has also told her that he works with a
number of small companies that help him get projects completed in a hurry. “We’ve got to meet our deadlines otherwise we lose money. I just sign
the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes time that we just don’t have.”
In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken a number of precautions to protect its website
from malicious activity, it has not taken the same level of care of its physical files or internal infrastructure. Penny’s colleague in IT has told her
that a former employee lost an encrypted USB key with financial data on it when he left. The company nearly lost access to their customer
database last year after they fell victim to a phishing attack. Penny is told by her IT colleague that the IT team “didn’t know what to do or who
should do what. We hadn’t been trained on it but we’re a small team though, so it worked out OK in the end.” Penny is concerned that these issues
Penny is aware that the company has solid plans to grow its international sales and will be working closely with the CEO to give the organization a
data “shake up”. Her mission is to cultivate a strong privacy culture within the company.
Penny has a meeting with Ace Space’s CEO today and has been asked to give her first impressions and an overview of her next steps.
To establish the current baseline of Ace Space’s privacy maturity, Penny should consider all of the following factors EXCEPT?
Correct Answer: D
SCENARIO -
Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in
California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and
has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy
priorities will be, Penny has set up meetings with a number of colleagues to hear about the work that they have been doing and their compliance
efforts.
Penny’s colleague in Marketing is excited by the new sales and the company’s plans, but is also concerned that Penny may curtail some of the
growth opportunities he has planned. He tells her “I heard someone in the breakroom talking about some new privacy laws but I really don’t think
it affects us. We’re just a small company. I mean we just sell accessories online, so what’s the real risk?” He has also told her that he works with a
number of small companies that help him get projects completed in a hurry. “We’ve got to meet our deadlines otherwise we lose money. I just sign
the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes time that we just don’t have.”
In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken a number of precautions to protect its website
from malicious activity, it has not taken the same level of care of its physical files or internal infrastructure. Penny’s colleague in IT has told her
that a former employee lost an encrypted USB key with financial data on it when he left. The company nearly lost access to their customer
database last year after they fell victim to a phishing attack. Penny is told by her IT colleague that the IT team “didn’t know what to do or who
should do what. We hadn’t been trained on it but we’re a small team though, so it worked out OK in the end.” Penny is concerned that these issues
Penny is aware that the company has solid plans to grow its international sales and will be working closely with the CEO to give the organization a
data “shake up”. Her mission is to cultivate a strong privacy culture within the company.
Penny has a meeting with Ace Space’s CEO today and has been asked to give her first impressions and an overview of her next steps.
What is the best way for Penny to understand the location, classification and processing purpose of the personal data Ace Space has?
D. Review all cloud contracts to identify the location of data servers used
Correct Answer: A
SCENARIO -
Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in
California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and
has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy
priorities will be, Penny has set up meetings with a number of colleagues to hear about the work that they have been doing and their compliance
efforts.
Penny’s colleague in Marketing is excited by the new sales and the company’s plans, but is also concerned that Penny may curtail some of the
growth opportunities he has planned. He tells her “I heard someone in the breakroom talking about some new privacy laws but I really don’t think
it affects us. We’re just a small company. I mean we just sell accessories online, so what’s the real risk?” He has also told her that he works with a
number of small companies that help him get projects completed in a hurry. “We’ve got to meet our deadlines otherwise we lose money. I just sign
the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes time that we just don’t have.”
In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken a number of precautions to protect its website
from malicious activity, it has not taken the same level of care of its physical files or internal infrastructure. Penny’s colleague in IT has told her
that a former employee lost an encrypted USB key with financial data on it when he left. The company nearly lost access to their customer
database last year after they fell victim to a phishing attack. Penny is told by her IT colleague that the IT team “didn’t know what to do or who
should do what. We hadn’t been trained on it but we’re a small team though, so it worked out OK in the end.” Penny is concerned that these issues
Penny is aware that the company has solid plans to grow its international sales and will be working closely with the CEO to give the organization a
data “shake up”. Her mission is to cultivate a strong privacy culture within the company.
Penny has a meeting with Ace Space’s CEO today and has been asked to give her first impressions and an overview of her next steps.
What information will be LEAST crucial from a privacy perspective in Penny’s review of vendor contracts?
A. Audit rights
Correct Answer: C
Which of the documents below assists the Privacy Manager in identifying and responding to a request from an individual about what personal
information the organization holds about them with whom the information is shared?
A. Risk register
B. Privacy policy
Correct Answer: D
Which of the following is the optimum first step to take when creating a Privacy Officer governance model?
Correct Answer: A
Which of the following helps build trust with customers and stakeholders?
B. Enable customers to view and change their own personal information within a dedicated portal.
C. Publish your privacy policy using broad language to ensure all of your organization’s activities are captured.
D. Provide a dedicated privacy space with the privacy policy, explanatory documents and operation frameworks. Most Voted
Correct Answer: D
Which of the following is NOT an important factor to consider when developing a data retention policy?
A. Technology resource.
B. Business requirement.
D. Compliance requirement
Correct Answer: C
When supporting the business and data privacy program expanding into a new jurisdiction, it is important to do all of the following EXCEPT?
B. Appoint a new Privacy Officer (PO) for that jurisdiction. Most Voted
D. Consider culture and whether the privacy framework will need to account for changes in culture.
Correct Answer: B
When building a data privacy program, what is a good starting point to understand the scope of privacy program needs?
D. Review Audits.
Correct Answer: C
Which of the following actions is NOT required during a data privacy diligence process for Merger & Acquisition (M&A) deals?
A. Revise inventory of applications that house personal data and data mapping.
B. Update business processes to handle Data Subject Requests (DSRs). Most Voted
Correct Answer: B
When devising effective employee policies to address a particular issue, which of the following should be included in the first draft?
Correct Answer: A
Your company wants to convert paper records that contain customer personal information into electronic form, upload the records into a new
third-party marketing tool and then merge the customer personal information in the marketing tool with information from other applications.
As the Privacy Officer, which of the following should you complete to effectively make these changes?
A. A Record of Authority.
Correct Answer: D
A minimum requirement for carrying out a Data Protection Impact Assessment (DPIA) would include?
Correct Answer: A
Which of the following best supports implementing controls to bring privacy policies into effect?
A. The internal audit department establishing the audit controls which test for policy effectiveness.
B. The legal department or outside counsel conducting a thorough review of the privacy program and policies.
C. The Chief Information Officer as part of the Senior Management Team creating enterprise privacy policies to ensure controls are available.
D. The information technology (IT) group supporting and enhancing the privacy program and privacy policy by developing processes and
Correct Answer: A
Correct Answer: D
Data retention and destruction policies should meet all of the following requirements EXCEPT?
B. Personal information should be retained only for as long as necessary to perform its stated purpose.
C. Documentation related to audit controls (third-party or internal) should be saved in a non-permanent format by default. Most Voted
D. The organization should be documenting and reviewing policies of its other functions to ensure alignment (e.g. HR, business development,
finance, etc.).
Correct Answer: C