Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CIPP-US Sample Questions Answers

Questions 4

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

How does Matt come to the decision to report the marketer’s activities?

Options:

A.

The marketer failed to make an adequate attempt to provide Matt with information

B.

The marketer did not provide evidence that the prize books were appropriate for children

C.

The marketer seems to have distributed his son’s information without Matt’s permission

D.

The marketer failed to identify himself and indicate the purpose of the messages

Buy Now
Questions 5

If an organization maintains data classified as high sensitivity in the same system as data classified as low sensitivity, which of the following is the most likely outcome?

Options:

A.

The organization will still be in compliance with most sector-specific privacy and security laws.

B.

The impact of an organizational data breach will be more severe than if the data had been segregated.

C.

Temporary employees will be able to find the data necessary to fulfill their responsibilities.

D.

The organization will be able to address legal discovery requests efficiently without producing more information than necessary.

Buy Now
Questions 6

The use of cookies on a website by a service provider is generally not deemed a ‘sale’ of personal information by CCPA, as long as which of the following conditions is met?

Options:

A.

The third party stores personal information to trigger a response to a consumer’s request to exercise their right to opt in.

B.

The analytics cookies placed by the service provider are capable of being tracked but cannot be linked to a particular consumer of that business.

C.

The service provider retains personal information obtained in the course of providing the services specified in the agreement with the subcontractors.

D.

The information collected by the service provider is necessary to perform debugging and the business and service provider have entered into an appropriate agreement.

Buy Now
Questions 7

What important action should a health care provider take if the she wants to qualify for funds under the Health Information Technology for Economic and Clinical Health Act (HITECH)?

Options:

A.

Make electronic health records (EHRs) part of regular care

B.

Bill the majority of patients electronically for their health care

C.

Send health information and appointment reminders to patients electronically

D.

Keep electronic updates about the Health Insurance Portability and Accountability Act

Buy Now
Questions 8

When developing a company privacy program, which of the following relationships will most help a privacy professional develop useful guidance for the organization?

Options:

A.

Relationships with individuals within the privacy professional community who are able to share expertise and leading practices for different industries.

B.

Relationships with clients, vendors, and customers whose data will be primarily collected and used throughout the organizational program.

C.

Relationships with company leaders responsible for approving, implementing, and periodically reviewing the corporate privacy program.

D.

Relationships with individuals across company departments and at different levels in the organization’s hierarchy.

Buy Now
Questions 9

All of the following are tasks in the “Discover” phase of building an information management program EXCEPT?

Options:

A.

Facilitating participation across departments and levels

B.

Developing a process for review and update of privacy policies

C.

Deciding how aggressive to be in the use of personal information

D.

Understanding the laws that regulate a company’s collection of information

Buy Now
Questions 10

Global Manufacturing Co’s Human Resources department recently purchased a new software tool. This tool helps evaluate future candidates for executive roles by scanning emails to see what those candidates say and what is said about them. This provides the HR department with an automated “360 review” that lets them know how the candidate thinks and operates, what their peers and direct reports say about them, and how well they interact with each other.

What is the most important step for the Human Resources Department to take when implementing this new software?

Options:

A.

Making sure that the software does not unintentionally discriminate against protected groups.

B.

Ensuring that the software contains a privacy notice explaining that employees have no right to privacy as long as they are running this software on organization systems to scan email systems.

C.

Confirming that employees have read and signed the employee handbook where they have been advised that they have no right to privacy as long as they are using the organization’s systems, regardless of the protected group or laws enforced by EEOC.

D.

Providing notice to employees that their emails will be scanned by the software and creating automated profiles.

Buy Now
Questions 11

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security

measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.

A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.

During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.

What is the most significant reason that the U.S. Department of Health and Human Services (HHS) might impose a penalty on HealthCo?

Options:

A.

Because HealthCo did not require CloudHealth to implement appropriate physical and administrative measures to safeguard the ePHI

B.

Because HealthCo did not conduct due diligence to verify or monitor CloudHealth’s security measures

C.

Because HIPAA requires the imposition of a fine if a data breach of this magnitude has occurred

D.

Because CloudHealth violated its contract with HealthCo by not encrypting the ePHI

Buy Now
Questions 12

What privacy concept grants a consumer the right to view and correct errors on his or her credit report?

Options:

A.

Access.

B.

Notice.

C.

Action.

D.

Choice.

Buy Now
Questions 13

What role does the U.S. Constitution play in the area of workplace privacy?

Options:

A.

It provides enforcement resources to large employers, but not to small businesses

B.

It provides legal precedent for physical information security, but not for electronic security

C.

It provides contractual protections to members of labor unions, but not to employees at will

D.

It provides significant protections to federal and state governments, but not to private-sector employment

Buy Now
Questions 14

Which authority supervises and enforces laws regarding advertising to children via the Internet?

Options:

A.

The Office for Civil Rights

B.

The Federal Trade Commission

C.

The Federal Communications Commission

D.

The Department of Homeland Security

Buy Now
Questions 15

In 2012, the White House and the FTC both issued reports advocating a new approach to privacy enforcement that can best be described as what?

Options:

A.

Harm-based.

B.

Self-regulatory.

C.

Comprehensive.

D.

Notice and choice.

Buy Now
Questions 16

California’s SB 1386 was the first law of its type in the United States to do what?

Options:

A.

Require commercial entities to disclose a security data breach concerning personal information about the state’s residents

B.

Require notification of non-California residents of a breach that occurred in California

C.

Require encryption of sensitive information stored on servers that are Internet connected

D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

Buy Now
Questions 17

Which entity within the Department of Health and Human Services (HHS) is the primary enforcer of the Health Insurance Portability and Accountability Act (HIPAA) “Privacy Rule”?

Options:

A.

Office for Civil Rights.

B.

Office of Social Services.

C.

Office of Inspector General.

D.

Office of Public Health and Safety.

Buy Now
Questions 18

What consumer protection did the Fair and Accurate Credit Transactions Act (FACTA) require?

Options:

A.

The ability for the consumer to correct inaccurate credit report information

B.

The truncation of account numbers on credit card receipts

C.

The right to request removal from e-mail lists

D.

Consumer notice when third-party data is used to make an adverse decision

Buy Now
Questions 19

How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?

Options:

A.

It expanded the definition of “consumer reports” to include communications relating to employee investigations

B.

It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized access

C.

It stipulated the purpose of obtaining a consumer report can only be for a review of the employee’s credit worthiness

D.

It required employers to get an employee’s consent in advance of requesting a consumer report for internal investigation purposes

Buy Now
Questions 20

Most states with data breach notification laws indicate that notice to affected individuals must be sent in the “most expeditious time possible without unreasonable delay.” By contrast, which of the following states currently imposes a definite limit for notification to affected individuals?

Options:

A.

Maine

B.

Florida

C.

New York

D.

California

Buy Now
Questions 21

Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?

Options:

A.

A local nonprofit charity’s fundraiser

B.

An online merchant’s free shipping offer

C.

A national bank’s no-fee checking promotion

D.

A city bus system’s frequent rider program

Buy Now
Questions 22

Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?

Options:

A.

7 days

B.

10 days

C.

15 days

D.

21 days

Buy Now
Questions 23

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between

their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months,one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

Based on the scenario, which of the following would have helped Janice to better meet the company’s needs?

Options:

A.

Creating a more comprehensive plan for implementing a new policy

B.

Spending more time understanding the company’s information goals

C.

Explaining the importance of transparency in implementing a new policy

D.

Removing the financial burden of the company’s employee training program

Buy Now
Questions 24

Under the Fair and Accurate Credit Transactions Act (FACTA), what is the most appropriate action for a car dealer holding a paper folder of customer credit reports?

Options:

A.

To follow the Disposal Rule by having the reports shredded

B.

To follow the Red Flags Rule by mailing the reports to customers

C.

To follow the Privacy Rule by notifying customers that the reports are being stored

D.

To follow the Safeguards Rule by transferring the reports to a secure electronic file

Buy Now
Questions 25

What practice do courts commonly require in order to protect certain personal information on documents, whether paper or electronic, that is involved in litigation?

Options:

A.

Redaction

B.

Encryption

C.

Deletion

D.

Hashing

Buy Now
Questions 26

A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?

Options:

A.

Department of Health and Human Services

B.

The affected individuals

C.

The local media

D.

Medical providers

Buy Now
Questions 27

What information did the Red Flag Program Clarification Act of 2010 add to the original Red Flags rule?

Options:

A.

The most common methods of identity theft.

B.

The definition of what constitutes a creditor.

C.

The process for proper disposal of sensitive data.

D.

The components of an identity theft detection program.

Buy Now
Questions 28

Under the Telemarketing Sales Rule, what characteristics of consent must be in place for an organization to acquire an exception to the Do-Not-Call rules for a particular consumer?

Options:

A.

The consent must be in writing, must state the times when calls can be made to the consumer and must be signed

B.

The consent must be in writing, must contain the number to which calls can be made and must have an end date

C.

The consent must be in writing, must contain the number to which calls can be made and must be signed

D.

The consent must be in writing, must have an end data and must state the times when calls can be made

Buy Now
Questions 29

When may a financial institution share consumer information with non-affiliated third parties for marketing purposes?

Options:

A.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt in.

B.

After disclosing marketing practices to customers and after giving them an opportunity to opt in.

C.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt out.

D.

After disclosing marketing practices to customers and after giving them an opportunity to opt out.

Buy Now
Questions 30

In which situation would a policy of “no consumer choice” or “no option” be expected?

Options:

A.

When a job applicant’s credit report is provided to an employer

B.

When a customer’s financial information is requested by the government

C.

When a patient’s health record is made available to a pharmaceutical company

D.

When a customer’s street address is shared with a shipping company

Buy Now
Questions 31

What was the original purpose of the Foreign Intelligence Surveillance Act?

Options:

A.

To further define what information can reasonably be under surveillance in public places under the USA PATRIOT Act, such as Internet access in public libraries.

B.

To further clarify a reasonable expectation of privacy stemming from the Katz v. United States decision.

C.

To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.

D.

To further clarify when a warrant is not required for a wiretap performed internally by the telephone company outside the suspect’s home, stemming from the Olmstead v. United States decision.

Buy Now
Questions 32

Which federal act does NOT contain provisions for preempting stricter state laws?

Options:

A.

The CAN-SPAM Act

B.

The Children’s Online Privacy Protection Act (COPPA)

C.

The Fair and Accurate Credit Transactions Act (FACTA)

D.

The Telemarketing Consumer Protection and Fraud Prevention Act

Buy Now
Questions 33

According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?

Options:

A.

Determine which bodies will be involved in adjudication

B.

Decide if any enforcement actions are justified

C.

Adhere to its industry’s code of conduct

D.

Appeal decisions made against it

Buy Now
Questions 34

The U.S. Supreme Court has recognized an individual’s right to privacy over personal issues, such as contraception, by acknowledging which of the following?

Options:

A.

Federal preemption of state constitutions that expressly recognize an individual right to privacy.

B.

A “penumbra” of unenumerated constitutional rights as well as more general protections of due process of law.

C.

An interpretation of the U.S. Constitution’s explicit definition of privacy that extends to personal issues.

D.

The doctrine of stare decisis, which allows the U.S. Supreme Court to follow the precedent of previously decided case law.

Buy Now
Questions 35

If an organization certified under Privacy Shield wants to transfer personal data to a third party acting as an agent, the organization must ensure the third party does all of the following EXCEPT?

Options:

A.

Uses the transferred data for limited purposes

B.

Provides the same level of privacy protection as the organization

C.

Notifies the organization if it can no longer meet its requirements for proper data handling

D.

Enters a contract with the organization that states the third party will process data according to the consent agreement

Buy Now
Questions 36

Once a breach has been definitively established, which task should be prioritized next?

Options:

A.

Involving law enforcement and state Attorneys General.

B.

Determining what was responsible for the breach and neutralizing the threat.

C.

Providing notice to the affected parties so they can take precautionary measures.

D.

Implementing remedial measures and evaluating how to prevent future breaches.

Buy Now
Questions 37

John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures in place to safeguard his personal information.

Which of the following answers most accurately reflects John’s ability to pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?

Options:

A.

John has no right to sue the corporation because the CCPA does not address any data breach rights.

B.

John cannot sue the corporation for the data breach because only the state’s Attoney General has authority to file suit under the CCPA.

C.

John can sue the corporation for the data breach but only to recover monetary damages he actually suffered as a result of the data breach.

D.

John can sue the corporation for the data breach to recover monetary damages suffered as a result of the data breach, and in some circumstances seek statutory damages irrespective of whether he suffered any financial harm.

Buy Now
Questions 38

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the best reason for Cheryl to follow Janice’s suggestion about classifying customer data?

Options:

A.

It will help employees stay better organized

B.

It will help the company meet a federal mandate

C.

It will increase the security of customers’ personal information (PI)

D.

It will prevent the company from collecting too much personal information (PI)

Buy Now
Questions 39

Who has rulemaking authority for the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA)?

Options:

A.

State Attorneys General

B.

The Federal Trade Commission

C.

The Department of Commerce

D.

The Consumer Financial Protection Bureau

Buy Now
Questions 40

Which of these organizations would be required to provide its customers with an annual privacy notice?

Options:

A.

The Four Winds Tribal College.

B.

The Golden Gavel Auction House.

C.

The King County Savings and Loan.

D.

The Breezy City Housing Commission.

Buy Now
Questions 41

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

Options:

A.

A consent decree

B.

Stare decisis decree

C.

A judgment rider

D.

Common law judgment

Buy Now
Questions 42

According to the FTC Report of 2012, what is the main goal of Privacy by Design?

Options:

A.

Obtaining consumer consent when collecting sensitive data for certain purposes

B.

Establishing a system of self-regulatory codes for mobile-related services

C.

Incorporating privacy protections throughout the development process

D.

Implementing a system of standardization for privacy notices

Buy Now
Questions 43

Which act violates the Family Educational Rights and Privacy Act of 1974 (FERPA)?

Options:

A.

A K-12 assessment vendor obtains a student’s signed essay about her hometown from her school to use as an exemplar for public release

B.

A university posts a public student directory that includes names, hometowns, e-mail addresses, and majors

C.

A newspaper prints the names, grade levels, and hometowns of students who made the quarterly honor roll

D.

University police provide an arrest report to a student’s hometown police, who suspect him of a similar crime

Buy Now
Questions 44

Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and operating in 7 other states. SMH uses an electronic medical record to enter and track information about its patients. Recently, SMH suffered a data breach where a third-party hacker was able to gain access to the SMH internal network.

Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights at the U.S. Department of Health and Human Services about the breach.

Which statement accurately describes SMH’s notification responsibilities?

Options:

A.

If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York.

B.

If SMH has more than 500 patients in the state of New York, it will need to make separate notifications to these patients.

C.

If SMH must make a notification in any other state in which it operates, it must also make a notification to individuals in New York.

D.

If SMH makes credit monitoring available to individuals who inquire, it will not have to make a separatenotification to individuals in the state of New York.

Buy Now
Questions 45

What consumer service was the Fair Credit Reporting Act (FCRA) originally intended to provide?

Options:

A.

The ability to receive reports from multiple credit reporting agencies.

B.

The ability to appeal negative credit-based decisions.

C.

The ability to correct inaccurate credit information.

D.

The ability to investigate incidents of identity theft.

Buy Now
Questions 46

The Family Educational Rights and Privacy Act (FERPA) requires schools to do all of the following EXCEPT?

Options:

A.

Verify the identity of students who make requests for access to their records.

B.

Provide students with access to their records within a specified amount of time.

C.

Respond to all reasonable student requests regarding explanation of their records.

D.

Obtain student authorization before releasing directory information in their records.

Buy Now
Questions 47

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company’s privacy program?

Options:

A.

Consumers have a right to exercise control over how companies use their personal data.

B.

Consumers have a right to reasonable limits on the personal data that a company retains.

C.

Consumers have a right to easily accessible information about privacy and security practices.

D.

Consumers have a right to correct personal data in a manner that is appropriate to the sensitivity.

Buy Now
Questions 48

Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?

Options:

A.

Announcing the tracking of online behavior for advertising purposes.

B.

Integrating privacy protections during product development.

C.

Allowing consumers to opt in before collecting any data.

D.

Mitigating harm to consumers after a security breach.

Buy Now
Questions 49

Which of the following is an important implication of the Dodd-Frank Wall Street Reform and Consumer Protection Act?

Options:

A.

Financial institutions must avoid collecting a customer’s sensitive personal information

B.

Financial institutions must help ensure a customer’s understanding of products and services

C.

Financial institutions must use a prescribed level of encryption for most types of customer records

D.

Financial institutions must cease sending e-mails and other forms of advertising to customers who opt out of direct marketing

Buy Now
Questions 50

Which of the following is NOT a principle found in the APEC Privacy Framework?

Options:

A.

Integrity of Personal Information.

B.

Access and Correction.

C.

Preventing Harm.

D.

Privacy by Design.

Buy Now
Exam Code: CIPP-US
Exam Name: Certified Information Privacy Professional/United States (CIPP/US)
Last Update: Apr 25, 2024
Questions: 168
$64  $159.99
$48  $119.99
$40  $99.99
buy now CIPP-US