IAPP CIPM Practice Test - Questions Answers, Page 13
List of questions
Related questions
When devising effective employee policies to address a particular issue, which of the following should be included in the first draft?
Rationale for the policy.
Points of contact for the employee.
Roles and responsibilities of the different groups of individuals.
Explanation of how the policy is applied within the organization.
Your company wants to convert paper records that contain customer personal information into electronic form, upload the records into a new third-party marketing tool and then merge the customer personal information in the marketing tool with information from other applications.
As the Privacy Officer, which of the following should you complete to effectively make these changes?
A Record of Authority.
A Personal Data Inventory.
A Privacy Threshold Analysis (PTA).
A Privacy Impact Assessment (PIA).
A minimum requirement for carrying out a Data Protection Impact Assessment (DPIA) would include?
Processing on a large scale of special categories of data.
Monitoring of a publicly accessible area on a large scale.
Assessment of the necessity and proportionality.
Assessment of security measures.
Which of the following best supports implementing controls to bring privacy policies into effect?
The internal audit department establishing the audit controls which test for policy effectiveness.
The legal department or outside counsel conducting a thorough review of the privacy program and policies.
The Chief Information Officer as part of the Senior Management Team creating enterprise privacy policies to ensure controls are available.
The information technology (IT) group supporting and enhancing the privacy program and privacy policy by developing processes and controls.
What is most critical when outsourcing data destruction service?
Obtain a certificate of data destruction.
Confirm data destruction must be done on-site.
Conduct an annual in-person audit of the provider's facilities.
Ensure that they keep an asset inventory of the original data.
Data retention and destruction policies should meet all of the following requirements EXCEPT?
Data destruction triggers and methods should be documented.
Personal information should be retained only for as long as necessary to perform its stated purpose.
Documentation related to audit controls (third-party or internal) should be saved in a non-permanent format by default.
The organization should be documenting and reviewing policies of its other functions to ensure alignment (e.g. HR, business development, finance, etc.).
What is least likely to be achieved by implementing a Data Lifecycle Management (DLM) program?
Reducing storage costs.
Ensuring data is kept for no longer than necessary.
Crafting policies which ensure minimal data is collected.
Increasing awareness of the importance of confidentiality.
There are different forms of monitoring available for organizations to consider when aligning with their privacy program goals.
Which of the following forms of monitoring is best described as 'auditing'?
Evaluating operations, systems, and processes.
Tracking, reporting and documenting complaints from all sources.
Assisting in the completion of attesting reporting for SOC2, ISO, or BS7799.
Ensuring third parties have appropriate security and privacy requirements in place.
Which will best assist you in quickly identifying weaknesses in your network and storage?
Running vulnerability scanning tools.
Reviewing your privacy program metrics.
Reviewing your role-based access controls.
Establishing a complaint-monitoring process.
Which of the following is NOT a type of privacy program metric?
Business enablement metrics.
Data enhancement metrics.
Value creation metrics.
Risk-reduction metrics.
Question