IAPP CIPM Practice Test - Questions Answers, Page 15
List of questions
Related questions
While trying to e-mail her manager, an employee has e-mailed a list of all the company's customers, including their bank details, to an employee with the same name at a different company. Which of the following would be the first stage in the incident response plan under the General Data Protection Regulation (GDPR)?
Notification to data subjects.
Containment of impact of breach.
Remediation offers to data subjects.
Notification to the Information Commissioner's Office (ICO).
Which of the following is NOT a type of privacy program metric?
Business enablement metrics.
Data enhancement metrics.
Value creation metrics.
Commercial metrics.
Your company provides a SaaS tool for B2B services and does not interact with individual consumers. A client's current employee reaches out with a right to delete request. what is the most appropriate response?
Forward the request to the contact on file for the client asking them how they would like you to proceed.
Redirect the individual back to their employer to understand their rights and how this might impact access to company tools.
Process the request assuming that the individual understands the implications to their organization if their information is deleted.
Explain you are unable to process the request because business contact information and associated data is not covered under privacy rights laws.
When a data breach incident has occurred. the first priority is to determine?
Who caused the breach.
How the breach occurred.
How to contain the breach.
When the breach occurred.
Which of the following is NOT a main technical data control area?
Obfuscation.
Tokenization.
Access controls.
Data minimization.
Integrating privacy requirements into functional areas across the organization happens at which stage of the privacy operational life cycle?
Assessing data.
Protecting personal data.
Sustaining program performance.
Responding to requests and incidents.
Under the General Data Protection Regulation (GDPR), what must be included in a written agreement between the controller and processor in relation to processing conducted on the controller's behalf?
An obligation on the processor to report any personal data breach to the controller within 72 hours,
An obligation on both parties to report any serious personal data breach to the supervisory authority
An obligation on both parties to agree to a termination of the agreement if the other party is responsible for a personal data breach.
An obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches.
Under the GDPR. when the applicable lawful basis for the processing of personal data is a legal obligation with which the controller must comply. which right can the data subject exercise?
Right to withdraw consent.
Right to data portability.
Right to restriction.
Right to erasure.
Which of the following is a physical control that can limit privacy risk?
Keypad or biometric access.
user access reviews.
Encryption.
Tokenization.
Under the General Data Protection Regulation (GDPR), what are the obligations of a processor that engages a sub-processor?
The processor must give the controller prior written notice and perform a preliminary audit of the sub-processor.
The processor must Obtain the controllers specifiC written authorization and provide annual reports on the sub-processor'S performance.
The processor must receive a written agreement that the sub-processor will be fully liable to the controller for the performance of its obligations in relation to the personal data concerned.
The processor must obtain the consent of the controller and ensure the sub-processor complies with data processing obligations that are equivalent to those that apply to the processor.
Question