IAPP CIPM Practice Test - Questions Answers, Page 18
List of questions
Related questions
SCENARIO
Please use the following to answer the next QUESTION:
As the Director of data protection for Consolidated Records Corporation, you are justifiably pleased with your accomplishments so far. Your hiring was precipitated by warnings from regulatory agencies following a series of relatively minor data breaches that could easily have been worse. However, you have not had a reportable incident for the three years that you have been with the company. In fact, you consider your program a model that others in the data storage industry may note in their own program development.
You started the program at Consolidated from a jumbled mix of policies and procedures and worked toward coherence across departments and throughout operations. You were aided along the way by the program's sponsor, the vice president of operations, as well as by a Privacy Team that started from a clear understanding of the need for change.
Initially, your work was greeted with little confidence or enthusiasm by the company's 'old guard' among both the executive team and frontline personnel working with data and interfacing with clients. Through the use of metrics that showed the costs not only of the breaches that had occurred, but also projections of the costs that easily could occur given the current state of operations, you soon had the leaders and key decision-makers largely on your side. Many of the other employees were more resistant, but face-to-face meetings with each department and the development of a baseline privacy training program achieved sufficient 'buy-in' to begin putting the proper procedures into place.
Now, privacy protection is an accepted component of all current operations involving personal or protected data and must be part of the end product of any process of technological development. While your approach is not systematic, it is fairly effective.
You are left contemplating:
What must be done to maintain the program and develop it beyond just a data breach prevention program? How can you build on your success?
What are the next action steps?
What process could most effectively be used to add privacy protections to a new, comprehensive program being developed at Consolidated?
Privacy by Design.
Privacy Step Assessment.
Information Security Planning.
Innovation Privacy Standards.
Which of the following indicates you have developed the right privacy framework for your organization?
It includes a privacy assessment of each major system.
It improves the consistency of the privacy program.
It works at a different type of organization.
It identifies all key stakeholders by name.
Rationalizing requirements in order to comply with the various privacy requirements required by applicable law and regulation does NOT include which of the following?
Harmonizing shared obligations and privacy rights across varying legislation and/or regulators.
Implementing a solution that significantly addresses shared obligations and privacy rights.
Applying the strictest standard for obligations and privacy rights that doesn't violate privacy laws elsewhere.
Addressing requirements that fall outside the common obligations and rights (outliers) on a case-by-case basis.
What is the name for the privacy strategy model that describes delegated decision making?
De-centralized.
De-functionalized.
Hybrid.
Matrix.
Which of the following controls does the PCI DSS framework NOT require?
Implement strong asset control protocols.
Implement strong access control measures.
Maintain an information security policy.
Maintain a vulnerability management program.
Which of the following privacy frameworks are legally binding?
Binding Corporate Rules (BCRs).
Generally Accepted Privacy Principles (GAPP).
Asia-Pacific Economic Cooperation (APEC) Privacy Framework.
Organization for Economic Co-Operation and Development (OECD) Guidelines.
Your marketing team wants to know why they need a check box for their SMS opt-in. You explain it is part of the consumer's right to?
Request correction.
Raise complaints.
Have access.
Be informed.
When conducting due diligence during an acquisition, what should a privacy professional avoid?
Discussing with the acquired company the type and scope of their data processing.
Allowing legal in both companies to handle the privacy laws and compliance.
Planning for impacts on the data processing operations post-acquisition.
Benchmarking the two Companies privacy policies against one another.
SCENARIO
Please use the following to answer the next question
You were recently hired by InStyte Date Corp as a privacy manager to help InStyle Data Corp become compliant with a new data protection law
The law mandates that businesses have reasonable and appropriate security measures in place to protect personal data. Violations of that mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don t comply with the new law
You are paved with a security manager and tasked with reviewing InStyle Data Corp s current state and advising the business how it can meet the 'reasonable and appropriate security' requirement InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data mapping InStyte Data Corp has also developed security-related policies ad hoc and many have never been implemented The various teams involved in the creation and testing of InStyle Data Corp s products experience significant turnover and do not have well defined roles There's little documentation addressing what personal data is processed by which product and for what purpose
Work needs to begin on this project immediately so that InStyle Data Corp can become compliant by the time the law goes into effect. You and you partner discover that InStyle Data Corp regularly sends files containing sensitive personal data back to its customers through email sometimes using InStyle Data Corp employees personal email accounts. You also team that InStyle Data Corp s privacy and information security teams are not informed of new personal data flows, new products developed by InStyte Data Corp that process personal data, or updates to existing InStyle Data Corp products that may change what or how the personal data is processed until after the product or update has gone have.
Through a review of InStyle Date Corp's test and development environment logs, you discover InStyle Data Corp sometimes gives login credentials to any InStyle Data Corp employee or contractor who requests them. The test environment only contains dummy data but the development environment contains personal data including Social Security Numbers, hearth ^formation and financial information All credentialed InStyle Data Corp employees and contractors have the ability to after and delete personal data in both environments regardless of their role or what project they are working on.
You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to measure implementation InStyle Data Corp implements all of the recommended security controls You review the processes roles, controls and measures taken to appropriately protect the personal data at every stop However, you realize there is no plan for monitoring and nothing in place addressing sanctions for violations of the updated policies and procedures InStyle Data Corp pushes back, stating they do not have the resources for such monitoring.
What aspect of the data management life cycle will still be unaddressed it you cannot find the resources to become compliant?
Auditability.
Enforcement
Irretrievability
Access management
SCENARIO
Please use the following to answer the next question
You were recently hired by InStyte Date Corp as a privacy manager to help InStyle Data Corp become compliant with a new data protection law
The law mandates that businesses have reasonable and appropriate security measures in place to protect personal data. Violations of that mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don t comply with the new law
You are paved with a security manager and tasked with reviewing InStyle Data Corp s current state and advising the business how it can meet the 'reasonable and appropriate security' requirement InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data mapping InStyte Data Corp has also developed security-related policies ad hoc and many have never been implemented The various teams involved in the creation and testing of InStyle Data Corp s products experience significant turnover and do not have well defined roles There's little documentation addressing what personal data is processed by which product and for what purpose
Work needs to begin on this project immediately so that InStyle Data Corp can become compliant by the time the law goes into effect. You and you partner discover that InStyle Data Corp regularly sends files containing sensitive personal data back to its customers through email sometimes using InStyle Data Corp employees personal email accounts. You also team that InStyle Data Corp s privacy and information security teams are not informed of new personal data flows, new products developed by InStyte Data Corp that process personal data, or updates to existing InStyle Data Corp products that may change what or how the personal data is processed until after the product or update has gone have.
Through a review of InStyle Date Corp's test and development environment logs, you discover InStyle Data Corp sometimes gives login credentials to any InStyle Data Corp employee or contractor who requests them. The test environment only contains dummy data but the development environment contains personal data including Social Security Numbers, hearth ^formation and financial information All credentialed InStyle Data Corp employees and contractors have the ability to after and delete personal data in both environments regardless of their role or what project they are working on.
You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to measure implementation InStyle Data Corp implements all of the recommended security controls You review the processes roles, controls and measures taken to appropriately protect the personal data at every stop However, you realize there is no plan for monitoring and nothing in place addressing sanctions for violations of the updated policies and procedures InStyle Data Corp pushes back, stating they do not have the resources for such monitoring.
Having completed the gap assessment, you and your partner need to first undertake a thorough review of?
Data life cyde
Security policies.
System development life cycle.
Privacy Impact (PIA).
Question