ExamGecko
Home Home / IAPP / CIPP-A

IAPP CIPP-A Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions

SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. Members of Relax Ltd's staff are concerned about the data sharing with StarOne. How should Zoe respond to their concerns?





SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker. What is Zoe's best course of action?





SCENARIO – Please use the following to answer the next question:

Bharat Medicals is an established retail chain selling medical goods, with a presence in a number of cities throughout India.

Their strategic partnership with major hospitals in these cities helped them capture an impressive market share over the years. However, with lifestyle and demographic shifts in India, the company saw a huge opportunity in door-to-door delivery of essential medical products. The need for such a service was confirmed by an independent consumer survey the firm conducted recently.

The company has launched their e-commerce platform in three metro cities, and plans to expand to the rest of the country in the future. Consumers need to register on the company website before they can make purchases. They are required to enter details such as name, age, address, telephone number, sex, date of birth and nationality – information that is stored on the company's servers. (Consumers also have the option of keeping their credit card number on file, so that it does not have to be entered every time they make payment.) If ordered items require a prescription, that authorization needs to be uploaded as well. The privacy notice explicitly requires that the consumer confirm that he or she is either the patient or has consent of the patient for uploading the health information. After creating a unique user ID and password, the consumer's registration will be confirmed through a text message sent to their listed mobile number.

To remain focused on their core business, Bharat outsourced the packaging, product dispatch and delivery activities to a third party firm, Maurya Logistics Ltd., with which it has a contractual agreement. It shares with Maurya Logistics the consumer name, address and other product-related details at the time of every purchase.

If consumers underwent medical treatment at one of the partner hospitals and consented to having their data transferred, their order requirement will be sent to their Bharat Medicals account directly, thereby doing away with the need to manually place an order for the medications.

Bharat Medicals takes regulatory compliance seriously; to ensure data privacy, it displays a privacy notice at the time of registration, and includes all the information that it collects. At this stage of their business, the company plans to store consumer information indefinitely, since the percentage of repeat customers and the frequency of orders per customer is still uncertain.

If a patient withdraws consent provided to one of the partner hospitals regarding the transfer of their data, which of the following would be true?

A.

The patient cannot purchase medications from Bharat Medicals.

A.

The patient cannot purchase medications from Bharat Medicals.

Answers
B.

The hospital has the right to refuse withdrawal of consent since it has a partnership with Bharat Medicals.

B.

The hospital has the right to refuse withdrawal of consent since it has a partnership with Bharat Medicals.

Answers
C.

The hospital will obtain the necessary medications from Bharat Medicals and provide them directly to patient.

C.

The hospital will obtain the necessary medications from Bharat Medicals and provide them directly to patient.

Answers
D.

The patient can buy medications from Bharat Medicals by uploading prescription to the Bharat Medicals website.

D.

The patient can buy medications from Bharat Medicals by uploading prescription to the Bharat Medicals website.

Answers
Suggested answer: D

The judgement of the Supreme Court in 2017 in the case of Justice K.S. Puttaswamy (retd.) and Anr. vs. Union of India held that?

A.

Right to Privacy is a fundamental right guaranteed by the Constitution.

A.

Right to Privacy is a fundamental right guaranteed by the Constitution.

Answers
B.

Right to Privacy is an intrinsic part of Art. 21 of the Constitution.

B.

Right to Privacy is an intrinsic part of Art. 21 of the Constitution.

Answers
C.

Right to life and personal liberty includes the right to Privacy.

C.

Right to life and personal liberty includes the right to Privacy.

Answers
D.

Right to Privacy is the right to be left alone.

D.

Right to Privacy is the right to be left alone.

Answers
Suggested answer: A

Explanation:

Reference: https://www.scobserver.in/reports/k-s-puttaswamy-right-to-privacy-judgment-of-the-court-in-plain-englishi/#:~:text=On%2024th%20August%2C%202017%20a,a%20fundamental%20right%20to %20privacy

Which concept is NOT an element of Cross Border Privacy Rules (CBPR)?

A.

Enforcement by Accountability Agents.

A.

Enforcement by Accountability Agents.

Answers
B.

Self-assessment against CBPR questionnaire.

B.

Self-assessment against CBPR questionnaire.

Answers
C.

Consultation with Privacy Enforcement (PE) Authority.

C.

Consultation with Privacy Enforcement (PE) Authority.

Answers
D.

Dispute resolution via the Accountability Agent's compliance program.

D.

Dispute resolution via the Accountability Agent's compliance program.

Answers
Suggested answer: B

Explanation:

Reference: https://www.apec.org/About-Us/About-APEC/Fact-Sheets/What-is-the-Cross-Border-Privacy-Rules-System

Under India's IT Rules 2011, data subjects have the right to correct inaccuracies in personal information collected about them only if?

A.

They are also the providers of the information.

A.

They are also the providers of the information.

Answers
B.

They confirm their consent to maintain the information.

B.

They confirm their consent to maintain the information.

Answers
C.

They are able to prove the legitimacy of the corrections.

C.

They are able to prove the legitimacy of the corrections.

Answers
D.

They request the corrections within a specified amount of time.

D.

They request the corrections within a specified amount of time.

Answers
Suggested answer: A

What term is defined by the European Commission to mean any data that relates to an identified or identifiable individual?

A.

Personally identifiable information.

A.

Personally identifiable information.

Answers
B.

Sensitive information.

B.

Sensitive information.

Answers
C.

Personal data.

C.

Personal data.

Answers
D.

Identified data.

D.

Identified data.

Answers
Suggested answer: C

Explanation:

Reference: https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-personal-data_en

In addition to adhering to the data export principle of section 43A of India's IT Act 2000, data exporters in India must also follow principles of?

A.

Privity of contract.

A.

Privity of contract.

Answers
B.

Disclosure limitation.

B.

Disclosure limitation.

Answers
C.

Mandatory registration.

C.

Mandatory registration.

Answers
D.

Third party assessment.

D.

Third party assessment.

Answers
Suggested answer: C

SCENARIO – Please use the following to answer the next question:

Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data.

Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge.

Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed.

Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories.

Assuming that Section 33 is in force, which of the following would NOT help Zoe to facilitate the cross-border transfer from Hong Kong to China?

A.

Consent of the guest in writing to the transfer.

A.

Consent of the guest in writing to the transfer.

Answers
B.

Amending StarOne's privacy policy to refer to the transfer.

B.

Amending StarOne's privacy policy to refer to the transfer.

Answers
C.

Putting in place Model Clauses between the relevant entities.

C.

Putting in place Model Clauses between the relevant entities.

Answers
D.

China being included as a "White List" country for data transfer.

D.

China being included as a "White List" country for data transfer.

Answers
Suggested answer: A

Besides the Personal Data Protection Act (PDPA), which of the following is a potential source of privacy protection for Singapore citizens?

A.

Constitutional protections of personal information.

A.

Constitutional protections of personal information.

Answers
B.

International agreements protecting privacy.

B.

International agreements protecting privacy.

Answers
C.

The tort of invasion of privacy.

C.

The tort of invasion of privacy.

Answers
D.

Breach of confidence law.

D.

Breach of confidence law.

Answers
Suggested answer: A

In India's IT Rules 2011, which is included in the definition of "sensitive personal data"?

A.

Tax records.

A.

Tax records.

Answers
B.

IP addresses.

B.

IP addresses.

Answers
C.

Next of kin.

C.

Next of kin.

Answers
D.

Sexual Orientation.

D.

Sexual Orientation.

Answers
Suggested answer: D

Explanation:

Reference: https://www.mondaq.com/india/privacy-protection/904916/a-review-of-the-information-technology-rules-2011-

How are the scope of Singapore's Personal Data Protection Act and the scope of India's IT Rules similar?

A.

They only apply to the private sector.

A.

They only apply to the private sector.

Answers
B.

They allow exemptions for military personnel.

B.

They allow exemptions for military personnel.

Answers
C.

They apply to controllers and processors alike.

C.

They apply to controllers and processors alike.

Answers
D.

They impose obligations on individuals acting in a domestic capacity.

D.

They impose obligations on individuals acting in a domestic capacity.

Answers
Suggested answer: C
Total 93 questions
Go to page: of 10