ExamGecko
Home Home / IAPP / CIPP-A

IAPP CIPP-A Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions




SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. Members of Relax Ltd's staff are concerned about the data sharing with StarOne. How should Zoe respond to their concerns?


SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker. What is Zoe's best course of action?



SCENARIO – Please use the following to answer the next question: Fitness For Everyone ("FFE") is a gym on Hong Kong Island that is affiliated with a network of gyms throughout Southeast Asia. When prospective members of the gym stop in, call in or submit an inquiry online, they are invited for a free trial session. At first, the gym asks prospective clients only for basic information: a full name, contact number, age and their Hong Kong ID number, so that FFE's senior trainer Kelvin can reach them to arrange their first appointment. One day, a potential customer named Stephen took a tour of the gym with Kelvin and then decided to join FFE for six months. Kelvin pulled out a registration form and explained FFE's policies, placing a circle next to the part that read "FEE and affiliated third parties" may market new products and services using the contact information provided on the form to Stephen "for the duration of his membership." Stephen asked if he could opt-out of the marketing communications. Kelvin shrugged and said that it was a standard part of the contract and that most gyms have it, but that even so Kelvin's manager wanted the item circled on all forms. Stephen agreed, signed the registration form at the bottom of the page, and provided his credit card details for a monthly gym fee. He also exchanged instant messenger/cell details with Kelvin so that they could communicate about personal training sessions scheduled to start the following week. After attending the gym consistently for six months, Stephen's employer transferred him to another part of the Island, so he did not renew his FFE membership. One year later, Stephen started to receive numerous text messages each day from unknown numbers, most marketing gym or weight loss products. Suspecting that FFE shared his information widely, he contacted his old FFE branch and asked reception if they still had his information on file. They did, but offered to delete it if he wished. He was told FFE's process to purge his information from all the affiliated systems might take 8 to 12 weeks. FFE also informed him that Kelvin was no longer employed by FFE and had recently started working for a competitor. FFE believed that Kelvin may have shared the mobile contact details of his clients with the new gym, and apologized for this inconvenience. Assuming that Kelvin received a commission for sharing his former client list with the new employer, and the new employer used Stephen's data to engage in direct marketing to Stephen, which of the following penalties could Kelvin face under Part VI A of the Ordinance?


In what case would a foreign company NOT be liable for breaches of Singapore's PDPA?

A.

If it has a physical office in Singapore.

A.

If it has a physical office in Singapore.

Answers
B.

If it is storing information in Singapore.

B.

If it is storing information in Singapore.

Answers
C.

If it is collecting personal information in Singapore.

C.

If it is collecting personal information in Singapore.

Answers
D.

If it collects information from Singaporeans living abroad.

D.

If it collects information from Singaporeans living abroad.

Answers
Suggested answer: D

Explanation:

Reference: https://www.dataguidance.com/notes/singapore-data-protection-overview

In what way are Singapore residents protected following a data breach in ways that India and Hong Kong residents are not?

A.

The affected individuals must be informed when significant harm is likely to occur.

A.

The affected individuals must be informed when significant harm is likely to occur.

Answers
B.

The relevant authority must be informed of such data breach following its discovery.

B.

The relevant authority must be informed of such data breach following its discovery.

Answers
C.

The company must have in place a data breach response plan including third-parties.

C.

The company must have in place a data breach response plan including third-parties.

Answers
D.

The breach must be reported to the relevant authority within 72 hours of the discovery.

D.

The breach must be reported to the relevant authority within 72 hours of the discovery.

Answers
Suggested answer: A

Explanation:

Reference: https://www.dataguidance.com/notes/singapore-data-protection-overview

Which was NOT listed as an individual right in the 1998 Fair Information Practice Principles (FIPPs)?

A.

Notice.

A.

Notice.

Answers
B.

Choice.

B.

Choice.

Answers
C.

Right to erasure.

C.

Right to erasure.

Answers
D.

Right to data access.

D.

Right to data access.

Answers
Suggested answer: B

What emerged as the main reason for creating a comprehensive data protection law when Singapore ministers met between 2005 and 2011?

A.

To control increasing technological threats.

A.

To control increasing technological threats.

Answers
B.

To raise Singapore's human rights standing.

B.

To raise Singapore's human rights standing.

Answers
C.

To limit the scope of governmental surveillance.

C.

To limit the scope of governmental surveillance.

Answers
D.

To enhance Singapore's economic competitiveness.

D.

To enhance Singapore's economic competitiveness.

Answers
Suggested answer: D

In Singapore, a potential employer can collect all of the following data on an individual in the pre-employment phase EXCEPT?

A.

Postings from social media websites.

A.

Postings from social media websites.

Answers
B.

Information from a background check.

B.

Information from a background check.

Answers
C.

Information about the individual's children.

C.

Information about the individual's children.

Answers
D.

The individual's university attendance records.

D.

The individual's university attendance records.

Answers
Suggested answer: B

Protection of which kind of personal information is NOT explicitly mentioned in the privacy laws of Hong Kong, Singapore, and India?

A.

Sensitive data.

A.

Sensitive data.

Answers
B.

Children's data.

B.

Children's data.

Answers
C.

Outsourced data.

C.

Outsourced data.

Answers
D.

Extraterritorial data.

D.

Extraterritorial data.

Answers
Suggested answer: B

SCENARIO – Please use the following to answer the next question:

Fitness For Everyone ("FFE") is a gym on Hong Kong Island that is affiliated with a network of gyms throughout Southeast Asia. When prospective members of the gym stop in, call in or submit an inquiry online, they are invited for a free trial session. At first, the gym asks prospective clients only for basic information: a full name, contact number, age and their Hong Kong ID number, so that FFE's senior trainer Kelvin can reach them to arrange their first appointment.

One day, a potential customer named Stephen took a tour of the gym with Kelvin and then decided to join FFE for six months. Kelvin pulled out a registration form and explained FFE's policies, placing a circle next to the part that read "FEE and affiliated third parties" may market new products and services using the contact information provided on the form to Stephen "for the duration of his membership." Stephen asked if he could opt-out of the marketing communications. Kelvin shrugged and said that it was a standard part of the contract and that most gyms have it, but that even so Kelvin's manager wanted the item circled on all forms. Stephen agreed, signed the registration form at the bottom of the page, and provided his credit card details for a monthly gym fee. He also exchanged instant messenger/cell details with Kelvin so that they could communicate about personal training sessions scheduled to start the following week.

After attending the gym consistently for six months, Stephen's employer transferred him to another part of the Island, so he did not renew his FFE membership.

One year later, Stephen started to receive numerous text messages each day from unknown numbers, most marketing gym or weight loss products.

Suspecting that FFE shared his information widely, he contacted his old FFE branch and asked reception if they still had his information on file. They did, but offered to delete it if he wished. He was told FFE's process to purge his information from all the affiliated systems might take 8 to 12 weeks. FFE also informed him that Kelvin was no longer employed by FFE and had recently started working for a competitor. FFE believed that Kelvin may have shared the mobile contact details of his clients with the new gym, and apologized for this inconvenience.

Which of the following types of text messages are permissible, regardless of Stephen's withdrawal of consent?

A.

From the FFE retention department, offering a special discount for reactivating membership.

A.

From the FFE retention department, offering a special discount for reactivating membership.

Answers
B.

From health care services provided by Hong Kong's Hospital Authority or Department of Health.

B.

From health care services provided by Hong Kong's Hospital Authority or Department of Health.

Answers
C.

From an FFE affiliate that provides a mechanism to opt out of further communications by reply-texting "OO."

C.

From an FFE affiliate that provides a mechanism to opt out of further communications by reply-texting "OO."

Answers
D.

From an FFE affiliate in the region Stephen was transferred to, offering services similar to those he purchased previously.

D.

From an FFE affiliate in the region Stephen was transferred to, offering services similar to those he purchased previously.

Answers
Suggested answer: C

SCENARIO – Please use the following to answer the next question:

Delilah is seeking employment in the marketing department of Good Mining Private Limited, an industry leader in drilling mines in Singapore. Delilah, while filling in the standard paper application form, is asked to provide details about emergency contacts, medical history, blood type and her insurance policy. These fields need to be filled in no matter which department Delilah applies to. The form also asks Delilah to expressly consent to the collection, use and disclosure of her personal data.

A week after submitting the form, Delilah is invited by Evan, the Director of Marketing at Good Mining, to coffee. Just before Delilah leaves, she gives her business card containing her current business contact information to Evan. Evan then uses the business card to add Delilah's details to Good Mining's business development database, which is kept on a local server.

Good Mining uses the database to inform people about networking and client events that Good Mining organizes.

Why is Good Mining Private's standard form NOT compliant with Singapore's data protection law?

A.

It is not available in an electronic format.

A.

It is not available in an electronic format.

Answers
B.

It does not contain the contact information for the HR manager.

B.

It does not contain the contact information for the HR manager.

Answers
C.

It asks for Delilah's consent to use and disclose her personal data.

C.

It asks for Delilah's consent to use and disclose her personal data.

Answers
D.

It asks for details that are not relevant to the job Delilah is applying for.

D.

It asks for details that are not relevant to the job Delilah is applying for.

Answers
Suggested answer: D

SCENARIO – Please use the following to answer the next question:

Fitness For Everyone ("FFE") is a gym on Hong Kong Island that is affiliated with a network of gyms throughout Southeast Asia. When prospective members of the gym stop in, call in or submit an inquiry online, they are invited for a free trial session. At first, the gym asks prospective clients only for basic information: a full name, contact number, age and their Hong Kong ID number, so that FFE's senior trainer Kelvin can reach them to arrange their first appointment.

One day, a potential customer named Stephen took a tour of the gym with Kelvin and then decided to join FFE for six months. Kelvin pulled out a registration form and explained FFE's policies, placing a circle next to the part that read "FEE and affiliated third parties" may market new products and services using the contact information provided on the form to Stephen "for the duration of his membership." Stephen asked if he could opt-out of the marketing communications. Kelvin shrugged and said that it was a standard part of the contract and that most gyms have it, but that even so Kelvin's manager wanted the item circled on all forms. Stephen agreed, signed the registration form at the bottom of the page, and provided his credit card details for a monthly gym fee. He also exchanged instant messenger/cell details with Kelvin so that they could communicate about personal training sessions scheduled to start the following week.

After attending the gym consistently for six months, Stephen's employer transferred him to another part of the Island, so he did not renew his FFE membership.

One year later, Stephen started to receive numerous text messages each day from unknown numbers, most marketing gym or weight loss products.

Suspecting that FFE shared his information widely, he contacted his old FFE branch and asked reception if they still had his information on file. They did, but offered to delete it if he wished. He was told FFE's process to purge his information from all the affiliated systems might take 8 to 12 weeks. FFE also informed him that Kelvin was no longer employed by FFE and had recently started working for a competitor. FFE believed that Kelvin may have shared the mobile contact details of his clients with the new gym, and apologized for this inconvenience.

Which of the following FFE data retention policies would be permitted under Section 26 of the Personal Data (Privacy) Ordinance and Hong Kong Data Protection Principle 2 regarding accuracy and retention?

A.

Retain the data of members who have been suspended for non-payment, in the event that the data is needed to seek compensation in a court of law.

A.

Retain the data of members who have been suspended for non-payment, in the event that the data is needed to seek compensation in a court of law.

Answers
B.

Retain all member data and documents in original form for two years after account termination, to better inform marketing efforts focused on re-activating accounts of former customers.

B.

Retain all member data and documents in original form for two years after account termination, to better inform marketing efforts focused on re-activating accounts of former customers.

Answers
C.

Retain an anonymous data set after account termination indicating dates of membership, age, and other statistical data, to be included in aggregate reports about gym membership trends.

C.

Retain an anonymous data set after account termination indicating dates of membership, age, and other statistical data, to be included in aggregate reports about gym membership trends.

Answers
D.

Retain copies of files of customers who utilized personal trainer services for six months after account termination, to allow trainers to respond to inquiries from personal physicians about training-related injuries.

D.

Retain copies of files of customers who utilized personal trainer services for six months after account termination, to allow trainers to respond to inquiries from personal physicians about training-related injuries.

Answers
Suggested answer: C

What benefit does making data pseudonymous offer to data controllers?

A.

It ensures that it is impossible to re-identify the data.

A.

It ensures that it is impossible to re-identify the data.

Answers
B.

It eliminates the responsibility to report data breaches.

B.

It eliminates the responsibility to report data breaches.

Answers
C.

It allows for further use of the data for research purposes.

C.

It allows for further use of the data for research purposes.

Answers
D.

It eliminates the need for a policy specifying data subject access rights.

D.

It eliminates the need for a policy specifying data subject access rights.

Answers
Suggested answer: A

Explanation:

Reference: https://www.i-scoop.eu/gdpr/pseudonymization/

Total 93 questions
Go to page: of 10