ExamGecko
Home Home / IAPP / CIPP-E

IAPP CIPP-E Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions


SCENARIO Please use the following to answer the next question: ProStorage is a multinational cloud storage provider headquartered in the Netherlands. Its CEO. Ruth Brown, has developed a two-pronged strategy for growth: 1) expand ProStorage s global customer base and 2) increase ProStorage's sales force by efficiently onboarding effective teams. Enacting this strategy has recently been complicated by Ruth's health condition, which has limited her working hours, as well as her ability to travel to meet potential customers. ProStorage's Human Resources department and Ruth's Chief of Staff now work together to manage her schedule and ensure that she is able to make all her medical appointments The latter has become especially crucial after Ruth's last trip to India, where she suffered a medical emergency and was hospitalized m New Delhi Unable to reach Ruths family, the hospital reached out to ProStorage and was able to connect with her Chief of Staff, who in coordination with Mary, the head of HR. provided information to the doctors based on accommodate on requests Ruth made when she started a: ProStorage In support of Ruth's strategic goals of hiring more sales representatives, the Human Resources team is focused on improving its processes to ensure that new employees are sourced, interviewed, hired, and onboarded efficiently. To help with this, Mary identified two vendors, HRYourWay, a German based company, and InstaHR, an Australian based company. She decided to have both vendors go through ProStorage's vendor risk review process so she can work with Ruth to make the final decision. As part of the review process, Jackie, who is responsible for maintaining ProStorage's privacy program (including maintaining controller BCRs and conducting vendor risk assessments), reviewed both vendors but completed a transfer impact assessment only for InstaHR. After her review of both boasted a more established privacy program and provided third-party attestations, whereas HRYourWay was a small vendor with minimal data protection operations. Thus, she recommended InstaHR. ProStorage's marketing team also worked to meet the strategic goals of the company by focusing on industries where it needed to grow its market share. To help with this, the team selected as a partner UpFinance, a US based company with deep connections to financial industry customers. During ProStorage's diligence process, Jackie from the privacy team noted in the transfer impact assessment that UpFinance implements several data protection measures including end-to-end encryption, with encryption keys held by the customer. Notably, UpFinance has not received any government requests in its 7 years of business. Still, Jackie recommended that the contract require UpFinance to notify ProStorage if it receives a government request for personal data UpFinance processes on its behalf prior to disclosing such data. What transfer mechanism did ProStorage most likely rely on to transfer Ruth's medical information to the hospital?








SCENARIO Please use the following to answer the next question: Brady is a computer programmer based in New Zealand who has been running his own business for two years. Brady's business provides a low-cost suite of services to customers throughout the European Economic Area (EEA). The services are targeted towards new and aspiring small business owners. Brady's company, called Brady Box, provides web page design services, a Social Networking Service (SNS) and consulting services that help people manage their own online stores. Unfortunately, Brady has been receiving some complaints. A customer named Anna recently uploaded her plans for a new product onto Brady Box's chat area, which is open to public viewing. Although she realized her mistake two weeks later and removed the document, Anna is holding Brady Box responsible for not noticing the error through regular monitoring of the website. Brady believes he should not be held liable. Another customer, Felipe, was alarmed to discover that his personal information was transferred to a third- party contractor called Hermes Designs and worries that sensitive information regarding his business plans may be misused. Brady does not believe he violated European privacy rules. He provides a privacy notice to all of his customers explicitly stating that personal data may be transferred to specific third parties in fulfillment of a requested service. Felipe says he read the privacy notice but that it was long and complicated Brady continues to insist that Felipe has no need to be concerned, as he can personally vouch for the integrity of Hermes Designs. In fact, Hermes Designs has taken the initiative to create sample customized banner advertisements for customers like Felipe. Brady is happy to provide a link to the example banner ads, now posted on the Hermes Designs webpage. Hermes Designs plans on following up with direct marketing to these customers. Brady was surprised when another customer, Serge, expressed his dismay that a quotation by him is being used within a graphic collage on Brady Box's home webpage. The quotation is attributed to Serge by first and last name. Brady, however, was not worried about any sort of litigation. He wrote back to Serge to let him know that he found the quotation within Brady Box's Social Networking Service (SNS), as Serge himself had posted the quotation. In his response, Brady did offer to remove the quotation as a courtesy. Despite some customer complaints, Brady's business is flourishing. He even supplements his income through online behavioral advertising (OBA) via a third-party ad network with whom he has set clearly defined roles. Brady is pleased that, although some customers are not explicitly aware of the OBA, the advertisements contain useful products and services. Under the General Data Protection Regulation (GDPR), what is the most likely reason Serge may have grounds to object to the use of his quotation?

According to Article 84 of the GDPR, the rules on penalties applicable to infringements shall be laid down by?

A.

The local Data Protection Supervisory Authorities.

A.

The local Data Protection Supervisory Authorities.

Answers
B.

The European Data Protection Board.

B.

The European Data Protection Board.

Answers
C.

The EU Commission.

C.

The EU Commission.

Answers
D.

The Member States.

D.

The Member States.

Answers
Suggested answer: D

Explanation:

According to Article 84 of the GDPR, the rules on other penalties applicable to infringements of the GDPR, in particular for infringements which are not subject to administrative fines pursuant to Article 83, shall be laid down by the Member States1.Such penalties shall be effective, proportionate and dissuasive1.Each Member State shall notify to the Commission the provisions of its law which it adopts pursuant to paragraph 1, by 25 May 2018 and, without delay, any subsequent amendment affecting them1.Reference:1: Art. 84 GDPR -- Penalties - General Data Protection Regulation (GDPR)

A company plans to transfer employee health information between two of its entities in France. To maintain the security of the processing, what would be the most important security measure to apply to the health data transmission?

A.

Inform the data subject of the security measures in place.

A.

Inform the data subject of the security measures in place.

Answers
B.

Ensure that the receiving entity has signed a data processing agreement.

B.

Ensure that the receiving entity has signed a data processing agreement.

Answers
C.

Encrypt the transferred data in transit and at rest.

C.

Encrypt the transferred data in transit and at rest.

Answers
D.

Conduct a data protection impact assessment.

D.

Conduct a data protection impact assessment.

Answers
Suggested answer: C

Explanation:

:According to Article 32 of the GDPR, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including the pseudonymisation and encryption of personal data. Encryption is a key security measure to protect the confidentiality, integrity and availability of personal data, especially when it is transferred between different entities or locations. Encryption ensures that only authorised parties can access and modify the data, and prevents unauthorised or unlawful access, disclosure, alteration or destruction. Encryption also reduces the risk of data breaches and the potential harm to the data subjects. Therefore, encrypting the transferred data in transit and at rest would be the most important security measure to apply to the health data transmission.Reference:

Article 32 of the GDPR

IAPP CIPP/E Study Guide, page 58

If a company chooses to ground an international data transfer on the contractual route, which of the following is NOT a valid set of standard contractual clauses?

A.

Decision 2001/497/EC (EU controller to non-EU or EEA controller).

A.

Decision 2001/497/EC (EU controller to non-EU or EEA controller).

Answers
B.

Decision 2004/915/EC (EU controller to non-EU or EEA controller).

B.

Decision 2004/915/EC (EU controller to non-EU or EEA controller).

Answers
C.

Decision 2007/72/EC (EU processor to non-EU or EEA controller).

C.

Decision 2007/72/EC (EU processor to non-EU or EEA controller).

Answers
D.

Decision 2010/87/EU (Non-EU or EEA processor from EU controller).

D.

Decision 2010/87/EU (Non-EU or EEA processor from EU controller).

Answers
Suggested answer: C

Explanation:

This is not a valid set of standard contractual clauses because it does not correspond to any of the decisions adopted by the European Commission under the GDPR or the previous Data Protection Directive 95/46. The correct decision for EU processor to non-EU or EEA controller is Decision 2010/87/EU, which was amended by Decision 2004/915/EC. Decision 2007/72/EC is actually related to the recognition of the adequacy of the protection of personal data in Switzerland.Reference:

Free CIPP/E Study Guide, page 18, section 3.4.2

Standard contractual clauses for international transfers, section 1.1

Standard Contractual Clauses (SCC), section 2.1

Decision 2007/72/EC

Article 58 of the GDPR describes the power of supervisory authorities. Which of the following is NOT among those granted?

A.

Legislative powers.

A.

Legislative powers.

Answers
B.

Corrective powers.

B.

Corrective powers.

Answers
C.

Investigatory powers.

C.

Investigatory powers.

Answers
D.

Authorization and advisory powers.

D.

Authorization and advisory powers.

Answers
Suggested answer: A

Explanation:

Article 58 of the GDPR lists the powers of supervisory authorities, which include investigative, corrective, and authorization and advisory powers. However, legislative powers are not among those granted to supervisory authorities, as they belong to the EU and the member states. Therefore, option A is the correct answer.Reference:Art. 58 GDPR -- Powers,Article 58 Powers - GDPR,Article 58 GDPR - GDPRhub

According to the European Data Protection Board, which of the following concepts or practices does NOT follow from the principles relating to the processing of personal data under EU data protection law?

A.

Data ownership allocation.

A.

Data ownership allocation.

Answers
B.

Access control management.

B.

Access control management.

Answers
C.

Frequent pseudonymization key rotation.

C.

Frequent pseudonymization key rotation.

Answers
D.

Error propagation avoidance along the processing chain.

D.

Error propagation avoidance along the processing chain.

Answers
Suggested answer: A

Explanation:

According to the European Data Protection Board, the principles relating to the processing of personal data under EU data protection law are: lawfulness, fairness and transparency; purpose limitation; data minimization; accuracy; storage limitation; integrity and confidentiality; and accountability1.These principles imply certain concepts or practices that data controllers and processors should follow, such as access control management, frequent pseudonymization key rotation, and error propagation avoidance along the processing chain2.However, data ownership allocation is not a concept or practice that follows from these principles, as the GDPR does not recognize the notion of data ownership by either the data subject or the data controller3. Therefore, option A is the correct answer.Reference:

Data protection basics

Guidelines 2/2019 on the processing of personal data under Article 6(1)(b) GDPR in the context of the provision of online services to data subjects

CIPP/E Study Guide, page 11

According to the GDPR, when should the processing of photographs be considered processing of special categories of personal data?

A.

When processed with the intent to publish information regarding a natural person on publicly accessible media.

A.

When processed with the intent to publish information regarding a natural person on publicly accessible media.

Answers
B.

When processed with the intent to proceed to scientific or historical research projects.

B.

When processed with the intent to proceed to scientific or historical research projects.

Answers
C.

When processed with the intent to uniquely identify or authenticate a natural person.

C.

When processed with the intent to uniquely identify or authenticate a natural person.

Answers
D.

When processed with the intent to comply with a law.

D.

When processed with the intent to comply with a law.

Answers
Suggested answer: C

Explanation:

:According to the GDPR, the processing of photographs should not systematically be considered as processing of special categories of personal data, unless they are covered by the definition of biometric data1.Biometric data is defined as personal data resulting from specific technical processing relating to the physical, physiological or behavioral characteristics of a natural person, which allow or confirm the unique identification or authentication of that natural person, such as facial images or dactyloscopic data2.Therefore, the processing of photographs is considered processing of special categories of personal data when it involves the use of specific technical means, such as facial recognition, that allow or confirm the unique identification or authentication of a natural person3.Reference:1: Recital 51 of the GDPR2: Article 4(14) of the GDPR3: GDPR, Photographs, and Special Categories of Personal Data.

The origin of privacy as a fundamental human right can be found in which document?

A.

Universal Declaration of Human Rights 1948.

A.

Universal Declaration of Human Rights 1948.

Answers
B.

European Convention of Human Rights 1953.

B.

European Convention of Human Rights 1953.

Answers
C.

OECD Guidelines on the Protection of Privacy 1980.

C.

OECD Guidelines on the Protection of Privacy 1980.

Answers
D.

Charier of Fundamental Rights of the European Union 2000.

D.

Charier of Fundamental Rights of the European Union 2000.

Answers
Suggested answer: A

Explanation:

The Universal Declaration of Human Rights (UDHR) was adopted by the United Nations General Assembly in 1948 as a response to the atrocities of World War II. It is considered the first global expression of human rights and fundamental freedoms. Article 12 of the UDHR states that "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks." This article is the origin of privacy as a fundamental human right that has influenced many subsequent international and regional instruments, such as the European Convention of Human Rights (ECHR), the OECD Guidelines on the Protection of Privacy, and the Charter of Fundamental Rights of the European Union (CFREU).Reference:

IAPP CIPP/E Study Guide, page 7

[Universal Declaration of Human Rights]

[Article 12 of the UDHR]

Which statement provides an accurate description of a directive?

A.

A directive speo5es certain results that must be achieved, but each member state is free to decide how to turn it into a national law

A.

A directive speo5es certain results that must be achieved, but each member state is free to decide how to turn it into a national law

Answers
B.

A directive has binding legal force throughout every member state and enters into force on a set date in all the member states.

B.

A directive has binding legal force throughout every member state and enters into force on a set date in all the member states.

Answers
C.

A directive is a legal act relating to specific cases and directed towards member states, companies 0' private individuals.

C.

A directive is a legal act relating to specific cases and directed towards member states, companies 0' private individuals.

Answers
D.

A directive is a legal act that applies automatically and uniformly to all EU countries as soon as it enters into force.

D.

A directive is a legal act that applies automatically and uniformly to all EU countries as soon as it enters into force.

Answers
Suggested answer: A

Explanation:

According to the EU glossary1, a directive is a legal act that sets out a goal that EU countries must achieve, but leaves them the choice of form and methods to reach it. A directive is binding on the EU countries to which it is addressed, but it does not apply directly at the national level. Instead, it has to be transposed into national law by the national authorities, usually within a specified time limit. This allows for some flexibility and adaptation to the specific circumstances of each country. A directive is different from a regulation, which is a legal act that applies automatically and uniformly to all EU countries as soon as it enters into force, without needing to be transposed into national law.Reference:

Free CIPP/E Study Guide, page 14, section 2.3

Types of legislation, section 2

What are EU directives?

Which of the following regulates the use of electronic communications services within the European Union?

A.

Regulator (EU) 2015/2120 of the European Parliament and of the Council of 25 November 2015.

A.

Regulator (EU) 2015/2120 of the European Parliament and of the Council of 25 November 2015.

Answers
B.

Regulation (EU) 2017/1953 of the European Parliament and of the Council of 25 October 2017.

B.

Regulation (EU) 2017/1953 of the European Parliament and of the Council of 25 October 2017.

Answers
C.

Directive 2002/58'EC of the European Parliament and of the Council of 12 July 2002.

C.

Directive 2002/58'EC of the European Parliament and of the Council of 12 July 2002.

Answers
D.

Directive (EU) 2019.789 of the European Parliament and of the Council of 17 April 2019.

D.

Directive (EU) 2019.789 of the European Parliament and of the Council of 17 April 2019.

Answers
Suggested answer: C

Explanation:

Directive 2002/58/EC, also known as the ePrivacy Directive, regulates the use of electronic communications services within the European Union. It covers issues such as confidentiality of communications, processing of traffic and location data, spam, cookies, and security breaches. It complements and particularises Directive 95/46/EC, also known as the Data Protection Directive, which sets out the general principles for the protection of personal data in the EU. The ePrivacy Directive was amended by Directive 2009/136/EC, which introduced new provisions on consent, cookies, and breach notification. The ePrivacy Directive is currently under review and will be replaced by a new Regulation on Privacy and Electronic Communications (ePrivacy Regulation), which is still being negotiated by the EU institutions.Reference:Directive 2002/58/EC,Directive 2009/136/EC, [ePrivacy Regulation]

What was the main failing of Convention 108 that led to the creation of the Data Protection Directive (Directive 95/46/EC)?

A.

IT did not account for the rapid growth of the Internet

A.

IT did not account for the rapid growth of the Internet

Answers
B.

It did not include protections for sensitive personal data

B.

It did not include protections for sensitive personal data

Answers
C.

It was implemented in a fragmented manner by a small number of states.

C.

It was implemented in a fragmented manner by a small number of states.

Answers
D.

Its penalties for violations of data protection rights were widely viewed as r sufficient.

D.

Its penalties for violations of data protection rights were widely viewed as r sufficient.

Answers
Suggested answer: C

Explanation:

Convention 108 was the first legally binding international instrument in the data protection field, adopted by the Council of Europe in 19811.However, it had some limitations that led to the creation of the Data Protection Directive (Directive 95/46/EC) by the European Union in 19952.One of the main failings of Convention 108 was that it was implemented in a fragmented manner by a small number of states, resulting in divergent and inconsistent national laws and practices3.The Data Protection Directive aimed to harmonize the data protection rules within the EU and to ensure a high level of protection for individuals' rights and freedoms2. Therefore, option C is the correct answer.Option A is incorrect because Convention 108 did account for the rapid growth of the Internet by allowing for amendments and protocols to adapt to technological developments1.Option B is incorrect because Convention 108 did include protections for sensitive personal data, such as those revealing racial origin, political opinions, religious beliefs, health, or sexual life1.Option D is incorrect because Convention 108 did not prescribe specific penalties for violations of data protection rights, but left it to the Parties to adopt appropriate sanctions and remedies1.Reference:

Convention 108 and Protocols

CIPP/E Certification

Convention 108+ and the Data Protection Framework of the EU

Total 271 questions
Go to page: of 28