IAPP CIPP-E Practice Test - Questions Answers, Page 3
List of questions
Related questions
According to the GDPR, what is the main task of a Data Protection Officer (DPO)?
To create and maintain records of processing activities.
To conduct Privacy Impact Assessments on behalf of the controller or processor.
To monitor compliance with other local or European data protection provisions.
To create procedures for notification of personal data breaches to competent supervisory authorities.
A U.S.-based online shop uses sophisticated software to track the browsing behavior of its European customers and predict future purchases. It also shares this information with third parties. Under the GDPR, what is the online shop's PRIMARY obligation while engaging in this kind of profiling?
It must solicit informed consent through a notice on its website
It must seek authorization from the European supervisory authorities
It must be able to demonstrate a prior business relationship with the customers
It must prove that it uses sufficient security safeguards to protect customer data
Which of the following would NOT be relevant when determining if a processing activity would be considered profiling?
If the processing is to be performed by a third-party vendor
If the processing involves data that is considered personal data
If the processing of the data is done through automated means
If the processing is used to predict the behavior of data subjects
Under Article 21 of the GDPR, a controller must stop profiling when requested by a data subject, unless it can demonstrate compelling legitimate grounds that override the interests of the individual. In the Guidelines on Automated individual decision-making and Profiling, the WP 29 says the controller needs to do all of the following to demonstrate that it has such legitimate grounds EXCEPT?
Carry out an exercise that weighs the interests of the controller and the basis for the data subject's objection.
Consider the impact of the profiling on the data subject's interest, rights and freedoms.
Demonstrate that the profiling is for the purposes of direct marketing.
Consider the importance of the profiling to their particular objective.
SCENARIO
Please use the following to answer the next question:
TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company's outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.'s foundering business.
During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories -- age, income, ethnicity -- that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website's traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website's effectiveness. Oliver enthusiastically engages Techiva for these services.
Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.'s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva's system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company's system of access control must be reconsidered.
If TripBliss Inc. decides not to report the incident to the supervisory authority, what would be their BEST defense?
The resulting obligation to notify data subjects would involve disproportionate effort.
The incident resulted from the actions of a third-party that were beyond their control.
The destruction of the stolen data makes any risk to the affected data subjects unlikely.
The sensitivity of the categories of data involved in the incident was not substantial enough.
SCENARIO
Please use the following to answer the next question:
TripBliss Inc. is a travel service company which has lost substantial revenue over the last few years. Their new manager, Oliver, suspects that this is partly due to the company's outdated website. After doing some research, he meets with a sales representative from the up-and-coming IT company Techiva, hoping that they can design a new, cutting-edge website for TripBliss Inc.'s foundering business.
During negotiations, a Techiva representative describes a plan for gathering more customer information through detailed Questionaires, which could be used to tailor their preferences to specific travel destinations. TripBliss Inc. can choose any number of data categories -- age, income, ethnicity -- that would help them best accomplish their goals. Oliver loves this idea, but would also like to have some way of gauging how successful this approach is, especially since the Questionaires will require customers to provide explicit consent to having their data collected. The Techiva representative suggests that they also run a program to analyze the new website's traffic, in order to get a better understanding of how customers are using it. He explains his plan to place a number of cookies on customer devices. The cookies will allow the company to collect IP addresses and other information, such as the sites from which the customers came, how much time they spend on the TripBliss Inc. website, and which pages on the site they visit. All of this information will be compiled in log files, which Techiva will analyze by means of a special program. TripBliss Inc. would receive aggregate statistics to help them evaluate the website's effectiveness. Oliver enthusiastically engages Techiva for these services.
Techiva assigns the analytics portion of the project to longtime account manager Leon Santos. As is standard practice, Leon is given administrator rights to TripBliss Inc.'s website, and can authorize access to the log files gathered from it. Unfortunately for TripBliss Inc., however, Leon is taking on this new project at a time when his dissatisfaction with Techiva is at a high point. In order to take revenge for what he feels has been unfair treatment at the hands of the company, Leon asks his friend Fred, a hobby hacker, for help. Together they come up with the following plan: Fred will hack into Techiva's system and copy their log files onto a USB stick. Despite his initial intention to send the USB to the press and to the data protection authority in order to denounce Techiva, Leon experiences a crisis of conscience and ends up reconsidering his plan. He decides instead to securely wipe all the data from the USB stick and inform his manager that the company's system of access control must be reconsidered.
With regard to TripBliss Inc.'s use of website cookies, which of the following statements is correct?
Because not all of the cookies are strictly necessary to enable the use of a service requested from TripBliss Inc., consent requirements apply to their use of cookies.
Because of the categories of data involved, explicit consent for the use of cookies must be obtained separately from customers.
Because Techiva will receive only aggregate statistics of data collected from the cookies, no additional consent is necessary.
Because the use of cookies involves the potential for location tracking, explicit consent must be obtained from customers.
Company X has entrusted the processing of their payroll data to Provider Y. Provider Y stores this encrypted data on its server. The IT department of Provider Y finds out that someone managed to hack into the system and take a copy of the data from its server. In this scenario, whom does Provider Y have the obligation to notify?
The public
Company X
Law enforcement
The supervisory authority
When hiring a data processor, which action would a data controller NOT be able to depend upon to avoid liability in the event of a security breach?
Documenting due diligence steps taken in the pre-contractual stage.
Conducting a risk assessment to analyze possible outsourcing threats.
Requiring that the processor directly notify the appropriate supervisory authority.
Maintaining evidence that the processor was the best possible market choice available.
WP29's "Guidelines on Personal data breach notification under Regulation 2016/679" provides examples of ways to communicate data breaches transparently. Which of the following was listed as a method that would NOT be effective for communicating a breach to data subjects?
A postal notification
A direct electronic message
A notice on a corporate blog
A prominent advertisement in print media
Which of the following would require designating a data protection officer?
Processing is carried out by an organization employing 250 persons or more.
Processing is carried out for the purpose of providing for-profit goods or services to individuals in the EU.
The core activities of the controller or processor consist of processing operations of financial information or information relating to children.
The core activities of the controller or processor consist of processing operations that require systematic monitoring of data subjects on a large scale.
Question