ExamGecko

IAPP CIPP-US Practice Test - Questions Answers

Question list
Search
Search

Related questions

SCENARIO Please use the following to answer the next QUESTION When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s. Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it. When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws. Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee. Based on the problems with the company's privacy security that Roberta identifies, what is the most likely cause of the breach?

SCENARIO Please use the following to answer the next QUESTION: Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state's Do Not Call list, as well as the people on it. ''If they were really serious about not being bothered,'' Evan said, ''They'd be on the national DNC list. That's the only one we're required to follow. At SunriseLynx, we call until they ask us not to.'' Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call ''another time.'' This, to Larry, is a clear indication that they don't want to be called at all. Evan doesn't see it that way. Larry believes that Evan's arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan's political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions. Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan's leadership. Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker's belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss. Larry wants to take action, but is uncertain how to proceed. In what area does Larry have a misconception about private-sector employee rights?





SCENARIO Please use the following to answer the next QUESTION Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years. One potential employer, Arnie's Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still be sitting in the office, unsecured. Two days ago, Noah got another interview for a position at Sam's Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied. Regardless, the effect of Noah's credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills -- all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today. In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money. After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit. Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job. Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?


SCENARIO Please use the following to answer the next QUESTION: Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state's Do Not Call list, as well as the people on it. ''If they were really serious about not being bothered,'' Evan said, ''They'd be on the national DNC list. That's the only one we're required to follow. At SunriseLynx, we call until they ask us not to.'' Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call ''another time.'' This, to Larry, is a clear indication that they don't want to be called at all. Evan doesn't see it that way. Larry believes that Evan's arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan's political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions. Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan's leadership. Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker's belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss. Larry wants to take action, but is uncertain how to proceed. Which act would authorize Evan's undercover investigation?


Question 1

Report
Export
Collapse

The Video Privacy Protection Act of 1988 restricted which of the following?

A.

Which purchase records of audio visual materials may be disclosed

A.

Which purchase records of audio visual materials may be disclosed

Answers
B.

When downloading of copyrighted audio visual materials is allowed

B.

When downloading of copyrighted audio visual materials is allowed

Answers
C.

When a user's viewing of online video content can be monitored

C.

When a user's viewing of online video content can be monitored

Answers
D.

Who advertisements for videos and video games may target

D.

Who advertisements for videos and video games may target

Answers
Suggested answer: A

Explanation:

The VPPA was enacted to prevent the wrongful disclosure of personally identifiable information (PII) concerning any consumer of a video tape service provider. PII includes information that identifies a person as having requested or obtained specific video materials or services from a video tape service provider. The VPPA prohibits such disclosure, except in certain limited circumstances, such as with the consumer's informed, written consent, or pursuant to a law enforcement warrant, subpoena, or court order. The VPPA also allows the disclosure of the names and addresses of consumers, but not the title, description, or subject matter of any video tapes or other audio visual material, for the exclusive use of marketing goods and services directly to the consumer, unless the consumer has opted out of such disclosure. The other options (B, C, and D) are not restricted by the VPPA.Reference:

Video Privacy Protection Act - Wikipedia

18 U.S. Code 2710 - Wrongful disclosure of video tape rental or sale records | U.S. Code | US Law | LII / Legal Information Institute

IAPP CIPP/US Certified Information Privacy Professional Study Guide, Chapter 3: Federal Privacy Laws and Regulations, Section 3.5: Video Privacy Protection Act (VPPA)

asked 22/11/2024
Ali Abbas
28 questions

Question 2

Report
Export
Collapse

The Cable Communications Policy Act of 1984 requires which activity?

A.

Delivery of an annual notice detailing how subscriber information is to be used

A.

Delivery of an annual notice detailing how subscriber information is to be used

Answers
B.

Destruction of personal information a maximum of six months after it is no longer needed

B.

Destruction of personal information a maximum of six months after it is no longer needed

Answers
C.

Notice to subscribers of any investigation involving unauthorized reception of cable services

C.

Notice to subscribers of any investigation involving unauthorized reception of cable services

Answers
D.

Obtaining subscriber consent for disseminating any personal information necessary to render cable services

D.

Obtaining subscriber consent for disseminating any personal information necessary to render cable services

Answers
Suggested answer: A

Explanation:

The Cable Communications Policy Act of 1984 (CCPA) is a federal law that regulates the cable television industry and protects the privacy of cable subscribers.One of the provisions of the CCPA is that cable operators must provide their subscribers with an annual notice that clearly and conspicuously informs them of the following information12:

The nature of personally identifiable information collected or to be collected with respect to the subscriber and the nature of the use of such information

The nature, frequency, and purpose of any disclosure of such information, including an identification of the types of persons to whom the disclosure may be made

The period during which such information will be maintained by the cable operator

The times and place at which the subscriber may have access to such information

The limitations provided by the CCPA with respect to the collection and disclosure of information by a cable operator and the right of the subscriber under the CCPA to enforce such limitations

The annual notice must also state that the subscriber has the right to prevent disclosure of personally identifiable information to third parties, except as required by law or court order, and that the subscriber may sue for damages, attorney's fees, and other relief for violations of the CCPA12.

asked 22/11/2024
Louis Reeves
44 questions

Question 3

Report
Export
Collapse

What is the main purpose of requiring marketers to use the Wireless Domain Registry?

A.

To access a current list of wireless domain names

A.

To access a current list of wireless domain names

Answers
B.

To prevent unauthorized emails to mobile devices

B.

To prevent unauthorized emails to mobile devices

Answers
C.

To acquire authorization to send emails to mobile devices

C.

To acquire authorization to send emails to mobile devices

Answers
D.

To ensure their emails are sent to actual wireless subscribers

D.

To ensure their emails are sent to actual wireless subscribers

Answers
Suggested answer: B

Explanation:

The Wireless Domain Registry is a list of domain names that are used to transmit electronic messages to wireless devices, such as cell phones and pagers. The purpose of the registry is to protect wireless consumers from unwanted commercial electronic mail messages, by identifying the domain names for those who send such messages. Marketers are required to use the registry to avoid sending unsolicited emails to wireless devices, which may incur costs or inconvenience for the recipients.Sending such emails without the express prior authorization of the recipient is a violation of the CAN-SPAM Act of 2003.Reference: https://www.fcc.gov/cgb/policy/domain-name-input

https://www.prnewswire.com/in/news-releases/the-wireless-registry-launches-worlds-first-global-registry-for-wireless-names-240222521.html

asked 22/11/2024
Darin Ambrose
40 questions

Question 4

Report
Export
Collapse

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo's business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth's security measures. A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals -- ones that exposed the PHI of public figures including celebrities and politicians. During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected. A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual's ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient's attorney has submitted a discovery request for the ePHI exposed in the breach. What is the most significant reason that the U.S. Department of Health and Human Services (HHS) might impose a penalty on HealthCo?


A.

Because HealthCo did not require CloudHealth to implement appropriate physical and administrative measures to safeguard the ePHI

A.

Because HealthCo did not require CloudHealth to implement appropriate physical and administrative measures to safeguard the ePHI

Answers
B.

Because HealthCo did not conduct due diligence to verify or monitor CloudHealth's security measures

B.

Because HealthCo did not conduct due diligence to verify or monitor CloudHealth's security measures

Answers
C.

Because HIPAA requires the imposition of a fine if a data breach of this magnitude has occurred

C.

Because HIPAA requires the imposition of a fine if a data breach of this magnitude has occurred

Answers
D.

Because CloudHealth violated its contract with HealthCo by not encrypting the ePHI

D.

Because CloudHealth violated its contract with HealthCo by not encrypting the ePHI

Answers
Suggested answer: B

Explanation:

According to the HIPAA Security Rule, covered entities are responsible for ensuring that their business associates comply with the security standards and safeguards required by the rule. This includes conducting due diligence to assess the business associate's security capabilities and practices, and monitoring their performance and compliance. Failure to do so may result in a violation of the rule and a penalty by the HHS. In this scenario, HealthCo did not perform due diligence on CloudHealth before entering the contract, and did not conduct audits of CloudHealth's security measures. This is the most significant reason why HHS might impose a penalty on HealthCo, as it indicates a lack of oversight and accountability for the protection of ePHI.Reference:

HIPAA Security Rule

HIPAA Business Associate Contracts

HIPAA Enforcement and Penalties

asked 22/11/2024
Henry Hendricks
26 questions

Question 5

Report
Export
Collapse

Which jurisdiction must courts have in order to hear a particular case?

A.

Subject matter jurisdiction and regulatory jurisdiction

A.

Subject matter jurisdiction and regulatory jurisdiction

Answers
B.

Subject matter jurisdiction and professional jurisdiction

B.

Subject matter jurisdiction and professional jurisdiction

Answers
C.

Personal jurisdiction and subject matter jurisdiction

C.

Personal jurisdiction and subject matter jurisdiction

Answers
D.

Personal jurisdiction and professional jurisdiction

D.

Personal jurisdiction and professional jurisdiction

Answers
Suggested answer: C

Explanation:

In order for a court to hear a case, it must have both personal jurisdiction and subject matter jurisdiction. Personal jurisdiction refers to the authority of a court over the parties to a case, while subject matter jurisdiction refers to the authority of a court to hear a particular type of case. For example, a federal court may have subject matter jurisdiction over a case involving a federal law, but it may not have personal jurisdiction over a defendant who has no contacts with the state where the court is located. Similarly, a state court may have personal jurisdiction over a resident of the state, but it may not have subject matter jurisdiction over a case involving a foreign treaty.Reference:[IAPP CIPP/US Study Guide], Chapter 2: Introduction to U.S. Law, p. 25-26;Wex Legal Dictionary, Subject Matter Jurisdiction and Personal Jurisdiction.

asked 22/11/2024
Michael Craig
42 questions

Question 6

Report
Export
Collapse

Which authority supervises and enforces laws regarding advertising to children via the Internet?

A.

The Office for Civil Rights

A.

The Office for Civil Rights

Answers
B.

The Federal Trade Commission

B.

The Federal Trade Commission

Answers
C.

The Federal Communications Commission

C.

The Federal Communications Commission

Answers
D.

The Department of Homeland Security

D.

The Department of Homeland Security

Answers
Suggested answer: B

Explanation:

The Federal Trade Commission (FTC) is the primary federal agency that regulates advertising and marketing practices in the United States, including those targeting children via the Internet. The FTC enforces the Children's Online Privacy Protection Act (COPPA), which requires operators of websites and online services directed to children under 13 to obtain verifiable parental consent before collecting, using, or disclosing personal information from children. The FTC also enforces the FTC Act, which prohibits unfair or deceptive acts or practices in commerce, such as making false or misleading claims in advertising. The FTC has issued guidelines and reports on various aspects of digital advertising to children, such as sponsored content, influencers, data collection, persuasive design, and behavioral marketing. The FTC also hosts workshops and events to examine the impact of digital advertising on children and their ability to distinguish ads from entertainment.Reference:

FTC website

Digital Advertising to Children

IAPP CIPP/US Study Guide, Chapter 5: Marketing and Privacy, pp. 169-170

asked 22/11/2024
Simon John Mather
44 questions

Question 7

Report
Export
Collapse

According to Section 5 of the FTC Act, self-regulation primarily involves a company's right to do what?

A.

Determine which bodies will be involved in adjudication

A.

Determine which bodies will be involved in adjudication

Answers
B.

Decide if any enforcement actions are justified

B.

Decide if any enforcement actions are justified

Answers
C.

Adhere to its industry's code of conduct

C.

Adhere to its industry's code of conduct

Answers
D.

Appeal decisions made against it

D.

Appeal decisions made against it

Answers
Suggested answer: C

Explanation:

According to Section 5 of the FTC Act, self-regulation primarily involves a company's right to adhere to its industry's code of conduct. Self-regulation is a process by which an industry or a group of companies voluntarily adopts and enforces standards or guidelines to protect consumers and promote fair competition. The FTC encourages self-regulation as a way to complement its enforcement efforts and address emerging issues in the marketplace. The FTC also monitors self-regulatory programs and may take action against companies that fail to comply with their own codes of conduct or misrepresent their participation in such programs.Reference:

Federal Trade Commission Act, Section 5 of

Self-Regulation | Federal Trade Commission

[IAPP CIPP/US Certified Information Privacy Professional Study Guide], Chapter 3, page 79

asked 22/11/2024
Leandro Franklin Franklin
43 questions

Question 8

Report
Export
Collapse

Which was NOT one of the five priority areas listed by the Federal Trade Commission in its 2012 report, ''Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers''?

A.

International data transfers

A.

International data transfers

Answers
B.

Large platform providers

B.

Large platform providers

Answers
C.

Promoting enforceable self-regulatory codes

C.

Promoting enforceable self-regulatory codes

Answers
D.

Do Not Track

D.

Do Not Track

Answers
Suggested answer: D

Explanation:

The Federal Trade Commission (FTC) issued its 2012 report, ''Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers''1, which outlined a framework for privacy protection based on three main principles: privacy by design, simplified consumer choice, and greater transparency. The report also identified five priority areas for the FTC's privacy enforcement and policy efforts, which were:

Data brokers

Large platform providers

Mobile

Promoting enforceable self-regulatory codes

International data transfers

Do Not Track was not one of the five priority areas, but rather a specific mechanism for implementing the principle of simplified consumer choice.The report endorsed the development of a Do Not Track system that would allow consumers to opt out of online behavioral advertising across websites and platforms1.The report also noted the progress made by various stakeholders, such as the World Wide Web Consortium (W3C), the Digital Advertising Alliance (DAA), and browser companies, in advancing the Do Not Track initiative1.Reference:1: Federal Trade Commission, Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers (March 2012), available at1.

asked 22/11/2024
George Sanchez
38 questions

Question 9

Report
Export
Collapse

The ''Consumer Privacy Bill of Rights'' presented in a 2012 Obama administration report is generally based on?

A.

The 1974 Privacy Act

A.

The 1974 Privacy Act

Answers
B.

Common law principles

B.

Common law principles

Answers
C.

European Union Directive

C.

European Union Directive

Answers
D.

Traditional fair information practices

D.

Traditional fair information practices

Answers
Suggested answer: D

Explanation:

The Consumer Privacy Bill of Rights is a set of principles that the Obama administration proposed in 2012 to guide the development of privacy legislation and policies in the United States.The report that introduced the bill of rights stated that it was 'generally based on the widely accepted Fair Information Practice Principles (FIPPs)'1, which are a set of standards that originated in the 1970s and have influenced many privacy laws and frameworks around the world.The FIPPs include concepts such as individual control, transparency, security, accountability, and data minimization2.The Consumer Privacy Bill of Rights adapted and expanded these principles to address the challenges and opportunities of the digital economy1.Reference:1: Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy2, page 92: IAPP CIPP/US Certified Information Privacy Professional Study Guide3, page 17.

asked 22/11/2024
Biji Abraham
39 questions

Question 10

Report
Export
Collapse

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

A.

A consent decree

A.

A consent decree

Answers
B.

Stare decisis decree

B.

Stare decisis decree

Answers
C.

A judgment rider

C.

A judgment rider

Answers
D.

Common law judgment

D.

Common law judgment

Answers
Suggested answer: A

Explanation:

A consent decree is a legal document that resolves a dispute between a governmental agency and an adverse party without admission of guilt or liability by either side. It is approved by a judge and has the force of a court order. A consent decree may include terms such as compliance, monitoring, reporting, or remediation. A consent decree is often used to settle civil enforcement actions brought by federal agencies such as the Federal Trade Commission (FTC), the Environmental Protection Agency (EPA), or the Department of Justice (DOJ).Reference:

IAPP Glossary, entry for ''consent decree''

[IAPP CIPP/US Study Guide], p. 39, section 2.1.3

[IAPP CIPP/US Body of Knowledge], p. 9, section B.1.a

asked 22/11/2024
Salih Igde
39 questions
Total 195 questions
Go to page: of 20