ExamGecko
Home Home / IAPP / CIPP-US

IAPP CIPP-US Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











California's SB 1386 was the first law of its type in the United States to do what?

A.

Require commercial entities to disclose a security data breach concerning personal information about the state's residents

A.

Require commercial entities to disclose a security data breach concerning personal information about the state's residents

Answers
B.

Require notification of non-California residents of a breach that occurred in California

B.

Require notification of non-California residents of a breach that occurred in California

Answers
C.

Require encryption of sensitive information stored on servers that are Internet connected

C.

Require encryption of sensitive information stored on servers that are Internet connected

Answers
D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

Answers
Suggested answer: A

Explanation:

California's SB 1386, also known as the California Security Breach Information Act, was enacted in 2002 and became effective in 2003. It was the first law of its kind in the United States to require commercial entities that own or license personal information of California residents to notify them in the event of a security breach that compromises their unencrypted data. The law aims to protect the privacy and security of personal information and to enable individuals to take preventive measures against identity theft and fraud. The law applies to any business or person that conducts business in California and that owns or licenses computerized data that includes personal information, as defined by the law. Personal information includes an individual's first name or first initial and last name in combination with any one or more of the following data elements: Social Security number, driver's license number or California identification card number, account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual's financial account, or medical information or health insurance information. The law does not apply to encrypted information, publicly available information, or information that is lawfully obtained from federal, state, or local government records. The law requires the disclosure of a breach of the security of the system to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. The disclosure may be made by written notice, electronic notice, or substitute notice, as specified by the law. The law also requires any person or business that maintains computerized data that includes personal information that the person or business does not own to notify the owner or licensee of the information of any breach of the security of the data immediately following discovery, if the personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The law also authorizes a civil action for damages by a customer injured by a violation of the law and provides that the rights and remedies available under the law are cumulative to each other and to any other rights and remedies available under law.Reference:

California Senate Bill 1386 (2002)

California SB 1386: For the Love of Privacy

What Is the California Security Breach Information Act?

California Raises the Bar on Data Security and Privacy

Most states with data breach notification laws indicate that notice to affected individuals must be sent in the ''most expeditious time possible without unreasonable delay.'' By contrast, which of the following states currently imposes a definite limit for notification to affected individuals?

A.

Maine

A.

Maine

Answers
B.

Florida

B.

Florida

Answers
C.

New York

C.

New York

Answers
D.

California

D.

California

Answers
Suggested answer: B

Explanation:

According to the web search results from my predefined tool, Florida is the only state among the four options that currently imposes a definite limit for notification to affected individuals in case of a data breach.Florida's law requires that notice be provided within 30 days after determination of the breach or reason to believe a breach occurred, unless delayed by law enforcement or measures to determine the scope of the breach and restore the integrity of the system1.The other states have more flexible or vague terms for the notification timeframe, such as ''as soon as practicable'' (Maine), ''in the most expedient time possible and without unreasonable delay'' (New York), or ''in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement'' (California)2.Reference:

Security Breach Notification Chart | Perkins Coie

State Data Breach Notification Chart - International Association of ...

Under state breach notification laws, which is NOT typically included in the definition of personal information?

A.

State identification number

A.

State identification number

Answers
B.

First and last name

B.

First and last name

Answers
C.

Social Security number

C.

Social Security number

Answers
D.

Medical Information

D.

Medical Information

Answers
Suggested answer: B

Explanation:

Under state breach notification laws, personal information is typically defined as an individual's first name or first initial and last name plus one or more other data elements, such as Social Security number, state identification number, account number, medical information, etc. However, first and last name alone are not usually considered personal information, unless they are combined with other data elements that could identify the individual or compromise their security or privacy.Therefore, option B is the correct answer, as it is not typically included in the definition of personal information under state breach notification laws.Reference: https://www.ncsl.org/technology-and-communication/security-breach-notification-laws https://iapp.org/resources/article/state-data-breach-notification-chart/

Which of the following best describes what a ''private right of action'' is?

A.

The right of individuals to keep their information private.

A.

The right of individuals to keep their information private.

Answers
B.

The right of individuals to submit a request to access their information.

B.

The right of individuals to submit a request to access their information.

Answers
C.

The right of individuals harmed by data processing to have their information deleted.

C.

The right of individuals harmed by data processing to have their information deleted.

Answers
D.

The right of individuals harmed by a violation of a law to file a lawsuit against the violation.

D.

The right of individuals harmed by a violation of a law to file a lawsuit against the violation.

Answers
Suggested answer: D

Explanation:

A private right of action is a legal provision that grants individuals the ability to bring a lawsuit against a party that has wronged them and to seek redress for the harm that they have suffered. A private right of action is a fundamental component of the U.S. judicial system and an essential element of enforcing privacy rights. Privacy advocates argue that a private right of action is necessary to hold perpetrators of privacy violations accountable and to address the limitations of the FTC's enforcement authority. However, businesses are concerned that a private right of action would lead to a proliferation of frivolous lawsuits that would burden responsible data processors and impede innovation.Reference:

U S. Private-Sector Privacy, Third Editionby Peter P. Swire, DeBrae Kennedy-Mayo, Chapter 2, Section 2.3.3, pp. 35-36. How to end the deadlock on the private right of actionby Paula Bruening, IAPP Privacy Perspectives, Jan 20, 2022. Private Right of Action (Legal Definition & Examples)by Lawrina, accessed on Jan 25, 2022.

Which of the following is NOT a principle found in the APEC Privacy Framework?

A.

Integrity of Personal Information.

A.

Integrity of Personal Information.

Answers
B.

Access and Correction.

B.

Access and Correction.

Answers
C.

Preventing Harm.

C.

Preventing Harm.

Answers
D.

Privacy by Design.

D.

Privacy by Design.

Answers
Suggested answer: D

Explanation:

The APEC Privacy Framework is a set of non-binding principles adopted by the Asia-Pacific Economic Cooperation (APEC) that aim to promote electronic commerce and protect information privacy in the region. The Framework is consistent with the core values of the OECD Guidelines on the Protection of Privacy and Trans-Border Flows of Personal Data, and reaffirms the value of privacy to individuals and to the information society. The Framework consists of nine principles: Preventing Harm, Notice, Collection Limitation, Use of Personal Information, Choice, Integrity of Personal Information, Security Safeguards, Access and Correction, and Accountability. Privacy by Design is not one of the principles in the APEC Privacy Framework, although it is a concept that is endorsed by the OECD Guidelines and other privacy frameworks.Reference:APEC Privacy Framework (2015),APEC Privacy Principles, IAPP CIPP/US Study Guide, Chapter 4.

What is the most important action an organization can take to comply with the FTC position on retroactive changes to a privacy policy?

A.

Describing the policy changes on its website.

A.

Describing the policy changes on its website.

Answers
B.

Obtaining affirmative consent from its customers.

B.

Obtaining affirmative consent from its customers.

Answers
C.

Publicizing the policy changes through social media.

C.

Publicizing the policy changes through social media.

Answers
D.

Reassuring customers of the security of their information.

D.

Reassuring customers of the security of their information.

Answers
Suggested answer: B

Explanation:

The FTC has stated that it is a deceptive practice to make retroactive changes to a privacy policy that affect how a company uses or shares previously collected personal information, unless the company obtains affirmative consent from the affected consumers. This means that the company must clearly and conspicuously disclose the changes and obtain the consumers' express agreement to them. Simply describing the policy changes on the website, publicizing them through social media, or reassuring customers of the security of their information are not sufficient to comply with the FTC's position.Reference:

FTC Staff Revises Online Behavioral Advertising Principles, paragraph 3.

Do I really have to obtain consent from all my customers to make a change to my privacy policy?, paragraph 2.

IAPP CIPP/US Study Guide, page 64.

Federal laws establish which of the following requirements for collecting personal information of minors under the age of 13?

A.

Implied consent from a minor's parent or guardian, or affirmative consent from the minor.

A.

Implied consent from a minor's parent or guardian, or affirmative consent from the minor.

Answers
B.

Affirmative consent from a minor's parent or guardian before collecting the minor's personal information online.

B.

Affirmative consent from a minor's parent or guardian before collecting the minor's personal information online.

Answers
C.

Implied consent from a minor's parent or guardian before collecting a minor's personal information online, such as when they permit the minor to use the internet.

C.

Implied consent from a minor's parent or guardian before collecting a minor's personal information online, such as when they permit the minor to use the internet.

Answers
D.

Affirmative consent of a parent or guardian before collecting personal information of a minor offline (e.g., in person), which also satisfies any requirements for online consent.

D.

Affirmative consent of a parent or guardian before collecting personal information of a minor offline (e.g., in person), which also satisfies any requirements for online consent.

Answers
Suggested answer: B

Explanation:

The Children's Online Privacy Protection Act (COPPA) is a federal law that regulates the online collection and use of personal information from children under 13 years of age. COPPA requires operators of websites or online services that are directed to children, or that knowingly collect personal information from children, to obtain verifiable parental consent before collecting, using, or disclosing such information. Verifiable parental consent means any reasonable effort (taking into consideration available technology) to ensure that before personal information is collected from a child, the child's parent receives notice of the operator's information practices and consents to those practices. COPPA also imposes other obligations on operators, such as providing parents with access to their children's information, maintaining reasonable security measures, and limiting data retention.Reference:COPPA,IAPP CIPP/US Study Guide, Chapter 2, Section 2.3.1

If an organization maintains data classified as high sensitivity in the same system as data classified as low sensitivity, which of the following is the most likely outcome?

A.

The organization will still be in compliance with most sector-specific privacy and security laws.

A.

The organization will still be in compliance with most sector-specific privacy and security laws.

Answers
B.

The impact of an organizational data breach will be more severe than if the data had been segregated.

B.

The impact of an organizational data breach will be more severe than if the data had been segregated.

Answers
C.

Temporary employees will be able to find the data necessary to fulfill their responsibilities.

C.

Temporary employees will be able to find the data necessary to fulfill their responsibilities.

Answers
D.

The organization will be able to address legal discovery requests efficiently without producing more information than necessary.

D.

The organization will be able to address legal discovery requests efficiently without producing more information than necessary.

Answers
Suggested answer: B

Explanation:

Data classification is the process of categorizing data based on its sensitivity and importance to determine its level of confidentiality and protection.Data classification helps organizations apply appropriate security and compliance measures to ensure each category receives proper protection1.Data classification also helps organizations identify which data is subject to specific privacy laws and regulations, such as the GDPR, HIPAA, or CCPA, and how to handle data subject requests, data breaches, or legal discovery2. If an organization maintains data classified as high sensitivity, such as personal information, financial information, or health information, in the same system as data classified as low sensitivity, such as public information or internal information, it increases the risk of exposing the high sensitivity data in the event of a data breach. A data breach can result in legal consequences, reputational damage, and loss of trust from customers and stakeholders.Therefore, it is advisable to segregate data based on its classification and apply different levels of encryption, access control, and monitoring to each category3. This way, the organization can minimize the impact of a data breach and protect the privacy and security of its data assets.Reference:

Why Is Data Classification Important?

Data Classification for GDPR Explained

Data classification and privacy considerations

Which of the following best describes the ASIA-Pacific Economic Cooperation (APEC) principles?

A.

A bill of rights for individuals seeking access to their personal information.

A.

A bill of rights for individuals seeking access to their personal information.

Answers
B.

A code of responsibilities for medical establishments to uphold privacy laws.

B.

A code of responsibilities for medical establishments to uphold privacy laws.

Answers
C.

An international court ruling on personal information held in the commercial sector.

C.

An international court ruling on personal information held in the commercial sector.

Answers
D.

A baseline of marketers' minimum responsibilities for providing opt-out mechanisms.

D.

A baseline of marketers' minimum responsibilities for providing opt-out mechanisms.

Answers
Suggested answer: C

Explanation:

The APEC principles are part of the APEC Privacy Framework, which is an inter-governmental agreement among the 21 member economies of the Asia-Pacific Economic Cooperation (APEC) to promote information privacy protection and the free flow of information in the region. The APEC Privacy Framework consists of four parts: a preamble, a scope, a set of nine information privacy principles, and an implementation section. The APEC information privacy principles are:

Preventing harm: Personal information controllers should take reasonable steps to protect personal information from loss, misuse, unauthorized access, disclosure, alteration, and destruction, and to address the risks and challenges posed by specific technologies and business practices.

Notice: Personal information controllers should provide clear and easily accessible statements about their personal information handling practices, including the types of personal information they collect, the purposes for which they collect it, the types of third parties to which they disclose it, the choices and means they offer individuals for limiting the use and disclosure of their personal information, and how they can contact the personal information controller with inquiries or complaints.

Collection limitation: Personal information controllers should limit the collection of personal information to what is relevant for the purposes of collection and should collect personal information by lawful and fair means and, where appropriate, with notice to, or consent of, the individual concerned.

Use limitation: Personal information controllers should use personal information only for the purposes for which it was collected or for purposes that a reasonable person would consider appropriate in the circumstances, and should retain personal information only as long as necessary to fulfill the stated purposes or as required by law or regulation.

Choice: Personal information controllers should offer individuals choices and means to limit the use and disclosure of their personal information, where appropriate, and should respect the choices made by individuals.

Integrity of personal information: Personal information controllers should take reasonable steps to ensure that personal information is accurate, complete, and up-to-date for the purposes for which it is used.

Security safeguards: Personal information controllers should protect personal information with reasonable security safeguards against risks such as loss, unauthorized access, destruction, misuse, modification, and disclosure.

Access and correction: Personal information controllers should give individuals the ability to access and, where appropriate, correct their personal information that is under their control, subject to reasonable limitations, such as where the burden or expense of providing access would be disproportionate to the risks to the individual's privacy, or where the legitimate rights of persons other than the individual would be violated.

Accountability: Personal information controllers should be accountable for complying with the privacy principles and should have in place mechanisms to ensure their implementation and compliance.

The APEC Privacy Framework is not a binding legal instrument, but rather a voluntary and flexible arrangement that allows each member economy to implement the principles according to its own domestic laws and regulations, applicable international frameworks, and cultural and social values. The APEC Privacy Framework also provides for cross-border cooperation and information sharing among member economies, as well as the development of mechanisms to facilitate the cross-border transfer of personal information, such as the APEC Cross-Border Privacy Rules (CBPR) System and the APEC Privacy Recognition for Processors (PRP) System. These mechanisms are based on a common set of rules and standards derived from the APEC Privacy Framework, and are intended to enhance the protection of personal information that flows across borders and to increase the interoperability among different privacy regimes in the region and beyond.Reference:

APEC Privacy Framework (2015)

APEC Cross-Border Privacy Rules (CBPR) System

APEC Privacy Recognition for Processors (PRP) System

APEC Privacy Framework: A New Model for Transborder Data Flows

Which of the following became the first state to pass a law specifically regulating the practices of data brokers?

A.

Washington.

A.

Washington.

Answers
B.

California.

B.

California.

Answers
C.

New York.

C.

New York.

Answers
D.

Vermont.

D.

Vermont.

Answers
Suggested answer: D

Explanation:

According to the web search results from my predefined tool, Vermont became the first state to pass a law specifically regulating the practices of data brokers in 2018. The law defines a data broker as ''a business, or unit or units of a business, separately or together, that knowingly collects and sells or licenses to third parties the brokered personal information of a consumer with whom the business does not have a direct relationship.'' The law requires data brokers to register with the Secretary of State, pay a registration fee, provide information about their data collection and opt-out practices, and implement security measures to protect the personal information they collect and sell. The law also imposes additional obligations on data brokers that possess the personal information of minors.The law aims to increase the transparency and accountability of the data broker industry and to protect the privacy rights of consumers12.Reference:

Registered Data Brokers in the United States: 2021 | Privacy Rights ...

Am I A Data Broker?: A Quick Primer on State Laws Regulating a ... - Taft

Total 195 questions
Go to page: of 20