ExamGecko
Home Home / IAPP / CIPP-US

IAPP CIPP-US Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions










SCENARIO Please use the following to answer the next question; Jane is a U.S. citizen and a senior software engineer at California-based Jones Labs, a major software supplier to the U.S. Department of Defense and other U.S. federal agencies Jane's manager, Patrick, is a French citizen who has been living in California for over a decade. Patrick has recently begun to suspect that Jane is an insider secretly transmitting trade secrets to foreign intelligence. Unbeknownst to Patrick, the FBI has already received a hint from anonymous whistleblower, and jointly with the National Secunty Agency is investigating Jane's possible implication in a sophisticated foreign espionage campaign Ever since the pandemic. Jane has been working from home. To complete her daily tasks she uses her corporate laptop, which after each togin conspicuously provides notice that the equipment belongs to Jones Labs and may be monitored according to the enacted privacy policy and employment handbook Jane also has a corporate mobile phone that she uses strictly for business, the terms of which are defined in her employment contract and elaborated upon in her employee handbook. Both the privacy policy and the employee handbook are revised annually by a reputable California law firm specializing in privacy law. Jane also has a personal iPhone that she uses for private purposes only. Jones Labs has its primary data center in San Francisco, which is managed internally by Jones Labs engineers The secondary data center, managed by Amazon AWS. is physically located in the UK for disaster recovery purposes. Jones Labs' mobile devices backup is managed by a mid-sized mobile delense company located in Denver, which physically stores the data in Canada to reduce costs. Jones Labs MS Office documents are securely stored in a Microsoft Office 365 data Under Section 702 of F1SA. The NSA may do which of the following without a Foreign Intelligence Surveillance Court warrant?

SCENARIO

Please use the following to answer the next QUESTION

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.

Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able to gain access to Filtration Station's network and was able to steal data relating to employees in the company's Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.

The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.

What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?

A.

Request that the Board sign off in a written document on the choice of cloud provider.

A.

Request that the Board sign off in a written document on the choice of cloud provider.

Answers
B.

Ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit.

B.

Ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit.

Answers
C.

Obtain express consent from employees for storing the HR data in the cloud and keep a record of the employee consents.

C.

Obtain express consent from employees for storing the HR data in the cloud and keep a record of the employee consents.

Answers
D.

Negotiate a Business Associate Agreement with the cloud provider to protect any health-related data employees might share with Filtration Station.

D.

Negotiate a Business Associate Agreement with the cloud provider to protect any health-related data employees might share with Filtration Station.

Answers
Suggested answer: B

Explanation:

The best way for Otto to minimize the privacy risks involved in using a cloud provider for the HR data is to ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit. This would allow Otto to verify that the cloud provider has implemented adequate security measures, such as encryption, access controls, and backup systems, to protect the HR data from unauthorized access, use, or disclosure. It would also allow Otto to check that the cloud provider is complying with the applicable privacy laws and regulations, such as the CCPA, the APEC Privacy Framework, and the breach notification requirements. By conducting an on-site audit, Otto can identify any gaps or weaknesses in the cloud provider's privacy practices and address them promptly. This would also demonstrate due diligence and accountability on the part of Filtration Station, which could mitigate the legal and reputational consequences of a data breach.Reference:

[IAPP CIPP/US Study Guide], Chapter 3: Data Assessments, pp. 77-78.

IAPP CIPP/US Body of Knowledge, Section III: Government and Court Access to Private-sector Information, Subsection B: Cross-Border Data Transfer, Topic 2: APEC Privacy Framework.

IAPP CIPP/US Practice Questions, Question 125.

Which of the following statements is most accurate in regard to data breach notifications under federal and state laws:

A.

You must notify the Federal Trade Commission (FTC) in addition to affected individuals if over 500 individuals are receiving notice.

A.

You must notify the Federal Trade Commission (FTC) in addition to affected individuals if over 500 individuals are receiving notice.

Answers
B.

When providing an individual with required notice of a data breach, you must identify what personal information was actually or likely compromised.

B.

When providing an individual with required notice of a data breach, you must identify what personal information was actually or likely compromised.

Answers
C.

When you are required to provide an individual with notice of a data breach under any state's law, you must provide the individual with an offer for free credit monitoring.

C.

When you are required to provide an individual with notice of a data breach under any state's law, you must provide the individual with an offer for free credit monitoring.

Answers
D.

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

D.

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

Answers
Suggested answer: D

Explanation:

Data breach notification laws in the United States vary by state and territory, and there is no comprehensive federal law that applies to all types of personal information. Some federal laws, such as HIPAA, GLBA, and the FDIC rule, impose data breach notification requirements for specific industries or sectors, but they do not cover all types of personal information or all entities that collect, store, or process such information. Therefore, the only obligations to provide data breach notification for the breach of personal information are under state law, unless a specific federal law applies to the entity or the information involved. The other statements are incorrect because:

A . You do not have to notify the FTC in addition to affected individuals if over 500 individuals are receiving notice, unless you are a health care entity subject to HIPAA, in which case you have to notify the Department of Health and Human Services (HHS) within 60 days of the breach.

B . When providing an individual with required notice of a data breach, you do not have to identify what personal information was actually or likely compromised, unless the state law requires you to do so. Some states, such as California, require the notice to include the types of personal information that were or are reasonably believed to have been the subject of the breach, while others, such as Alabama, do not specify the content of the notice.

C . When you are required to provide an individual with notice of a data breach under any state's law, you do not have to provide the individual with an offer for free credit monitoring, unless the state law requires you to do so. Some states, such as Connecticut, require the offer of appropriate identity theft prevention and mitigation services for at least 12 months, while others, such as Arizona, do not impose such a requirement.Reference:Data Breach Notification in the United States and Territories,Data Breach Notification Laws in the United States: What is Required and How is that Determined?,US State Data Breach Notification Law Matrix,Breach Notification in United States,Data Breach Notification Laws: How to Manufacture a Confident Response

What consumer service was the Fair Credit Reporting Act (FCRA) originally intended to provide?

A.

The ability to receive reports from multiple credit reporting agencies.

A.

The ability to receive reports from multiple credit reporting agencies.

Answers
B.

The ability to appeal negative credit-based decisions.

B.

The ability to appeal negative credit-based decisions.

Answers
C.

The ability to correct inaccurate credit information.

C.

The ability to correct inaccurate credit information.

Answers
D.

The ability to investigate incidents of identity theft.

D.

The ability to investigate incidents of identity theft.

Answers
Suggested answer: C

Explanation:

The Fair Credit Reporting Act (FCRA) was originally intended to provide consumers with the ability to correct inaccurate credit information that could affect their access to credit, employment, insurance, and other benefits. The FCRA gives consumers the right to access their credit reports from the three major credit reporting agencies (Equifax, Experian, and TransUnion) for free once every 12 months, and to dispute any errors or inaccuracies with the credit reporting agencies or the information furnishers (such as lenders, creditors, or debt collectors). The FCRA also requires the credit reporting agencies and the information furnishers to investigate and resolve the disputes within 30 days, and to delete or correct any information that is found to be inaccurate, incomplete, or outdated. The FCRA also provides consumers with the right to place fraud alerts or security freezes on their credit reports if they are victims or potential victims of identity theft, and to receive notifications from users of their credit reports (such as employers or insurers) if any adverse action is taken based on their credit information.Reference:

Fair Credit Reporting Act - Wikipedia

What is the Fair Credit Reporting Act (FCRA)? | Money

The Fair Credit Reporting Act of 1970 - The Balance

How the Fair Credit Reporting Act (FCRA) Protects Consumer Rights

Privacy Is Hiring Inc., a CA-based company, is an online specialty recruiting firm focusing on placing privacy professionals in roles at major companies. Job candidates create online profiles outlining their experience and credentials, and can pay $19.99/month via credit card to have their profiles promoted to potential employers. Privacy Is Hiring Inc. keeps all customer data at rest encrypted on its servers.

Under what circumstances would Privacy Is Hiring Inc., need to notify affected individuals in the event of a data breach?

A.

If law enforcement has completed its investigation and has authorized Privacy Is Hiring Inc. to provide the notification to clients and applicable regulators.

A.

If law enforcement has completed its investigation and has authorized Privacy Is Hiring Inc. to provide the notification to clients and applicable regulators.

Answers
B.

If the job candidates' credit card information and the encryption keys were among the information taken.

B.

If the job candidates' credit card information and the encryption keys were among the information taken.

Answers
C.

If Privacy Is Hiring Inc., reasonably believes that job candidates will be harmed by the data breach.

C.

If Privacy Is Hiring Inc., reasonably believes that job candidates will be harmed by the data breach.

Answers
D.

If the personal information stolen included the individuals' names and credit card pin numbers.

D.

If the personal information stolen included the individuals' names and credit card pin numbers.

Answers
Suggested answer: B

Explanation:

Under the California Consumer Privacy Act (CCPA), a business that collects personal information of California residents must notify them of a data breach if their personal information is subject to unauthorized access and exfiltration, theft, or disclosure as a result of the business's violation of the duty to implement and maintain reasonable security procedures and practices. However, the CCPA excludes encrypted or redacted personal information from the definition of personal information, unless the encryption key or security credential is also compromised. Therefore, Privacy Is Hiring Inc. would need to notify the affected individuals only if the encryption keys were also taken along with the credit card information, as this would render the encryption ineffective and expose the personal information to unauthorized access. The other options are not relevant to the CCPA notification requirement, although they may be relevant to other laws or best practices.Reference:CCPA(Section 1798.150),IAPP CIPP/US Study Guide(p. 63-64)

SCENARIO

Please use the following to answer the next QUESTION

Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie's Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still be sitting in the office, unsecured.

Two days ago, Noah got another interview for a position at Sam's Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.

Regardless, the effect of Noah's credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills -- all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today.

In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money.

After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit.

Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job.

Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?

A.

The rules under the Fair Debt Collection Practices Act.

A.

The rules under the Fair Debt Collection Practices Act.

Answers
B.

The creation of the Consumer Financial Protection Bureau.

B.

The creation of the Consumer Financial Protection Bureau.

Answers
C.

Federal Trade Commission investigations into ''unfair and deceptive'' acts or practices.

C.

Federal Trade Commission investigations into ''unfair and deceptive'' acts or practices.

Answers
D.

Investigations of ''abusive'' acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.

D.

Investigations of ''abusive'' acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.

Answers
Suggested answer: D

Explanation:

The Dodd-Frank Act was established to prevent the risky financial practices that led to the 2007--2008 financial crisis, which included issues similar to Noah's experience with buying stocks without understanding the risks.The act includes provisions for consumer protection in financial services and aims to prevent abusive practices in the financial industry

More than half of U S. states require telemarketers to do which of the following?

A.

Identify themselves at the beginning of a call

A.

Identify themselves at the beginning of a call

Answers
B.

Obtain written consent from potential customers

B.

Obtain written consent from potential customers

Answers
C.

Register with the state before conducting business.

C.

Register with the state before conducting business.

Answers
D.

Provide written contracts for customer transactions

D.

Provide written contracts for customer transactions

Answers
Suggested answer: C

Explanation:

More than half of U.S. states require telemarketers to register with the state before conducting telemarketing activities. These registration requirements are part of state-level consumer protection laws aimed at regulating telemarketing practices to prevent fraud and abusive practices.

Why State Registration is Required:

Telemarketing registration requirements allow states to monitor and regulate telemarketers operating within their jurisdiction.

Registration ensures that telemarketers comply with state-specific rules, such as 'Do Not Call' list regulations or prohibitions on deceptive practices.

States like Florida, New York, and California are examples of jurisdictions with telemarketing registration laws.

Explanation of Options:

A. Identify themselves at the beginning of a call: This is a requirement under the Federal Trade Commission's (FTC) Telemarketing Sales Rule (TSR), but it is not unique to state requirements.

B. Obtain written consent from potential customers: While obtaining consent may be required in specific situations (e.g., under the Telephone Consumer Protection Act - TCPA for autodialed calls), it is not the most common state-level requirement.

C. Register with the state before conducting business: This is correct. Registration with the state is one of the most common requirements for telemarketers under state laws.

D. Provide written contracts for customer transactions: Written contracts are not universally required for telemarketing; this depends on the type of product or service being sold.

Reference from CIPP/US Materials:

FTC Telemarketing Sales Rule (TSR): Covers general telemarketing rules but acknowledges additional state-specific requirements, such as registration.

State Telemarketing Laws: Examples include Florida's Telemarketing Act, which requires state registration.

In the US, II is a best practice (and in some states a requirement) to conduct a data protection assessment in which instance?

A.

When a background check is used as part of the hiring process

A.

When a background check is used as part of the hiring process

Answers
B.

When any information is processed by a corporation.

B.

When any information is processed by a corporation.

Answers
C.

When trade secrets are shared with a third party.

C.

When trade secrets are shared with a third party.

Answers
D.

When technology is used to monitor employees.

D.

When technology is used to monitor employees.

Answers
Suggested answer: D

Explanation:

In the U.S., it is a best practice and, in some states, a requirement to conduct a data protection impact assessment (DPIA) or similar evaluation when technology is used to monitor employees. This practice aligns with privacy principles aimed at ensuring that monitoring practices are proportionate, necessary, and lawful, while minimizing potential harm to employees' privacy.

Why Conduct a DPIA When Monitoring Employees?

Employee Privacy Risks: Monitoring technologies, such as video surveillance, keystroke logging, or location tracking, can significantly impact employees' privacy. Assessments help evaluate these risks and ensure compliance with applicable privacy laws.

State-Specific Requirements: Some states, like California under the California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA), require businesses to implement privacy safeguards, including assessments for high-risk activities involving sensitive data.

Best Practices: Even when not legally required, conducting a DPIA demonstrates accountability and helps mitigate risks associated with employee privacy violations.

Explanation of Options:

A. When a background check is used as part of the hiring process: While background checks involve sensitive data and compliance with laws like the Fair Credit Reporting Act (FCRA), a DPIA is not typically required for this process. Instead, consent and notice are emphasized.

B. When any information is processed by a corporation: This is too broad. DPIAs are generally reserved for high-risk activities involving sensitive data or technologies, not for all data processing activities.

C. When trade secrets are shared with a third party: Sharing trade secrets involves contractual and confidentiality measures, but it does not usually necessitate a data protection assessment unless personal data is also involved.

D. When technology is used to monitor employees: This is correct. Monitoring employees with technology poses significant privacy risks, making it a best practice (and sometimes a requirement) to assess the impacts on privacy and ensure compliance with state and federal laws.

Reference from CIPP/US Materials:

California Privacy Rights Act (CPRA): Introduces risk assessments for certain data processing activities.

IAPP CIPP/US Certification Textbook: Discusses privacy risks associated with employee monitoring and the importance of impact assessments.

What is the purpose of a cure provision in a stale data privacy law?

A.

To allow a business a limited timeframe to fix alleged violations before facing enforcement.

A.

To allow a business a limited timeframe to fix alleged violations before facing enforcement.

Answers
B.

To allow consumers a period of time to discover their data has been mishandled

B.

To allow consumers a period of time to discover their data has been mishandled

Answers
C.

To allow a state to initiate formal enforcement actions for a fixed time period.

C.

To allow a state to initiate formal enforcement actions for a fixed time period.

Answers
D.

To allow certain provisions of a law to expire after a defined time period

D.

To allow certain provisions of a law to expire after a defined time period

Answers
Suggested answer: A

Explanation:

A cure provision in state data privacy laws gives businesses an opportunity to remediate violations of the law within a specified timeframe after receiving notice of the alleged violation. This provision is intended to promote compliance rather than immediately imposing penalties or enforcement actions.

Key Aspects of Cure Provisions:

Notice and Cure Period:

Businesses are given a timeframe (e.g., 30 days) to address the alleged violation before formal enforcement actions are taken by state authorities.

Encouraging Compliance:

Cure provisions incentivize businesses to implement corrective actions and ensure compliance without incurring fines or penalties for minor or first-time violations.

State-Specific Examples:

The California Consumer Privacy Act (CCPA) initially included a 30-day cure provision, though it was later limited under the California Privacy Rights Act (CPRA).

Other state laws, such as Virginia's Consumer Data Protection Act (VCDPA), also include cure provisions.

Explanation of Options:

A. To allow a business a limited timeframe to fix alleged violations before facing enforcement: This is correct. Cure provisions are specifically designed to give businesses an opportunity to address violations before facing enforcement actions.

B. To allow consumers a period of time to discover their data has been mishandled: This describes consumer rights related to data breach notifications, not cure provisions.

C. To allow a state to initiate formal enforcement actions for a fixed time period: Cure provisions delay enforcement actions rather than initiate them.

D. To allow certain provisions of a law to expire after a defined time period: This describes sunset provisions, not cure provisions.

Reference from CIPP/US Materials:

CCPA and CPRA: Discuss the cure provisions and their role in enforcement.

IAPP CIPP/US Certification Textbook: Highlights the purpose and impact of cure provisions in state privacy laws.


SCENARIO

Please use the following to answer the next QUESTION

Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie's Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still be sitting in the office, unsecured.

Two days ago, Noah got another interview for a position at Sam's Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.

Regardless, the effect of Noah's credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills -- all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today.

In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money.

After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit.

Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job.

Based on the scenario, which legislation should ease Noah's worry about his credit report as a result of applying at Arnie's Emporium?

A.

The Privacy Rule under the Gramm-Leach-Bliley Act (GLBA).

A.

The Privacy Rule under the Gramm-Leach-Bliley Act (GLBA).

Answers
B.

The Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA).

B.

The Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA).

Answers
C.

The Disposal Rule under the Fair and Accurate Credit Transactions Act (FACTA).

C.

The Disposal Rule under the Fair and Accurate Credit Transactions Act (FACTA).

Answers
D.

The Red Flags Rule under the Fair and Accurate Credit Transactions Act (FACTA).

D.

The Red Flags Rule under the Fair and Accurate Credit Transactions Act (FACTA).

Answers
Suggested answer: C

Explanation:

The Department of Commerce (DOC) plays a role in privacy policy by promoting the development and adoption of voluntary codes of conduct, standards, and best practices for the private sector, as well as facilitating cross-border data transfers through mechanisms such as the EU-U.S. Privacy Shield and the APEC Cross-Border Privacy Rules. However, the DOC does not have regulatory authority to enforce privacy laws or impose sanctions for privacy violations. The other agencies listed have some degree of regulatory authority over privacy issues within their respective domains. For example, the Office of the Comptroller of the Currency (OCC) supervises national banks and federal savings associations and enforces the GLBA privacy and security rules for these institutions. The Federal Communications Commission (FCC) regulates interstate and international communications and enforces the privacy and security rules for telecommunications carriers, broadband providers, and voice over internet protocol (VoIP) services. The Department of Transportation (DOT) oversees the transportation sector and enforces the privacy and security rules for airlines, travel agents, and other covered entities under the Aviation and Transportation Security Act (ATSA).Reference:

IAPP CIPP/US Certified Information Privacy Professional Study Guide, Chapter 1: Introduction to the U.S. Privacy Environment, Section 1.3: Federal Agencies with a Role in Privacy, p. 18-19

IAPP CIPP/US Body of Knowledge, Domain I: Introduction to the U.S. Privacy Environment, Objective I.B: Identify the major federal agencies with a role in privacy, Subobjective I.B.4: Identify the role of the Department of Commerce, p. 7

IAPP CIPP/US Exam Blueprint, Domain I: Introduction to the U.S. Privacy Environment, Objective I.B: Identify the major federal agencies with a role in privacy, Subobjective I.B.4: Identify the role of the Department of Commerce, p. 3

Which federal agency plays a role in privacy policy, but does NOT have regulatory authority?

A.

The Office of the Comptroller of the Currency.

A.

The Office of the Comptroller of the Currency.

Answers
B.

The Federal Communications Commission.

B.

The Federal Communications Commission.

Answers
C.

The Department of Transportation.

C.

The Department of Transportation.

Answers
D.

The Department of Commerce.

D.

The Department of Commerce.

Answers
Suggested answer: D

Explanation:

The Department of Commerce (DOC) plays a role in privacy policy by promoting the development and adoption of voluntary codes of conduct, standards, and best practices for the private sector, as well as facilitating cross-border data transfers through mechanisms such as the EU-U.S. Privacy Shield and the APEC Cross-Border Privacy Rules. However, the DOC does not have regulatory authority to enforce privacy laws or impose sanctions for privacy violations. The other agencies listed have some degree of regulatory authority over privacy issues within their respective domains. For example, the Office of the Comptroller of the Currency (OCC) supervises national banks and federal savings associations and enforces the GLBA privacy and security rules for these institutions. The Federal Communications Commission (FCC) regulates interstate and international communications and enforces the privacy and security rules for telecommunications carriers, broadband providers, and voice over internet protocol (VoIP) services. The Department of Transportation (DOT) oversees the transportation sector and enforces the privacy and security rules for airlines, travel agents, and other covered entities under the Aviation and Transportation Security Act (ATSA).Reference:

IAPP CIPP/US Certified Information Privacy Professional Study Guide, Chapter 1: Introduction to the U.S. Privacy Environment, Section 1.3: Federal Agencies with a Role in Privacy, p. 18-19

IAPP CIPP/US Body of Knowledge, Domain I: Introduction to the U.S. Privacy Environment, Objective I.B: Identify the major federal agencies with a role in privacy, Subobjective I.B.4: Identify the role of the Department of Commerce, p. 7

IAPP CIPP/US Exam Blueprint, Domain I: Introduction to the U.S. Privacy Environment, Objective I.B: Identify the major federal agencies with a role in privacy, Subobjective I.B.4: Identify the role of the Department of Commerce, p. 3

Total 195 questions
Go to page: of 20