ExamGecko
Home Home / IAPP / CIPM
Question list
Search
Search

List of questions

Search

Related questions











Question 179 - CIPM discussion

Report
Export

SCENARIO

Please use the following to answer the next question

You were recently hired by InStyte Date Corp as a privacy manager to help InStyle Data Corp become compliant with a new data protection law

The law mandates that businesses have reasonable and appropriate security measures in place to protect personal data. Violations of that mandate are heavily fined and the legislators have stated that they will aggressively pursue companies that don t comply with the new law

You are paved with a security manager and tasked with reviewing InStyle Data Corp s current state and advising the business how it can meet the 'reasonable and appropriate security' requirement InStyle Data Corp has grown rapidly and has not kept a data inventory or completed a data mapping InStyte Data Corp has also developed security-related policies ad hoc and many have never been implemented The various teams involved in the creation and testing of InStyle Data Corp s products experience significant turnover and do not have well defined roles There's little documentation addressing what personal data is processed by which product and for what purpose

Work needs to begin on this project immediately so that InStyle Data Corp can become compliant by the time the law goes into effect. You and you partner discover that InStyle Data Corp regularly sends files containing sensitive personal data back to its customers through email sometimes using InStyle Data Corp employees personal email accounts. You also team that InStyle Data Corp s privacy and information security teams are not informed of new personal data flows, new products developed by InStyte Data Corp that process personal data, or updates to existing InStyle Data Corp products that may change what or how the personal data is processed until after the product or update has gone have.

Through a review of InStyle Date Corp's test and development environment logs, you discover InStyle Data Corp sometimes gives login credentials to any InStyle Data Corp employee or contractor who requests them. The test environment only contains dummy data but the development environment contains personal data including Social Security Numbers, hearth ^formation and financial information All credentialed InStyle Data Corp employees and contractors have the ability to after and delete personal data in both environments regardless of their role or what project they are working on.

You and your partner provide a gap assessment citing the issues you spotted, along with recommended remedial actions and a method to measure implementation InStyle Data Corp implements all of the recommended security controls You review the processes roles, controls and measures taken to appropriately protect the personal data at every stop However, you realize there is no plan for monitoring and nothing in place addressing sanctions for violations of the updated policies and procedures InStyle Data Corp pushes back, stating they do not have the resources for such monitoring.

What aspect of the data management life cycle will still be unaddressed it you cannot find the resources to become compliant?

A.

Auditability.

Answers
A.

Auditability.

B.

Enforcement

Answers
B.

Enforcement

C.

Irretrievability

Answers
C.

Irretrievability

D.

Access management

Answers
D.

Access management

Suggested answer: B

Explanation:

The aspect of the data management life cycle that will still be unaddressed if you cannot find the resources to become compliant is enforcement. Enforcement means ensuring that the data policies and procedures are followed by all data users and stakeholders, and that any violations or deviations are detected, reported, and corrected. Enforcement also involves imposing sanctions or penalties for non-compliance, such as revoking access rights, issuing warnings, or terminating contracts. Without enforcement, the data security measures that you implemented may not be effective or sustainable, as there would be no accountability or deterrence for data misuse or abuse1, 2.

To address the enforcement aspect of the data management life cycle, you should try to convince InStyle Data Corp of the importance and benefits of monitoring and sanctioning data activities. You should explain that monitoring can help identify and prevent data breaches, errors, or inefficiencies, as well as demonstrate compliance with the new data protection law. You should also explain that sanctioning can help enforce data discipline and responsibility, as well as deter potential violators or malicious actors. You should also propose some possible ways to allocate or optimize the resources for monitoring and sanctioning, such as automating some processes, outsourcing some tasks, or prioritizing some data types or sources1, 2.

asked 22/11/2024
Muhammed Seyda UCAK
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first