ExamGecko
Question list
Search
Search

Related questions











Question 119 - CIPP-US discussion

Report
Export

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company's directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company's customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees' access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers' financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company's executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta's guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

What could the company have done differently prior to the breach to reduce their risk?

A.

Implemented a comprehensive policy for accessing customer information.

Answers
A.

Implemented a comprehensive policy for accessing customer information.

B.

Honored the promise of its privacy policy to acquire information by using an opt-in method.

Answers
B.

Honored the promise of its privacy policy to acquire information by using an opt-in method.

C.

Looked for any persistent threats to security that could compromise the company's network.

Answers
C.

Looked for any persistent threats to security that could compromise the company's network.

D.

Communicated requests for changes to users' preferences across the organization and with third parties.

Answers
D.

Communicated requests for changes to users' preferences across the organization and with third parties.

Suggested answer: A

Explanation:

The scenario suggests that the company lacked adequate rules about access to customer information, which increased the risk of unauthorized access and data breach. Implementing a comprehensive policy for accessing customer information would have helped the company to limit the access to only those who need it for legitimate purposes, and to protect the confidentiality, integrity, and availability of the data. This is also one of the recommendations that Roberta made in her report.Reference:

CIPP/US Practice Questions (Sample Questions), Question 116, Answer A, Explanation A.

IAPP CIPP/US Certified Information Privacy Professional Study Guide, Chapter 5, Section 5.2, p. 143.

asked 22/11/2024
Kelvin Galabuzi
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first