PECB GDPR
Q: 1
Questio n:
Based on Article 58 of GDPR, what powers must the supervisory authority have?
Options
Q: 2
Questio n:
All the statements below regarding the lawfulness of processing are correct, except:
Options
Q: 3
Scenario 5:
Recpond is a German employment recruiting company. Their services are delivered globally and
include consulting and staffing solutions. In the beginning. Recpond provided its services through an
office in Germany. Today, they have grown to become one of the largest recruiting agencies,
providing employment to more than 500,000 people around the world. Recpond receives most
applications through its website. Job searchers are required to provide the job title and location.
Then, a list of job opportunities is provided. When a job position is selected, candidates are required
to provide their contact details and professional work experience records. During the process, they
are informed that the information will be used only for the purposes and period determined by
Recpond. Recpond's experts analyze candidates' profiles and applications and choose the candidates
that are suitable for the job position. The list of the selected candidates is then delivered to
Recpond's clients, who proceed with the recruitment process. Files of candidates that are not
selected are stored in Recpond's databases, including the personal data of candidates who withdraw
the consent on which the processing was based. When the GDPR came into force, the company was
unprepared. The top management appointed a DPO and consulted him for all data protection issues.
The DPO, on the other hand, reported the progress of all data protection activities to the top
management. Considering the level of sensitivity of the personal data processed by Recpond, the
DPO did not have direct access to the personal data of all clients, unless the top management
deemed it necessary. The DPO planned the GDPR implementation by initially analyzing the
applicable GDPR requirements. Recpond, on the other hand, initiated a risk assessment to
understand the risks associated with processing operations. The risk assessment was conducted
based on common risks that employment recruiting companies face. After analyzing different risk
scenarios, the level of risk was determined and evaluated. The results were presented to the DPO,
who then decided to analyze only the risks that have a greater impact on the company. The DPO
concluded that the cost required for treating most of the identified risks was higher than simply
accepting them. Based on this analysis, the DPO decided to accept the actual level of the identified
risks. After reviewing policies and procedures of the company. Recpond established a new data
protection policy. As proposed by the DPO, the information security policy was also updated. These
changes were then communicated to all employees of Recpond. Based on this scenario, answer the
following Questio n:
Questio n:
Recpond stores files of candidates who are not selected in its databases, even if they withdraw
consent. Is this acceptable under GDPR?
Options
Q: 4
Scenario 7: EduCCS is an online education platform based in Netherlands. EduCCS helps
organizations find, manage, and deliver their corporate training. Most of EduCCS's clients are EU
residents. EduCCS is one of the few education organizations that have achieved GDPR compliance
since 2019. Their DPO is a full-time employee who has been engaged in most data protection
processes within the organization. In addition to facilitating GDPR compliance, the DPO acts as an
intermediary point between EduCCS and other relevant interested parties. EduCCS's users can
benefit from the variety of up-to-date training library and the possibility of accessing it through their
phones, tablets, or computers. EduCCS's services are offered through two main platforms: online
learning and digital training. To use one of these platforms, users should sign on EduCCS's website by
providing their personal information. Online learning is a platform in which employees of other
organizations can search for and request the training they need. Through its digital training platform,
on the other hand, EduCCS manages the entire training and education program for other
organizations. Organizations that need this type of service need to provide information about their
core activities and areas where training sessions are needed. This information is then analyzed by
EduCCS and a customized training program is provided. In the beginning, all IT-related services were
managed by two employees of EduCCS. However, after acquiring a large number of clients,
managing these services became challenging That is why EduCCS decided to outsource the IT service
function to X-Tech. X-Tech provides IT support and is responsible for ensuring the security of
EduCCS's network and systems. In addition, X-Tech stores and archives EduCCS's information
including their training programs and clients' and employees' dat
a. Recently, X-Tech made headlines in the technology press for being a victim of a phishing attack. A
group of three attackers hacked X-Tech’s systems via a phishing campaign which targeted the
employees of the Marketing Department. By compromising X-Tech's mail server, hackers were able
to gain access to more than 200 computer systems. Consequently, access to the networks of
EduCCS’s clients was also allowed. Using EduCCS's employee accounts, attackers installed a remote
access tool on EduCCS's compromised systems. By doing so, they gained access to personal
information of EduCCS's clients, training programs, and other information stored in its online
payment system. The attack was detected by X-Tech’s system administrator. After detecting unusual
activity in X-Tech’s network, they immediately reported it to the incident management team of the
company. One week after being notified about the personal data breach, EduCCS communicated the
incident to the supervisory authority with a document that outlined the reasons for the delay
revealing that due to the lack of regular testing or modification, their incident response plan was not
adequately prepared to handle such an attack. Based on this scenario, answer the following Questio
n:
Questio n:
Based on scenario 7, did EduCCS comply with GDPR regarding data breach notification requirements?
Options
Q: 5
Scenario: 2
Soyled is a retail company that sells a wide range of electronic products from top European brands. It
primarily sells its products in its online platforms (which include customer reviews and ratings),
despite using physical stores since 2015. Soyled's website and mobile app are used by millions of
customers. Soyled has employed various solutions to create a customer-focused ecosystem and
facilitate growth. Soyled uses customer relationship management (CRM) software to analyze user
data and administer the interaction with customers. The software allows the company to store
customer information, identify sales opportunities, and manage marketing campaigns. It
automatically obtains information about each user's IP address and web browser cookies. Soyled
also uses the software to collect behavioral data, such as users’ repeated actions and mouse
movement information. Customers must create an account to buy from Soyled’s online platforms. To
do so, they fill out a standard sign-up form of three mandatory boxes (name, surname, email
address) and a non-mandatory one (phone number). When the user clicks the email address box, a
pop-up message appears as follows: “Soyled needs your email address to grant you access to your
account and contact you about any changes related to your account and our website. For further
information, please read our privacy policy.' When the user clicks the phone number box, the
following message appears: “Soyled may use your phone number to provide text updates on the
order status. The phone number may also be used by the shipping courier." Once the personal data is
provided, customers create a username and password, which are used to access Soyled's website or
app. When customers want to make a purchase, they are also required to provide their bank account
details. When the user finally creates the account, the following message appears: “Soyled collects
only the personal data it needs for the following purposes: processing orders, managing accounts,
and personalizing customers' experience. The collected data is shared with our network and used for
marketing purposes." Soyled uses personal data to promote sales and its brand. If a user decides to
close the account, the personal data is still used for marketing purposes only. Last month, the
company received an email from John, a customer, claiming that his personal data was being used for
purposes other than those specified by the company. According to the email, Soyled was using the
data for direct marketing purposes. John requested details on how his personal data was collected,
stored, and processed. Based on this scenario, answer the following Questio n:
Questio n:
The GDPR indicates that the processing of personal data should be based on a legal contract with the
data subject. Based on scenario 6, has Soyled fulfilled this requirement?
Options
Q: 6
Questio n:
A patient gave consent for the use of their laboratory tests to defend a clinical laboratory against a
lawsuit. As a result, the court required the collection and processing of the patient's health data, and
such information was revealed in court.
Is this compliant with GDPR's lawfulness of processing requirements?
Options
Q: 7
Scenario 5:
Recpond is a German employment recruiting company. Their services are delivered globally and
include consulting and staffing solutions. In the beginning. Recpond provided its services through an
office in Germany. Today, they have grown to become one of the largest recruiting agencies,
providing employment to more than 500,000 people around the world. Recpond receives most
applications through its website. Job searchers are required to provide the job title and location.
Then, a list of job opportunities is provided. When a job position is selected, candidates are required
to provide their contact details and professional work experience records. During the process, they
are informed that the information will be used only for the purposes and period determined by
Recpond. Recpond's experts analyze candidates' profiles and applications and choose the candidates
that are suitable for the job position. The list of the selected candidates is then delivered to
Recpond's clients, who proceed with the recruitment process. Files of candidates that are not
selected are stored in Recpond's databases, including the personal data of candidates who withdraw
the consent on which the processing was based. When the GDPR came into force, the company was
unprepared. The top management appointed a DPO and consulted him for all data protection issues.
The DPO, on the other hand, reported the progress of all data protection activities to the top
management. Considering the level of sensitivity of the personal data processed by Recpond, the
DPO did not have direct access to the personal data of all clients, unless the top management
deemed it necessary. The DPO planned the GDPR implementation by initially analyzing the
applicable GDPR requirements. Recpond, on the other hand, initiated a risk assessment to
understand the risks associated with processing operations. The risk assessment was conducted
based on common risks that employment recruiting companies face. After analyzing different risk
scenarios, the level of risk was determined and evaluated. The results were presented to the DPO,
who then decided to analyze only the risks that have a greater impact on the company. The DPO
concluded that the cost required for treating most of the identified risks was higher than simply
accepting them. Based on this analysis, the DPO decided to accept the actual level of the identified
risks. After reviewing policies and procedures of the company. Recpond established a new data
protection policy. As proposed by the DPO, the information security policy was also updated. These
changes were then communicated to all employees of Recpond. Based on this scenario, answer the
following Questio n:
Questio n:
According to scenario 5, the DPO decided to accept most of the identified risks related to data
processing. Is this acceptable under GDPR?
Options
Q: 8
Bus Spot is one of the largest bus operators in Spain. The company operates in local transport and
bus rental since 2009. The success of Bus Spot can be attributed to the digitization of the bus
ticketing system, through which clients can easily book tickets and stay up to date on any changes to
their arrival or departure time. In recent years, due to the large number of passengers transported
daily. Bus Spot has dealt with different incidents including vandalism, assaults on staff, and
fraudulent injury claims. Considering the severity of these incidents, the need for having strong
security measures had become crucial. Last month, the company decided to install a CCTV system
across its network of buses. This security measure was taken to monitor the behavior of the
company's employees and passengers, enabling crime prevention and ensuring safety and security.
Following this decision, Bus Spot initiated a data protection impact assessment (DPIA). The outcome
of each step of the DPIA was documented as follows: Step 1: In all 150 buses, two CCTV cameras will
be installed. Only individuals authorized by Bus Spot will have access to the information generated
by the CCTV system. CCTV cameras capture images only when the Bus Spot's buses are being used.
The CCTV cameras will record images and sound. The information is transmitted to a video recorder
and stored for 20 days. In case of incidents, CCTV recordings may be stored for more than 40 days
and disclosed to a law enforcement body. Data collected through the CCTV system will be processed
bv another organization. The purpose of processing this tvoe of information is to increase the
security and safety of individuals and prevent criminal activity. Step 2: All employees of Bus Spot
were informed for the installation of a CCTV system. As the data controller, Bus Spot will have the
ultimate responsibility to conduct the DPI
Options
Q: 9
Questio n:
According to the principle of data minimization, data must be:
Options
Q: 10
Bus Spot is one of the largest bus operators in Spain. The company operates in local transport and
bus rental since 2009. The success of Bus Spot can be attributed to the digitization of the bus
ticketing system, through which clients can easily book tickets and stay up to date on any changes to
their arrival or departure time. In recent years, due to the large number of passengers transported
daily. Bus Spot has dealt with different incidents including vandalism, assaults on staff, and
fraudulent injury claims. Considering the severity of these incidents, the need for having strong
security measures had become crucial. Last month, the company decided to install a CCTV system
across its network of buses. This security measure was taken to monitor the behavior of the
company's employees and passengers, enabling crime prevention and ensuring safety and security.
Following this decision, Bus Spot initiated a data protection impact assessment (DPIA). The outcome
of each step of the DPIA was documented as follows: Step 1: In all 150 buses, two CCTV cameras will
be installed. Only individuals authorized by Bus Spot will have access to the information generated
by the CCTV system. CCTV cameras capture images only when the Bus Spot's buses are being used.
The CCTV cameras will record images and sound. The information is transmitted to a video recorder
and stored for 20 days. In case of incidents, CCTV recordings may be stored for more than 40 days
and disclosed to a law enforcement body. Data collected through the CCTV system will be processed
bv another organization. The purpose of processing this tvoe of information is to increase the
security and safety of individuals and prevent criminal activity. Step 2: All employees of Bus Spot
were informed for the installation of a CCTV system. As the data controller, Bus Spot will have the
ultimate responsibility to conduct the DPI
Options
Question 1 of 10