Q: 1
During a merger and acquisition, the most comprehensive review of privacy risks and gaps occurs
when conducting what activity?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
When devising effective employee policies to address a particular issue, which of the following
should be included in the first draft?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
If an organization maintains a separate ethics office, to whom would its officer typically report to in
order to retain the greatest degree of independence?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following best demonstrates the effectiveness of a firm’s privacy incident response
process?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
All of the following are accurate regarding the use of technical security controls EXCEPT?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Incipia Corporation just trained the last of its 300 employees on their new privacy policies and
procedures.
If Incipia wanted to analyze the effectiveness of the training over the next 6 months, which form of
trend analysis should they use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
SCENARIO
Please use the following to answer the next QUESTIO N:
Liam is the newly appointed information technology (IT) compliance manager at Mesa, a USbased
outdoor clothing brand with a global E-commerce presence. During his second week, he is contacted
by the company’s IT audit manager, who informs him that the auditing team will be conducting a
review of Mesa’s privacy compliance risk in a month.
A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to
privacy compliance before leaving the company. Liam is told that a consent management tool had
been added to the website and they commissioned a privacy risk evaluation from a small consulting
firm last year that determined that their risk exposure was relatively low given their current control
environment. After reading the consultant’s report, Liam realized that the scope of the assessment
was limited to breach notification laws in the US and the Payment Card Industry’s Data Security
Standard (PCI DSS).
Not wanting to let down his new team, Liam kept his concerns about the report to himself and
figured he could try to put some additional controls into place before the audit. Having some privacy
compliance experience in his last role, Liam thought he might start by having discussions with the E-
commerce and marketing teams.
The E-commerce Director informed him that they were still using the cookie consent tool forcibly
placed on the home screen by the CIO, but could not understand the point since their office was not
located in California or Europe. The marketing director touted his department’s success with
purchasing email lists and taking a shotgun approach to direct marketing. Both directors highlighted
their tracking tools on the website to enhance customer experience while learning more about
where else the customer had shopped. The more people Liam met with, the more it became
apparent that privacy awareness and the general control environment at Mesa needed help.
With three weeks before the audit, Liam updated Mesa's Privacy Notice himself, which was taken
and revised from a competitor’s website. He also wrote policies and procedures outlining the roles
and responsibilities for privacy within Mesa and distributed the document to all departments he
knew of with access to personal information.
During this time. Liam also filled the backlog of data subject requests for deletion that had been sent
to him by the customer service manager. Liam worked with application owners to remove these
individual's information and order history from the customer relationship management (CRM) tool,
the enterprise resource planning (ERP). the data warehouse and the email server.
At the audit kick-off meeting. Liam explained to his boss and her team that there may still be some
room for improvement, but he thought the risk had been mitigated to an appropriate level based on
the work he had done thus far.
After the audit had been completed, the audit manager and Liam met to discuss her team’s findings,
and much to his dismay. Liam was told that none of the work he had completed prior to the audit
followed best practices for governance and risk mitigation. In fact, his actions only opened the
company up to additional risk and scrutiny. Based on these findings. Liam worked with external
counsel and an established privacy consultant to develop a remediation plan.
What key error related to program governance did Liam make prior to the audit kick-off meeting?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following is NOT typically a function of a Privacy Officer?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
In a sample metric template, what does “target” mean?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Rationalizing requirements in order to comply with the various privacy requirements required by
applicable law and regulation does NOT include which of the following?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 10