Q: 11
All of the following should be mandatory in the contract for the outsourced vendor EXCEPT?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
What is the best way to understand the location, use and importance of personal data within an
organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A "right to erasure" request could be rejected if the processing of personal data is for?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
What is a key feature of the privacy metric template adapted from the National Institute of Standards
and Technology (NIST)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
SCENARIO
Please use the following to answer the next QUESTIO N:
Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new
privacy officer. The company is based in California but thanks to some great publicity from a social
media influencer last year, the company has received an influx of sales from the EU and has set up a
regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices
and assess what her privacy priorities will be, Penny has set up meetings with a number of
colleagues to hear about the work that they have been doing and their compliance efforts.
Penny’s colleague in Marketing is excited by the new sales and the company’s plans, but is also
concerned that Penny may curtail some of the growth opportunities he has planned. He tells her “I
heard someone in the breakroom talking about some new privacy laws but I really don’t think it
affects us. We’re just a small company. I mean we just sell accessories online, so what’s the real
risk?” He has also told her that he works with a number of small companies that help him get
projects completed in a hurry. “We’ve got to meet our deadlines otherwise we lose money. I just sign
the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes
time that we just don’t have.”
In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken
a number of precautions to protect its website from malicious activity, it has not taken the same level
of care of its physical files or internal infrastructure. Penny’s colleague in IT has told her that a former
employee lost an encrypted USB key with financial data on it when he left. The company nearly lost
access to their customer database last year after they fell victim to a phishing attack. Penny is told by
her IT colleague that the IT team “didn’t know what to do or who should do what. We hadn’t been
trained on it but we’re a small team though, so
it worked out OK in the end.” Penny is concerned that these issues will compromise Ace Space’s
privacy and data protection.
Penny is aware that the company has solid plans to grow its international sales and will be working
closely with the CEO to give the organization a data “shake up”. Her mission is to cultivate a strong
privacy culture within the company.
Penny has a meeting with Ace Space’s CEO today and has been asked to give her first impressions
and an overview of her next steps.
To establish the current baseline of Ace Space’s privacy maturity, Penny should consider all of the
following factors EXCEPT?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
You would like your organization to be independently audited to demonstrate compliance with
international privacy standards and to identify gaps for remediation.
Which type of audit would help you achieve this objective?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
SCENARIO
Please use the following to answer the next QUESTIO N:
Amira is thrilled about the sudden expansion of NatGen. As the joint Chief Executive Officer (CEO)
with her long-time business partner Sadie, Amira has watched the company grow into a major
competitor in the green energy market. The current line of products includes wind turbines, solar
energy panels, and equipment for geothermal systems. A talented team of developers means that
NatGen's line of products will only continue to grow.
With the expansion, Amira and Sadie have received advice from new senior staff members brought
on to help manage the company's growth. One recent suggestion has been to combine the legal and
security functions of the company to ensure observance of privacy laws and the company's own
privacy policy. This sounds overly complicated to Amira, who wants departments to be able to use,
collect, store, and dispose of customer data in ways that will best suit their needs. She does not want
administrative oversight and complex structuring to get in the way of people doing innovative work.
Sadie has a similar outlook. The new Chief Information Officer (CIO) has proposed what Sadie
believes is an unnecessarily long timetable for designing a new privacy program. She has assured him
that NatGen will use the best possible equipment for electronic storage of customer and employee
dat
a. She simply needs a list of equipment and an estimate of its cost. But the CIO insists that many
issues are necessary to consider before the company gets to that stage.
Regardless, Sadie and Amira insist on giving employees space to do their jobs. Both CEOs want to
entrust the monitoring of employee policy compliance to low-level managers. Amira and Sadie
believe these managers can adjust the company privacy policy according to what works best for their
particular departments. NatGen's CEOs know that flexible interpretations of the privacy policy in the
name of promoting green energy would be highly unlikely to raise any concerns with their customer
base, as long as the data is always used in course of normal business activities.
Perhaps what has been most perplexing to Sadie and Amira has been the CIO's recommendation to
institute a
privacy compliance hotline. Sadie and Amira have relented on this point, but they hope to
compromise by allowing employees to take turns handling reports of privacy policy violations. The
implementation will be easy because the employees need no special preparation. They will simply
have to document any concerns they hear.
Sadie and Amira are aware that it will be challenging to stay true to their principles and guard against
corporate culture strangling creativity and employee morale. They hope that all senior staff will see
the benefit of trying a unique approach.
If Amira and Sadie's ideas about adherence to the company's privacy policy go unchecked, the
Federal Communications Commission (FCC) could potentially take action against NatGen for what?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following is NOT recommended for effective Identity Access Management?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following is TRUE about a PIA (Privacy Impact Analysis)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
What should be the first major goal of a company developing a new privacy program?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 10