Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IAPP > Certified Information Privacy Professional > CIPP-US

CIPP-US Certified Information Privacy Professional/United States (CIPP/US) Question and Answers

Question # 4

All of the following common law torts are relevant to employee privacy under US law EXCEPT?

A.

Infliction of emotional distress.

B.

Intrusion upon seclusion.

C.

Defamation

D.

Conversion.

Full Access
Question # 5

A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.

What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?

A.

SCA

B.

ECPA

C.

CALEA

D.

USA Freedom Act

Full Access
Question # 6

What is the main purpose of the Global Privacy Enforcement Network?

A.

To promote universal cooperation among privacy authorities

B.

To investigate allegations of privacy violations internationally

C.

To protect the interests of privacy consumer groups worldwide

D.

To arbitrate disputes between countries over jurisdiction for privacy laws

Full Access
Question # 7

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

A.

California.

B.

Texas.

C.

Illinois.

D.

Washington.

Full Access
Question # 8

SCENARIO

Please use the following to answer the next QUESTION

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.

Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.

Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that

even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.

In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.

Based on Felicia’s Bring Your Own Device (BYOD) plan, the business consultant will most likely advise Felicia and Celeste to do what?

A.

Reconsider the plan in favor of a policy of dedicated work devices.

B.

Adopt the same kind of monitoring policies used for work-issued devices.

C.

Weigh any productivity benefits of the plan against the risk of privacy issues.

D.

Make employment decisions based on those willing to consent to the plan in writing.

Full Access
Question # 9

Sarah lives in San Francisco, California. Based on a dramatic increase in unsolicited commercial emails, Sarah believes that a major social media platform with over 50 million users has collected a lot of personal information about her. The company that runs the platform is based in New York and France.

Why is Sarah entitled to ask the social media platform to delete the personal information they have collected about her?

A.

Any company with a presence in Europe must comply with the General Data Protection Regulation globally, including in response to data subject deletion requests.

B.

Under Section 5 of the FTC Act, the Federal Trade Commission has held that refusing to delete an individual’s personal information upon request constitutes an unfair practice.

C.

The California Consumer Privacy Act entitles Sarah to request deletion of her personal information.

D.

The New York “Stop Hacks and Improve Electronic Data Security” (SHIELD) Act requires that businesses under New York’s jurisdiction must delete customers’ personal information upon request.

Full Access
Question # 10

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?

A.

By being present when patients are checking in

B.

By speaking to a patient without prior authorization

C.

By ignoring the conversation about a potential breach

D.

By following through with his plans for his upcoming paper

Full Access
Question # 11

Which federal act does NOT contain provisions for preempting stricter state laws?

A.

The CAN-SPAM Act

B.

The Children’s Online Privacy Protection Act (COPPA)

C.

The Fair and Accurate Credit Transactions Act (FACTA)

D.

The Telemarketing Consumer Protection and Fraud Prevention Act

Full Access
Question # 12

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

A.

A consent decree

B.

Stare decisis decree

C.

A judgment rider

D.

Common law judgment

Full Access
Question # 13

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between

their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months,one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

Based on the scenario, which of the following would have helped Janice to better meet the company’s needs?

A.

Creating a more comprehensive plan for implementing a new policy

B.

Spending more time understanding the company’s information goals

C.

Explaining the importance of transparency in implementing a new policy

D.

Removing the financial burden of the company’s employee training program

Full Access
Question # 14

Which of the following best describes private-sector workplace monitoring in the United States?

A.

Employers have broad authority to monitor their employees

B.

U.S. federal law restricts monitoring only to industries for which it is necessary

C.

Judgments in private lawsuits have severely limited the monitoring of employees

D.

Most employees are protected from workplace monitoring by the U.S. Constitution

Full Access
Question # 15

The CFO of a pharmaceutical company is duped by a phishing email and discloses many of the company’s employee personnel files to an online predator. The files include employee contact information, job applications, performance reviews, discipline records, and job descriptions.

Which of the following state laws would be an affected employee’s best recourse against the employer?

A.

The state social security number confidentiality statute.

B.

The state personnel record review statute.

C.

The state data destruction statute.

D.

The state UDAP statute.

Full Access
Question # 16

In which situation would a policy of “no consumer choice” or “no option” be expected?

A.

When a job applicant’s credit report is provided to an employer

B.

When a customer’s financial information is requested by the government

C.

When a patient’s health record is made available to a pharmaceutical company

D.

When a customer’s street address is shared with a shipping company

Full Access
Question # 17

Who has rulemaking authority for the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA)?

A.

State Attorneys General

B.

The Federal Trade Commission

C.

The Department of Commerce

D.

The Consumer Financial Protection Bureau

Full Access
Question # 18

Which federal agency plays a role in privacy policy, but does NOT have regulatory authority?

A.

The Office of the Comptroller of the Currency.

B.

The Federal Communications Commission.

C.

The Department of Transportation.

D.

The Department of Commerce.

Full Access
Question # 19

What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?

A.

Where one of the parties has given consent

B.

Where state law permits such interception

C.

If an organization intercepts an employee’s purely personal call

D.

Only if all parties have given consent

Full Access
Question # 20

Which of the following became the first state to pass a law specifically regulating the practices of data brokers?

A.

Washington.

B.

California.

C.

New York.

D.

Vermont.

Full Access
Question # 21

Which of the following conditions would NOT be sufficient to excuse an entity from providing breach notification under state law?

A.

If the data involved was encrypted.

B.

If the data involved was accessed but not exported.

C.

If the entity was subject to the GLBA Safeguards Rule.

D.

If the entity followed internal notification procedures compatible with state law.

Full Access
Question # 22

Which of the following is NOT a principle found in the APEC Privacy Framework?

A.

Integrity of Personal Information.

B.

Access and Correction.

C.

Preventing Harm.

D.

Privacy by Design.

Full Access
Question # 23

According to FERPA, when can a school disclose records without a student’s consent?

A.

If the disclosure is not to be conducted through email to the third party

B.

If the disclosure would not reveal a student’s student identification number

C.

If the disclosure is to practitioners who are involved in a student’s health care

D.

If the disclosure is to provide transcripts to a school where a student intends to enroll

Full Access
Question # 24

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her

withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?

A.

As a data supervisor

B.

As a data processor

C.

As a data controller

D.

As a data manager

Full Access
Question # 25

In 2011, the FTC announced a settlement with Google regarding its social networking service Google Buzz. The FTC alleged that in the process of launching the service, the company did all of the following EXCEPT?

A.

Violated its own privacy policies.

B.

Engaged in deceptive trade practices.

C.

Failed to comply with Safe Harbor principles.

D.

Failed to employ sufficient security safeguards.

Full Access
Question # 26

Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?

A.

A local nonprofit charity’s fundraiser

B.

An online merchant’s free shipping offer

C.

A national bank’s no-fee checking promotion

D.

A city bus system’s frequent rider program

Full Access
Question # 27

Which of the following is NOT one of three broad categories of products offered by data brokers, as identified by the U.S. Federal Trade Commission (FTC)?

A.

Research (such as information for understanding consumer trends).

B.

Risk mitigation (such as information that may reduce the risk of fraud).

C.

Location of individuals (such as identifying an individual from partial information).

D.

Marketing (such as appending data to customer information that a marketing company already has).

Full Access
Question # 28

A large online bookseller decides to contract with a vendor to manage Personal Information (PI). What is the

least important factor for the company to consider when selecting the vendor?

A.

The vendor’s reputation

B.

The vendor’s financial health

C.

The vendor’s employee retention rates

D.

The vendor’s employee training program

Full Access
Question # 29

Which of the following is most likely to provide privacy protection to private-sector employees in the United States?

A.

State law, contract law, and tort law

B.

The Federal Trade Commission Act (FTC Act)

C.

Amendments one, four, and five of the U.S. Constitution

D.

The U.S. Department of Health and Human Services (HHS)

Full Access
Question # 30

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Under the GDPR, the complainant’s request regarding her personal information is known as what?

A.

Right of Access

B.

Right of Removal

C.

Right of Rectification

D.

Right to Be Forgotten

Full Access
Question # 31

Under the Driver’s Privacy Protection Act (DPPA), which of the following parties would require consent of an individual in order to obtain his or her Department of Motor Vehicle information?

A.

Law enforcement agencies performing investigations.

B.

Insurance companies needing to investigate claims.

C.

Attorneys gathering information related to lawsuits.

D.

Marketers wishing to distribute bulk materials.

Full Access
Question # 32

Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?

A.

Announcing the tracking of online behavior for advertising purposes.

B.

Integrating privacy protections during product development.

C.

Allowing consumers to opt in before collecting any data.

D.

Mitigating harm to consumers after a security breach.

Full Access
Question # 33

Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and operating in 7 other states. SMH uses an electronic medical record to enter and track information about its patients. Recently, SMH suffered a data breach where a third-party hacker was able to gain access to the SMH internal network.

Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights at the U.S. Department of Health and Human Services about the breach.

Which statement accurately describes SMH’s notification responsibilities?

A.

If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York.

B.

If SMH has more than 500 patients in the state of New York, it will need to make separate notifications to these patients.

C.

If SMH must make a notification in any other state in which it operates, it must also make a notification to individuals in New York.

D.

If SMH makes credit monitoring available to individuals who inquire, it will not have to make a separatenotification to individuals in the state of New York.

Full Access
Question # 34

U.S. federal laws protect individuals from employment discrimination based on all of the following EXCEPT?

A.

Age.

B.

Pregnancy.

C.

Marital status.

D.

Genetic information.

Full Access
Question # 35

The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?

A.

The 1974 Privacy Act

B.

Common law principles

C.

European Union Directive

D.

Traditional fair information practices

Full Access
Question # 36

In what way does the “Red Flags Rule” under the Fair and Accurate Credit Transactions Act (FACTA) relate to the owner of a grocery store who uses a money wire service?

A.

It mandates the use of updated technology for securing credit records

B.

It requires the owner to implement an identity theft warning system

C.

It is not usually enforced in the case of a small financial institution

D.

It does not apply because the owner is not a creditor

Full Access
Question # 37

Which law provides employee benefits, but often mandates the collection of medical information?

A.

The Occupational Safety and Health Act.

B.

The Americans with Disabilities Act.

C.

The Employee Medical Security Act.

D.

The Family and Medical Leave Act.

Full Access
Question # 38

What is the main purpose of the CAN-SPAM Act?

A.

To diminish the use of electronic messages to send sexually explicit materials

B.

To authorize the states to enforce federal privacy laws for electronic marketing

C.

To empower the FTC to create rules for messages containing sexually explicit content

D.

To ensure that organizations respect individual rights when using electronic advertising

Full Access
Question # 39

SCENARIO

Please use the following to answer the next QUESTION:

Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were really serious about not being bothered,” Evan said, “They’d be on the national DNC list. That’s the only one we’re required to follow. At SunriseLynx, we call until they ask us not to.”

Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call “another time.” This, to Larry, is a clear indication that they don’t want to be called at all. Evan doesn’t see it that way.

Larry believes that Evan’s arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan’s political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions.

Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan’s leadership.

Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker’s belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss.

Larry wants to take action, but is uncertain how to proceed.

In regard to telemarketing practices, Evan the supervisor has a misconception regarding?

A.

The conditions under which recipients can opt out

B.

The wishes of recipients who request callbacks

C.

The right to monitor calls for quality assurance

D.

The relationship of state law to federal law

Full Access
Question # 40

A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?

A.

Department of Health and Human Services

B.

The affected individuals

C.

The local media

D.

Medical providers

Full Access
Question # 41

Which entities must comply with the Telemarketing Sales Rule?

A.

For-profit organizations and for-profit telefunders regarding charitable solicitations

B.

Nonprofit organizations calling on their own behalf

C.

For-profit organizations calling businesses when a binding contract exists between them

D.

For-profit and not-for-profit organizations when selling additional services to establish customers

Full Access
Question # 42

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company’s privacy program?

A.

Consumers have a right to exercise control over how companies use their personal data.

B.

Consumers have a right to reasonable limits on the personal data that a company retains.

C.

Consumers have a right to easily accessible information about privacy and security practices.

D.

Consumers have a right to correct personal data in a manner that is appropriate to the sensitivity.

Full Access
Question # 43

When may a financial institution share consumer information with non-affiliated third parties for marketing purposes?

A.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt in.

B.

After disclosing marketing practices to customers and after giving them an opportunity to opt in.

C.

After disclosing information-sharing practices to customers and after giving them an opportunity to opt out.

D.

After disclosing marketing practices to customers and after giving them an opportunity to opt out.

Full Access
Question # 44

In 2012, the White House and the FTC both issued reports advocating a new approach to privacy enforcement that can best be described as what?

A.

Harm-based.

B.

Self-regulatory.

C.

Comprehensive.

D.

Notice and choice.

Full Access
Question # 45

If an organization certified under Privacy Shield wants to transfer personal data to a third party acting as an agent, the organization must ensure the third party does all of the following EXCEPT?

A.

Uses the transferred data for limited purposes

B.

Provides the same level of privacy protection as the organization

C.

Notifies the organization if it can no longer meet its requirements for proper data handling

D.

Enters a contract with the organization that states the third party will process data according to the consent agreement

Full Access
Question # 46

Privacy Is Hiring Inc., a CA-based company, is an online specialty recruiting firm focusing on placing privacy professionals in roles at major companies. Job candidates create online profiles

outlining their experience and credentials, and can pay $19.99/month via credit card to have their profiles promoted to potential employers. Privacy Is Hiring Inc. keeps all customer data at rest encrypted on its servers.

Under what circumstances would Privacy Is Hiring Inc., need to notify affected individuals in the event of a data breach?

A.

If law enforcement has completed its investigation and has authorized Privacy Is Hiring Inc. to provide the notification to clients and applicable regulators.

B.

If the job candidates’ credit card information and the encryption keys were among the information taken.

C.

If Privacy Is Hiring Inc., reasonably believes that job candidates will be harmed by the data breach.

D.

If the personal information stolen included the individuals’ names and credit card pin numbers.

Full Access
Question # 47

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-basedretailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Upon review, the data privacy leader discovers that the Company’s documented data inventory is obsolete. What is the data privacy leader’s next best source of information to aid the investigation?

A.

Reports on recent purchase histories

B.

Database schemas held by the retailer

C.

Lists of all customers, sorted by country

D.

Interviews with key marketing personnel

Full Access
Question # 48

SCENARIO

Please use the following to answer the next QUESTION

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.

Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.

Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that

even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.

In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.

Which law will be most relevant to Felicia’s plan to ask applicants about drug addiction?

A.

The Americans with Disabilities Act (ADA).

B.

The Occupational Safety and Health Act (OSHA).

C.

The Genetic Information Nondiscrimination Act of 2008.

D.

The Health Insurance Portability and Accountability Act (HIPAA).

Full Access
Question # 49

Federal laws establish which of the following requirements for collecting personal information of minors under the age of 13?

A.

Implied consent from a minor’s parent or guardian, or affirmative consent from the minor.

B.

Affirmative consent from a minor’s parent or guardian before collecting the minor’s personal information online.

C.

Implied consent from a minor’s parent or guardian before collecting a minor’s personal information online, such as when they permit the minor to use the internet.

D.

Affirmative consent of a parent or guardian before collecting personal information of a minor offline (e.g., in person), which also satisfies any requirements for online consent.

Full Access
Question # 50

When does the Telemarketing Sales Rule require an entity to share a do-not-call request across its organization?

A.

When the operational structures of its divisions are not transparent

B.

When the goods and services sold by its divisions are very similar

C.

When a call is not the result of an error or other unforeseen cause

D.

When the entity manages user preferences through multiple platforms

Full Access