Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with ValidTests

Exam CIPM All Questions
Exam CIPM Premium Access

View all detail and faqs for the CIPM exam

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

Your company provides a SaaS tool for B2B services and does not interact with individual consumers. A client's current employee reaches out with a right to delete request. what is the most appropriate response?

Options:

A.

Forward the request to the contact on file for the client asking them how they would like you to proceed.

B.

Redirect the individual back to their employer to understand their rights and how this might impact access to company tools.

C.

Process the request assuming that the individual understands the implications to their organization if their information is deleted.

D.

Explain you are unable to process the request because business contact information and associated data is not covered under privacy rights laws.

Expert Solution
Questions # 32:

Under the GDPR, what obligation does a data controller or processor have after appointing a data protection officer (DPO)?

Options:

A.

To submit for approval to the DPO a code of conduct to govern organizational practices and demonstrate compliance with data protection principles.

B.

To provide resources necessary to carry out the defined tasks of the DPO and to maintain their expert knowledge.

C.

To ensure that the DPO acts as the sole point of contact for individuals' questions about their personal data.

D.

To ensure that the DPO receives sufficient instructions regarding the exercise of their defined tasks.

Expert Solution
Questions # 33:

All of the following are components of a data collection notice EXCEPT?

Options:

A.

The categories of information shared with third parties

B.

The length of time the personal information will be stored.

C.

The meta-data which could be generated from collection of the information.

D.

The lawful interests pursued by the responsible party collecting the information.

Expert Solution
Questions # 34:

Which is the best way to view an organization’s privacy framework?

Options:

A.

As an industry benchmark that can apply to many organizations

B.

As a fixed structure that directs changes in the organization

C.

As an aspirational goal that improves the organization

D.

As a living structure that aligns to changes in the organization

Expert Solution
Questions # 35:

SCENARIO

Please use the following to answer the next QUESTION:

Perhaps Jack Kelly should have stayed in the U.S. He enjoys a formidable reputation inside the company, Special Handling Shipping, for his work in reforming certain "rogue" offices. Last year, news broke that a police sting operation had revealed a drug ring operating in the Providence, Rhode Island office in the United States. Video from the office's video surveillance cameras leaked to news operations showed a drug exchange between Special Handling staff and undercover officers.

In the wake of this incident, Kelly had been sent to Providence to change the "hands off" culture that upper management believed had let the criminal elements conduct their illicit transactions. After a few weeks under Kelly's direction, the office became a model of efficiency and customer service. Kelly monitored his workers' activities using the same cameras that had recorded the illegal conduct of their former co-workers.

Now Kelly has been charged with turning around the office in Cork, Ireland, another trouble spot. The company has received numerous reports of the staff leaving the office unattended. When Kelly arrived, he found that even when present, the staff often spent their days socializing or conducting personal business on their mobile phones. Again, he observed their behaviors using surveillance cameras. He issued written reprimands to six staff members based on the first day of video alone.

Much to Kelly's surprise and chagrin, he and the company are now under investigation by the Data Protection Commissioner of Ireland for allegedly violating the privacy rights of employees. Kelly was told that the company's license for the cameras listed facility security as their main use, but he does not know why this matters. He has pointed out to his superiors that the company's training programs on privacy protection and data collection mention nothing about surveillance video.

You are a privacy protection consultant, hired by the company to assess this incident, report on the legal and compliance issues, and recommend next steps.

Knowing that the regulator is now investigating, what would be the best step to take?

Options:

A.

Consult an attorney experienced in privacy law and litigation.

B.

Use your background and knowledge to set a course of action.

C.

If you know the organization is guilty, advise it to accept the punishment.

D.

Negotiate the terms of a settlement before formal legal action takes place.

Expert Solution
Questions # 36:

When devising effective employee policies to address a particular issue, which of the following should be included in the first draft?

Options:

A.

Rationale for the policy.

B.

Points of contact for the employee.

C.

Roles and responsibilities of the different groups of individuals.

D.

Explanation of how the policy is applied within the organization.

Expert Solution
Questions # 37:

SCENARIO

Please use the following to answer the next QUESTION:

It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It's a great deal, and after a month, more than half the organization's employees have signed on and acquired new laptops. Walking through the facility, you see them happily customizing and comparing notes on their new computers, and at the end of the day, most take their laptops with them, potentially carrying personal data to their homes or other unknown locations. It's enough to give you data- protection nightmares, and you've pointed out to the information technology Director and many others in the organization the potential hazards of this new practice, including the inevitability of eventual data loss or theft.

Today you have in your office a representative of the organization's marketing department who shares with you, reluctantly, a story with potentially serious consequences. The night before, straight from work, with laptop in hand, he went to the Bull and Horn Pub to play billiards with his friends. A fine night of sport and socializing began, with the laptop "safely" tucked on a bench, beneath his jacket. Later that night, when it was time to depart, he retrieved the jacket, but the laptop was gone. It was not beneath the bench or on another bench nearby. The waitstaff had not seen it. His friends were not playing a joke on him. After a sleepless night, he confirmed it this morning, stopping by the pub to talk to the cleanup crew. They had not found it. The laptop was missing. Stolen, it seems. He looks at you, embarrassed and upset.

You ask him if the laptop contains any personal data from clients, and, sadly, he nods his head, yes. He believes it contains files on about 100 clients, including names, addresses and governmental identification numbers. He sighs and places his head in his hands in despair.

From a business standpoint, what is the most productive way to view employee use of personal equipment for work-related tasks?

Options:

A.

The use of personal equipment is a cost-effective measure that leads to no greater security risks than are always present in a modern organization.

B.

Any computer or other equipment is company property whenever it is used for company business.

C.

While the company may not own the equipment, it is required to protect the business-related data on any equipment used by its employees.

D.

The use of personal equipment must be reduced as it leads to inevitable security risks.

Expert Solution
Questions # 38:

SCENARIO

Please use the following to answer the next QUESTION:

As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically Questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have been pilfered despite the company’s claims that “appropriate” data protection safeguards were in place. The scandal affected the company’s business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard’s mentor, was forced to step down.

Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-up phase. He sold the company’s board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work responsibility is to bring his vision for privacy to life. But you also detect some reservations. “We want Medialite to have absolutely the highest standards,” he says. “In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to be a responsible steward of the company’s finances. So, while I want the best solutions across the board, they also need to be cost effective.”

You are told to report back in a week’s time with your recommendations. Charged with this ambiguous mission, you depart the executive suite, already considering your next steps.

The CEO likes what he’s seen of the company’s improved privacy program, but wants additional assurance that it is fully compliant with industry standards and reflects emerging best practices. What would best help accomplish this goal?

Options:

A.

An external audit conducted by a panel of industry experts

B.

An internal audit team accountable to upper management

C.

Creation of a self-certification framework based on company policies

D.

Revision of the strategic plan to provide a system of technical controls

Expert Solution
Questions # 39:

Training and awareness metrics in a privacy program are necessary to?

Options:

A.

Identify data breaches.

B.

Implement privacy policies.

C.

Demonstrate compliance with regulations.

D.

Educate customers on the organization's data practices.

Expert Solution
Questions # 40:

What is the key privacy objective in undertaking an evaluation of technical controls?

Options:

A.

To review and evaluate gaps in targeted internal privacy awareness training.

B.

To determine if the current privacy framework is adequate for the company's needs.

C.

To evaluate and mitigate third-party risk associated with service provider relationships.

D.

To identify and mitigate privacy risks associated with technical systems and data processing activities.

Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions