image


IAPP


IAPP-CIPP-C


Certified Information Privacy Professional/ Canada (CIPP/C)


https://killexams.com/pass4sure/exam-detail/IAPP-CIPP-C



ant action an organization can take to comply with the FTC position on retroactive changes to a privacy policy? changes on its website.

consent from its customers. changes through social media.

of the security of their information.


rg/news/a/what-does-the-ccpas-purpose-limitation-mean-for-businesses/


of the CAN-SPAM Act?

of electronic messages to send sexually explicit materials to enforce federal privacy laws for electronic marketing

to create rules for messages containing sexually explicit content zations respect individual rights when using electronic advertising


ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide- business

image

Question: 42


What is the most import

  1. Describing the policy

  2. Obtaining affirmative

  3. Publicizing the policy

  4. Reassuring customers


Answer: B Explanation:

Reference: https://iapp.o


Question: 43


What is the main purpose

  1. To diminish the use

  2. To authorize the states

  3. To empower the FTC

  4. To ensure that organi


Answer: D Explanation:

Reference: https://www. Question: 44 SCENARIO

Please use the following to answer the next QUESTION


Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie’s Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still be sitting in the office, unsecured.


Two days ago, Noah got another interview for a position at Sam’s Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.



Noah’s credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, ch Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today


hat an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn ustomer service representative at a large investment company who urged him to purchase stocks. Without understanding t

a great deal of money.


oah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of cu mised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credi


oon be able to put these challenges behind him, build excellent credit, and find the perfect job.


ost likely protected from situations like the one Noah had buying stock because of which federal action or legislation? air Debt Collection Practices Act.

onsumer Financial Protection Bureau.

ission investigations into “unfair and deceptive” acts or practices.

usive” acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.


to answer the next QUESTION:


of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes ve indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s pri She is proud that she has built long-lasting customer relationships.


staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice,

image

Regardless, the effect of financial decisions fifteen

years ago, and they led credit card debt, and a few

unpaid bills C all of whi .


In addition, Noah feels t money to help pay off his

debt, Noah talked to a c he risks, Noah agreed.

Unfortunately, Noah lost


After losing the money, N stomers whose personal

information was compro t.

Noah hopes that he will s Consumers today are m

  1. The rules under the F

  2. The creation of the C

  3. Federal Trade Comm

  4. Investigations of “ab


Answer: D Question: 45 SCENARIO

Please use the following


Cheryl is the sole owner , individual instruction,

and access to an extensi vacy while maintaining the

highest level of service.


Although Cheryl and her a privacy professional, to

help her develop one.


After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.


Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.



or Cheryl to follow Janice’s suggestion about classifying customer data? stay better organized

any meet a federal mandate

curity of customers’ personal information (PI)

mpany from collecting too much personal information (PI)


ga.edu/access_and_security/infosec/pols_regs/policies/dcps/


to answer the next QUESTION:


officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health informati

ealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with Cloud nt security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo

before entering the contract, and has not conducted audits of CloudHealth’s security measures.


has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspic hCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the

similar attacks on other hospitals C ones that exposed the PHI of public figures including celebrities and politicians.


nvestigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the ffected.

image

What is the best reason f

  1. It will help employees

  2. It will help the comp

  3. It will increase the se

  4. It will prevent the co


Answer: C Explanation: Reference: https://eits.u

Question: 46


SCENARIO


Please use the following


You are the chief privacy services to more

than 100,000 patients. A on (ePHI) of these

individuals on behalf of H Health, HealthCo requires

CloudHealth to impleme did not perform due

diligence on CloudHealth


A CloudHealth employee ious email, the PHI of

more than 10,000 Healt perpetrator as a known

hacker who has launched


During the course of its i . In addition, CloudHealth

has not provided privacy breach and a copy of the

PHI of the individuals a


A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.


What is the most significant reason that the U.S. Department of Health and Human Services (HHS) might impose a penalty on HealthCo?


  1. Because HealthCo did not require CloudHealth to implement appropriate physical and administrative measures to safeguard the ePHI


  2. Because HealthCo did not conduct due diligence to verify or monitor CloudHealth’s security measures

  3. Because HIPAA requires the imposition of a fine if a data breach of this magnitude has occurred

  4. Because CloudHealth violated its contract with HealthCo by not encrypting the ePHI



ants a consumer the right to view and correct errors on his or her credit report?


Rights and Privacy Act (FERPA) requires schools to do all of the following EXCEPT? students who make requests for access to their records.

access to their records within a specified amount of time. able student requests regarding explanation of their records. rization before releasing directory information in their records.


2.ed.gov/policy/gen/guid/fpco/pdf/ferpa-disaster-guidance.pdf


released a privacy report that outlined three core principles for companies handling consumer data .

image

Answer: B


Question: 47


What privacy concept gr

  1. Access.

  2. Notice.

  3. Action.

  4. Choice.


Answer: B


Question: 48


The Family Educational

  1. Verify the identity of

  2. Provide students with

  3. Respond to all reason

  4. Obtain student autho


Answer: B Explanation: Reference: https://www

Question: 49


In March 2012, the FTC


Which was NOT one of these principles?

  1. Simplifying consumer choice.

  2. Enhancing security measures.

  3. Practicing Privacy by Design.

  4. Providing greater transparency.

Answer: B Explanation:

Reference: https://www.ftc.gov/news-events/press-releases/2012/03/ftc-issues-final-commission-report- protecting-consumer-privacy


Question: 50



to answer the next QUESTION


bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your homework?” Matt asked filling out a survey.”

n’s shoulder at his computer screen. “What kind of survey?” “It’s asking QUESTION NO:s about my opinions.”


and began reading the list of QUESTION NO:s that his son had already answered. “It’s asking your opinions about the g re only ten.”


web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by m an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As M

urvey were automatically registered in a contest to win the first book in a series about famous leaders.


med like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give inf His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer QUES


doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several ing products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.


att lives, the marketer could be prosecuted for violating which of the following? mer Reporting Agencies Act.

Acts and Practices laws. ghts.

image

SCENARIO


Please use the following


Matt went into his son’s hopefully.


“No,” the boy said. “I’m Matt looked over his so

“Let me see,” Matt said, overnment and citizenship.

That’s a little odd. You’


Matt wondered how the istake he opened it and

read it. It had come from att read further he learned

that kids who took the s


To Matt, this clearly see ormation about himself in

order to take the survey. TION NO:s about his

favorite games and toys.


Matt was concerned. He other commercial emails

from marketers advertis


Depending on where M

  1. Investigative Consu

  2. Unfair and Deceptive

  3. Consumer Bill of Ri

  4. Red Flag Rules.


Answer: B


For More exams visit https://killexams.com/vendors-exam-list


image