Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

IAPP Certified Information Privacy Professional CIPP-E New Questions

Page: 7 / 22
Total 295 questions

Certified Information Privacy Professional/Europe (CIPP/E) Questions and Answers

Question 25

The Murla HB Club should have carried out a DPIA before the installation of the new access system AND at what other time?

Options:

A.

After the complaint of the supporter

B.

Periodically, when new risks were foreseen

C.

At the end of every match of the season.

D.

After the AEPD notification of the investigation.

Question 26

Article 5(1)(b) of the GDPR states that personal data must be “collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with those purposes.” Based on Article 5(1)(b),

what is the impact of a member state’s interpretation of the word “incompatible”?

Options:

A.

It dictates the level of security a processor must follow when using and storing personal data for two different purposes.

B.

It guides the courts on the severity of the consequences for those who are convicted of the intentional misuse of personal data.

C.

It sets the standard for the level of detail a controller must record when documenting the purpose for collecting personal data.

D.

It indicates the degree of flexibility a controller has in using personal data in ways that may vary from its original intended purpose.

Question 27

Which institution has the power to adopt findings that confirm the adequacy of the data protection level in a non-EU country?

Options:

A.

The European Parliament

B.

The European Commission

C.

The Article 29 Working Party

D.

The European Council

Question 28

To provide evidence of GDPR compliance, a company performs an internal audit. As a result, it finds a data base, password-protected, listing all the social network followers of the client.

Regarding the domain of the controller-processor relationships, how is this situation considered?

Options:

A.

Compliant with the security principle, because the data base is password-protected.

B.

Non-compliant, because the storage of the data exceeds the tasks contractually authorized by the controller.

C.

Not applicable, because the data base is password protected, and therefore is not at risk of identifying any data subject.

D.

Compliant with the storage limitation principle, so long as the internal auditor permanently deletes the data base.

Page: 7 / 22
Total 295 questions