Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Legit CIPM Exam Download

Page: 2 / 21
Total 274 questions

Certified Information Privacy Manager (CIPM) Questions and Answers

Question 5

SCENARIO

Please use the following to answer the next QUESTION:

It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It's a great deal, and after a month, more than half the organization's employees have signed on and acquired new laptops. Walking through the facility, you see them happily customizing and comparing notes on their new computers, and at the end of the day, most take their laptops with them, potentially carrying personal data to their homes or other unknown locations. It's enough to give you data- protection nightmares, and you've pointed out to the information technology Director and many others in the organization the potential hazards of this new practice, including the inevitability of eventual data loss or theft.

Today you have in your office a representative of the organization's marketing department who shares with you, reluctantly, a story with potentially serious consequences. The night before, straight from work, with laptop in hand, he went to the Bull and Horn Pub to play billiards with his friends. A fine night of sport and socializing began, with the laptop "safely" tucked on a bench, beneath his jacket. Later that night, when it was time to depart, he retrieved the jacket, but the laptop was gone. It was not beneath the bench or on another bench nearby. The waitstaff had not seen it. His friends were not playing a joke on him. After a sleepless night, he confirmed it this morning, stopping by the pub to talk to the cleanup crew. They had not found it. The laptop was missing. Stolen, it seems. He looks at you, embarrassed and upset.

You ask him if the laptop contains any personal data from clients, and, sadly, he nods his head, yes. He believes it contains files on about 100 clients, including names, addresses and governmental identification numbers. He sighs and places his head in his hands in despair.

From a business standpoint, what is the most productive way to view employee use of personal equipment for work-related tasks?

Options:

A.

The use of personal equipment is a cost-effective measure that leads to no greater security risks than are always present in a modern organization.

B.

Any computer or other equipment is company property whenever it is used for company business.

C.

While the company may not own the equipment, it is required to protect the business-related data on any equipment used by its employees.

D.

The use of personal equipment must be reduced as it leads to inevitable security risks.

Question 6

(The following are examples of privacy by design EXCEPT?)

Options:

A.

Incorporating privacy consultations into technology procurement requests.

B.

Assessing privacy risks in the architecture of a proposed customer-facing tool.

C.

Integrating pre-defined privacy controls into standard product launch procedures.

D.

Conducting a root cause analysis on privacy incidents to recommend response improvements.

Question 7

Which of the following is a common disadvantage of a third-party audit?

Options:

A.

It identifies weaknesses of internal controls.

B.

It lends credibility to an internal audit program.

C.

It requires a learning curve about the organization.

D.

It provides a level of unbiased, expert recommendations.

Question 8

SCENARIO

Please use the following to answer the next QUESTION:

For 15 years, Albert has worked at Treasure Box – a mail order company in the United States (U.S.) that used to sell decorative candles around the world, but has recently decided to limit its shipments to customers in the 48 contiguous states. Despite his years of experience, Albert is often overlooked for managerial positions. His frustration about not being promoted, coupled with his recent interest in issues of privacy protection, have motivated Albert to be an agent of positive change.

He will soon interview for a newly advertised position, and during the interview, Albert plans on making executives aware of lapses in the company’s privacy program. He feels certain he will be rewarded with a promotion for preventing negative consequences resulting from the company’s outdated policies and procedures.

For example, Albert has learned about the AICPA (American Institute of Certified Public Accountans)/CICA (Canadian Institute of Chartered Accountants) Privacy Maturity Model (PMM). Albert thinks the model is a useful way to measure Treasure Box’s ability to protect personal data. Albert has noticed that Treasure Box fails to meet the requirements of the highest level of maturity of this model; at his interview, Albert will pledge to assist the company with meeting this level in order to provide customers with the most rigorous security available.

Albert does want to show a positive outlook during his interview. He intends to praise the company’s commitment to the security of customer and employee personal data against external threats. However, Albert worries about the high turnover rate within the company, particularly in the area of direct phone marketing. He sees many unfamiliar faces every day who are hired to do the marketing, and he often hears complaints in the lunch room regarding long hours and low pay, as well as what seems to be flagrant disregard for company procedures.

In addition, Treasure Box has had two recent security incidents. The company has responded to the incidents with internal audits and updates to security safeguards. However, profits still seem to be affected and anecdotal evidence indicates that many people still harbor mistrust. Albert wants to help the company recover. He knows there is at least one incident the public in unaware of, although Albert does not know the details. He believes the company’s insistence on keeping the incident a secret could be a further detriment to its reputation. One further way that Albert wants to help Treasure Box regain its stature is by creating a toll-free number for customers, as well as a more efficient procedure for responding to customer concerns by postal mail.

In addition to his suggestions for improvement, Albert believes that his knowledge of the company’s recent business maneuvers will also impress the interviewers. For example, Albert is aware of the company’s intention to acquire a medical supply company in the coming weeks.

With his forward thinking, Albert hopes to convince the managers who will be interviewing him that he is right for the job.

Based on Albert’s observations regarding recent security incidents, which of the following should he suggest as a priority for Treasure Box?

Options:

A.

Appointing an internal ombudsman to address employee complaints regarding hours and pay.

B.

Using a third-party auditor to address privacy protection issues not recognized by the prior internal audits.

C.

Working with the Human Resources department to make screening procedures for potential employees more rigorous.

D.

Evaluating the company’s ability to handle personal health information if the plan to acquire the medical supply company goes forward

Page: 2 / 21
Total 274 questions