Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson CIPM New Attempt

Page: 12 / 21
Total 274 questions

Certified Information Privacy Manager (CIPM) Questions and Answers

Question 45

While trying to e-mail her manager, an employee has e-mailed a list of all the company's customers, including their bank details, to an employee with the same name at a different company. Which of the following would be the first stage in the incident response plan under the General Data Protection Regulation (GDPR)?

Options:

A.

Notification to data subjects.

B.

Containment of impact of breach.

C.

Remediation offers to data subjects.

D.

Notification to the Information Commissioner's Office (ICO).

Question 46

Under the General Data Protection Regulation (GDPR), which of the following situations would LEAST likely require a controller to notify a data subject?

Options:

A.

An encrypted USB key with sensitive personal data is stolen

B.

A direct marketing email is sent with recipients visible in the ‘cc’ field

C.

Personal data of a group of individuals is erroneously sent to the wrong mailing list

D.

A hacker publishes usernames, phone numbers and purchase history online after a cyber-attack

Question 47

(Your company's lead applied scientist believes there's an opportunity to proactively address customer issues using machine learning. She requests access to all of the company's customer data and several publicly available datasets. All the following are appropriate next steps EXCEPT?)

Options:

A.

Determining if personal data can be anonymized and removed from the test data.

B.

Providing a public disclosure to all customers describing the purpose and nature of processing.

C.

Checking your company's public privacy notice to ensure this processing is in line with current disclosures.

D.

Requesting further information from your scientist to understand the goal of the model and the eventual operational description.

Question 48

What is the main purpose in notifying data subjects of a data breach?

Options:

A.

To avoid financial penalties and legal liability

B.

To enable regulators to understand trends and developments that may shape the law

C.

To ensure organizations have accountability for the sufficiency of their security measures

D.

To allow i ndividuals to take any actions required to protect the mselves from possible consequences

Page: 12 / 21
Total 274 questions