IAPP CIPM

Page:    1 / 48   
Total 236 questions | Updated On: Apr 25, 2024
Question 1

Which of the following controls does the PCI DSS framework NOT require?  


Answer: A
Question 2

SCENARIO
Please use the following to answer the next question:
Jonathan recently joined a healthcare payment processing solutions company as a senior privacy manager.
One morning, Jonathan awakens to several emails informing him that an individual cloud server failed due to a
flood in its server room, damaging its hardware and destroying all the data the company had stored on that
drive. Jonathan was not aware that the company had this particular cloud account or that any data was being
stored there because it was not included in the data mapping or data inventory provided to him by his
predecessor. Jonathan's predecessor conducted a data inventory and mapping exercise 4 years ago and
updated it on an annual basis.
Renee works in the sales department and tells Jonathan that she doesn't think that account had been used
since the company moved to a bigger cloud vendor three years ago. She also advised him that the account was
mostly used by Human Resources (HR) and Accounts Payable (AP). Jonathan speaks to both departments and
learns that each had met with his predecessor multiple times and explained they saved sensitive personal data
on that drive, including health and financial related personal data and "other stuff." Jonathan also learns that the
data stored in that account was not backed up pursuant to company policy. Jonathan asks his IT department
who had access to that particular account and learns that there were no access controls in place, making the
account available to anyone in the company, despite the purported sensitivity of the data being stored there.
Jonathan is panicking as the data can't be recovered, and he can't determine exactly what data was saved on
that account or to whom it belongs. Two days later, the company receives 32 data subject access requests and
Accounts Payable confirms Jonathan's worry that these data subjects' personal data was likely stored on this
account. He searches for the company's data subject access request policy, but later learns it doesn't exist.
Based on the scenario above, what is the most appropriate next step Jonathan should take?


Answer: A
Question 3

A Data Privacy Officer (DPO) who posts privacy message reminders on posters and on company video screens throughout the office to reinforce the organization's privacy message is furthering which organizational program?


Answer: B
Question 4

Which term describes a piece of personal data that alone may not identify an individual?


Answer: A
Question 5

SCENARIO
Please use the following to answer the next question:
You lead the privacy office for a company that handles information from individuals living in several countries
throughout Europe and the Americas. You begin that morning’s privacy review when a contracts officer sends
you a message asking for a phone call. The message lacks clarity and detail, but you presume that data was
lost.
When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating
that the vendor improperly shared information about your customers. He called the vendor and confirmed that
your company recently surveyed exactly 2000 individuals about their most recent healthcare experience and
sent those surveys to the vendor to transcribe it into a database, but the vendor forgot to encrypt the database
as promised in the contract. As a result, the vendor has lost control of the data.
The vendor is extremely apologetic and offers to take responsibility for sending out the notifications. They tell
you they set aside 2000 stamped postcards because that should reduce the time it takes to get the notice in the
mail. One side is limited to their logo, but the other side is blank and they will accept whatever you want to write.
You put their offer on hold and begin to develop the text around the space constraints. You are content to let
the vendor’s logo be associated with the notification.
The notification explains that your company recently hired a vendor to store information about their most recent
experience at St. Sebastian Hospital’s Clinic for Infectious Diseases. The vendor did not encrypt the information
and no longer has control of it. All 2000 affected individuals are invited to sign-up for email notifications about
their information. They simply need to go to your company’s website and watch a quick advertisement, then
provide their name, email address, and month and year of birth.
You email the incident-response council for their buy-in before 9 a.m. If anything goes wrong in this situation,
you want to diffuse the blame across your colleagues. Over the next eight hours, everyone emails their
comments back and forth. The consultant who leads the incident-response team notes that it is his first day with
the company, but he has been in other industries for 45 years and will do his best. One of the three lawyers on
the council causes the conversation to veer off course, but it eventually gets back on track. At the end of the
day, they vote to proceed with the notification you wrote and use the vendor’s postcards.
Shortly after the vendor mails the postcards, you learn the data was on a server that was stolen, and make the
decision to have your company offer credit monitoring services. A quick internet search finds a credit monitoring
company with a convincing name: Credit Under Lock and Key (CRUDLOK). Your sales rep has never handled
a contract for 2000 people, but develops a proposal in about a day which says CRUDLOK will:
1. Send an enrollment invitation to everyone the day after the contract is signed.
2. Enroll someone with just their first name and the last-4 of their national identifier.
3. Monitor each enrollee’s credit for two years from the date of enrollment.
4. Send a monthly email with their credit rating and offers for credit-related services at market rates.
5. Charge your company 20% of the cost of any credit restoration.
You execute the contract and the enrollment invitations are emailed to the 2000 individuals. Three days later
you sit down and document all that went well and all that could have gone better. You put it in a file to reference
the next time an incident occurs.
Regarding the credit monitoring, which of the following would be the greatest concern?


Answer: A
Page:    1 / 48   
Total 236 questions | Updated On: Apr 25, 2024

Quickly grab our CIPM product now and kickstart your exam preparation today!

Name: Certified Information Privacy Manager
Exam Code: CIPM
Certification: Certified Information Privacy Manager
Vendor: IAPP
Total Questions: 236
Last Updated: Apr 25, 2024