Certified Information Privacy Manager (C.I.P.M.) Exam Prep Test
Reviewed byEditorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Prepare for the Certified Information Privacy Manager (C. I. P. M. ) exam with this targeted test. Assess your understanding of data protection laws like GDPR, techniques like anonymization, and accountability measures. Essential for professionals enhancing their privacy management skills.
Quiz Preview
2.
Which best describes the disadvantages of a centralized privacy governance model?
Streamlined processes and procedures
Bottom-to-top flow of information
Offers the resources of a larger, centralized organization
Individual employees cannot make decisions
Lack of centralized process can create duplication of efforts
Decentralized decision-making provides less big-picture vision
Correct Answer
A. Individual employees cannot make decisions
Explanation
The disadvantages of a centralized privacy governance model include the fact that individual employees cannot make decisions. In this model, decision-making power is concentrated at the top levels of the organization, limiting the autonomy and authority of individual employees. This can lead to delays in decision-making, lack of flexibility, and decreased employee morale. It also hinders innovation and creativity, as ideas and suggestions from lower-level employees may not be taken into account. Overall, this lack of decision-making authority for individual employees can be a significant drawback of a centralized privacy governance model.
Rate this question:
3.
Opting-in means an individual makes an active, affirmative indication of choice—for example, by checking a box to signal her desire to share her information with third parties. This choice should be clear and easy to execute. true or false?
True
False
Correct Answer
A. True
Explanation
Opting-in refers to the act of actively and affirmatively indicating a choice, such as checking a box, to express the desire to share personal information with third parties. The statement correctly states that this choice should be clear and easy to execute. Therefore, the correct answer is true.
Rate this question:
4.
Information security provides physical, technical and administrative controls to manage risk by reducing probable damage, loss, modification or unauthorized access to data. Controls can also be divided into several categories based on the control objective.
Select all the elements which are technical controls.
Fences
Doors and locks
Logins
Virus software
Firewalls
Incident response processes
Management oversight
Security awareness and training
Data handling policies
Correct Answer(s)
A. Logins A. Virus software A. Firewalls
Explanation
Technical controls are measures that are implemented through technology to protect information and systems. Logins, virus software, and firewalls are all examples of technical controls. Logins provide authentication and access control to ensure that only authorized users can access data. Virus software detects and removes malicious software that can harm systems and data. Firewalls monitor and control network traffic to prevent unauthorized access and protect against network-based attacks. These controls are specifically designed to address technical vulnerabilities and protect against unauthorized access and attacks on information systems.
Rate this question:
5.
True or false? All incidents are breaches, but not all breaches are incidents.
True
False
Correct Answer
A. False
Explanation
This statement is incorrect. The correct statement would be "All breaches are incidents, but not all incidents are breaches." This means that every breach is an incident, but there are incidents that may not necessarily be breaches.
Rate this question:
6.
True or false? When communicating about a breach, an organization should make internal announcements well in advance of external announcements.
True
False
Correct Answer
A. False
Explanation
When communicating about a breach, an organization should not make internal announcements well in advance of external announcements. This is because it can lead to confusion and speculation among employees, potentially causing panic or misinformation to spread. It is generally recommended to coordinate internal and external announcements to ensure consistent messaging and to minimize the impact on affected parties.
Rate this question:
7.
Can you identify the five phases of a privacy program audit?
Audit planning, audit preparation, audit, report and follow-up
Audit planning, audit, analyze, report and follow-up
Audit, audit analysis, audit review, report and evaluate
Audit planning, audit preparation, audit, follow-up and renewal
Correct Answer
A. Audit planning, audit preparation, audit, report and follow-up
Explanation
The correct answer is "Audit planning, audit preparation, audit, report and follow-up." This sequence outlines the five phases of a privacy program audit. First, the audit planning phase involves determining the scope, objectives, and approach of the audit. Then, in the audit preparation phase, the necessary resources and documentation are gathered. The audit phase itself involves conducting the actual audit, which includes data collection, interviews, and analysis. Following the audit, a report is generated to summarize the findings and recommendations. Finally, the follow-up phase involves implementing the recommended actions and monitoring their effectiveness.
Rate this question:
8.
Why does an organization need a privacy program? Identify the number 3 privacy team responsibility.
Enhance marketplace reputation and brand
Meet regulatory compliance obligations, including the GDPR
Enable global operations and entry into new markets
Safeguard data against attacks and threats
Increase revenues from cross-selling and direct marketing
Reduce scrutiny from privacy watchdog groups
Provide a competitive differentiator
Maintain or enhance the value of information assets
Reduce risk of employee and consumer lawsuits
Be a good corporate citizen
Meet expectations of business clients and partners
Meet consumer expectations/ enhance trust
Correct Answer
A. Safeguard data against attacks and threats
Explanation
An organization needs a privacy program to safeguard data against attacks and threats. This responsibility is crucial in protecting sensitive information from unauthorized access, ensuring the security and integrity of data. By implementing measures to prevent data breaches and cyberattacks, the organization can maintain the trust of its customers and stakeholders, avoid potential legal and financial consequences, and protect its reputation in the marketplace.
Rate this question:
9.
A privacy policy is generally an internal document that is addressed to employees. Policies clearly state how personal information is going to be handled. When launching communications related to the privacy program, which of the following considerations should be made:
What do you want the policy to achieve? Should it, for example, simply spread knowledge? Or should it attempt to change behavior?
How can you work with the communications team?
What existing communication modes—such as a company intranet—can you employ?
Which functional areas most align with the privacy program? (For example, IT, security or HR)
And how can you motivate employees and use metrics to help demonstrate the value of privacy?
Who is the audience?
Correct Answer(s)
A. What do you want the policy to achieve? Should it, for example, simply spread knowledge? Or should it attempt to change behavior? A. How can you work with the communications team? A. What existing communication modes—such as a company intranet—can you employ? A. Which functional areas most align with the privacy program? (For example, IT, security or HR) A. And how can you motivate employees and use metrics to help demonstrate the value of privacy? A. Who is the audience?
Explanation
The suggested answer provides a comprehensive list of considerations that should be made when launching communications related to the privacy program. It emphasizes the importance of determining the goals of the policy, whether it is to spread knowledge or change behavior. It also highlights the need to collaborate with the communications team and utilize existing communication modes like a company intranet. Identifying the functional areas that align with the privacy program, motivating employees, and using metrics to demonstrate the value of privacy are also crucial aspects to consider. Lastly, understanding the audience is essential for effective communication.
Rate this question:
10.
How do information security and privacy teams work in concert, so that their respective spends can complement each other? Check all that apply.
Increased involvement of privacy personnel on information security teams
Employing core privacy functions with an IT orientation to get a better handle on their data and the extent of their corporate risk
Increased investment in privacy technology
Increased use of privacy impact assessments and data inventory and classification
Increased use of data retention policies
Correct Answer(s)
A. Increased involvement of privacy personnel on information security teams A. Employing core privacy functions with an IT orientation to get a better handle on their data and the extent of their corporate risk A. Increased investment in privacy technology A. Increased use of privacy impact assessments and data inventory and classification A. Increased use of data retention policies
Explanation
Information security and privacy teams can work together by increasing the involvement of privacy personnel on information security teams. This ensures that privacy concerns are considered during the development and implementation of security measures. Additionally, employing core privacy functions with an IT orientation helps to better understand the data and corporate risks involved. Increased investment in privacy technology allows for more effective protection of sensitive information. The use of privacy impact assessments and data inventory and classification helps to identify and manage privacy risks. Lastly, implementing data retention policies ensures that data is stored and disposed of appropriately, protecting privacy.
Rate this question:
11.
Information security provides physical, technical and administrative controls to manage risk by reducing probable damage, loss, modification or unauthorized access to data. Controls can also be divided into several categories based on the control objective.
Select all the elements which are corrective controls.
Firewalls
Passwords
Procedures
Training
Audits
Security software
Monitoring and logging
Business continuity plans
Back-up data restoration
Updated policies
Correct Answer(s)
A. Business continuity plans A. Back-up data restoration A. Updated policies
Explanation
Corrective controls are measures taken to correct or mitigate the impact of a security incident or breach. In this case, business continuity plans, back-up data restoration, and updated policies are all examples of corrective controls. Business continuity plans help organizations recover from disruptions and continue operations, while back-up data restoration ensures that data can be restored in the event of a loss. Updated policies help address vulnerabilities and prevent future incidents.
Rate this question:
12.
Privacy risks. In 2006, Daniel Solove authored an article entitled, “A Taxonomy of Privacy,” wherein he proposed a common taxonomy of privacy risk factors.
Although many of these activities can pose risks to privacy, they also have many benefits. For an organization, the key is in ensuring that impacts to privacy are identified and minimized by an organization.
Select each description that is an element of Information dissemination:
Surveillance
Interrogation
Aggregation
Insecurity
Identification
Secondary use
Exclusion
Intrusion
Decisional interference
Breach of confidentiality
Disclosure
Exposure
Increased accessibility
Blackmail
Appropriation
Distortion
Correct Answer(s)
A. Breach of confidentiality A. Disclosure A. Exposure A. Increased accessibility A. Blackmail A. Appropriation A. Distortion
Explanation
The correct answer includes several elements that are related to the dissemination of information. Breach of confidentiality refers to the unauthorized disclosure of confidential information. Disclosure refers to the intentional release of information to others. Exposure refers to the potential for information to be accessed or viewed by unauthorized individuals. Increased accessibility refers to making information more readily available to a larger audience. Blackmail refers to the act of using sensitive information to extort or manipulate someone. Appropriation refers to the unauthorized use or taking of someone else's information. Distortion refers to the alteration or misrepresentation of information.
Rate this question:
13.
A metric owner is a process owner, champion and advocate responsible for management of the metric throughout the metric lifecycle. This person should have privacy knowledge, training and experience—to limit possible errors interpreting privacy-related laws, regulations and practices.
Select the metric owner responsibilities.
Know what is critical about the metric: Ask why the output is important and how this metric fits into the business objectives.
Monitor process performance with the metric.
Keep process documentation up to date to ensure all audiences have a clear definition of the metric and how it should be used.
Perform regular reviews. Determine if the metric is still required, capable to meet goals, and provides value to the organization.
Ensure improvements are incorporated and maintained in the process.
Correct Answer(s)
A. Know what is critical about the metric: Ask why the output is important and how this metric fits into the business objectives. A. Monitor process performance with the metric. A. Keep process documentation up to date to ensure all audiences have a clear definition of the metric and how it should be used. A. Perform regular reviews. Determine if the metric is still required, capable to meet goals, and provides value to the organization. A. Ensure improvements are incorporated and maintained in the process.
Explanation
In addition:
o Minimize variance within a metric.
o Develop documentation of metrics using flowcharts, visual displays, graphics and other methods.
o Champion the metric in meetings, working groups and in other organization communications.
Rate this question:
14.
Type response below
15.
The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law, an idea codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross Border Privacy Rules. ________
Correct Answer(s) Accountability
Explanation Traditionally, accountability has been a fair information practices principle, that due diligence and reasonable steps will be undertaken to ensure that personal information will be protected and handled consistently with relevant law and other fair use principles.
Rate this question:
16.
DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to personal information. They can also be used to monitor for compliance with internal policies and procedures, and block e-mail or file transfers based on the data category and definitions. ________
Correct Answer(s) Acctive Scanning Tools
Explanation Active scanning tools are used to identify security and privacy risks to personal information. These tools can scan the network, storage, and other resources to detect any vulnerabilities or potential breaches. They can also monitor for compliance with internal policies and procedures, ensuring that data is handled according to the defined guidelines. Additionally, active scanning tools can block e-mail or file transfers if they contain data that falls under certain categories or definitions, providing an extra layer of protection against unauthorized data transfer.
Rate this question:
17.
A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal program. ________
Correct Answer(s) American Institute of Certified Public Accountants
Explanation The given correct answer for this question is the American Institute of Certified Public Accountants. This organization is a U.S. professional organization that represents certified public accountants. They are also the co-creator of the WebTrust seal program, which is a program that provides assurance to users of websites that their personal information is secure and that the website is trustworthy. The American Institute of Certified Public Accountants plays a significant role in promoting and maintaining high professional standards in the accounting industry.
Rate this question:
18.
The process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual. ________
Correct Answer(s) Anonymization
Explanation Among many techniques, there are three primary ways that data is anonymized. Suppression is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability. Generalization takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24). Noise addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set.
Note that all of these processes will not guarantee that data is no longer identifiable and have to be performed in such a way that does not harm the usability of the data.
________ takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24).
Correct Answer(s) Generalization
Explanation Generalization is the process of taking specific identifying values and making them broader. This involves changing a specific age, such as 18, to an age range like 18-24. By generalizing, we can categorize and group similar values together, allowing for easier analysis and comparison.
Rate this question:
20.
________ addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set.
Correct Answer(s) Noise
21.
________ is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability.
Correct Answer(s) Suppression
Explanation Suppression is the most basic version of anonymization as it involves removing identifying values from data to reduce its identifiability. This means that certain information, such as names or specific identifiers, is eliminated from the dataset to protect the privacy of individuals. By suppressing these identifying values, the data becomes less identifiable and helps to ensure that individuals cannot be directly linked to the information.
Rate this question:
22.
A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative that mirror the OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs. ________
Correct Answer(s) APEC Privacy Principles
Explanation The given correct answer is APEC Privacy Principles. This is because the passage states that the set of non-binding principles adopted by the Asia-Pacific Economic Cooperative (APEC) aims to promote electronic commerce in the Asia-Pacific region while balancing information privacy with business needs. Therefore, the APEC Privacy Principles align with this objective and are the most appropriate answer.
Rate this question:
23.
The first of four phases of the privacy operational life cycle ________
Correct Answer(s) Assess
Explanation The first of four phases of the privacy operational life cycle; provides the steps, checklists and processes necessary to assess any gaps in a privacy program as compared to industry best practices, corporate privacy policies, applicable privacy laws, and objective-based privacy program frameworks.
Associated term(s): Privacy Operational Life Cycle; Protect; Sustain; Respond
Rate this question:
24.
High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting the Audit; Reporting; and Follow-up. ________
Correct Answer(s) Audit Life Cycle
Explanation The given answer, "Audit Life Cycle," is the missing term that completes the statement. The explanation is that the high-level, five-phase audit approach mentioned in the question is commonly referred to as the "Audit Life Cycle." This cycle includes the steps of Audit Planning, Audit Preparation, Conducting the Audit, Reporting, and Follow-up. The Audit Life Cycle provides a structured framework for conducting audits and ensures that all necessary steps are followed to effectively assess and report on the audited entity's compliance and performance.
Rate this question:
25.
________ is targeted at individuals based on the observation of their behavior over time.
Correct Answer(s) Behavioral Advertising
Explanation Advertising that is targeted at individuals based on the observation of their behavior over time. Most often done via automated processing of personal data, or profiling, the General Data Protection Regulation requires that data subjects be able to opt-out of any automated processing, to be informed of the logic involved in any automatic personal data processing and, at least when based on profiling, be informed of the consequences of such processing. If cookies are used to store or access information for the purposes of behavioral advertising, the ePrivacy Directive requires that data subjects provide consent for the placement of such cookies, after having been provided with clear and comprehensive information.
________ are appropriate safeguards allowed by the General Data Protection Regulation to facilitate cross-border transfers of personal data between the various entities of a corporate group worldwide.
Correct Answer(s) Binding Corporate Rules
Explanation They do so by ensuring that the same high level of protection of personal data is complied with by all members of the organizational group by means of a single set of binding and enforceable rules. BCRs compel organizations to be able to demonstrate their compliance with all aspects of applicable data protection legislation and are approved by a member state data protection authority. To date, relatively few organizations have had BCRs approved.
Acronym(s): BCR
Rate this question:
27.
The United States’ Federal Trade Commission’s ________ (BoC) enforces the nation's antitrust laws, which form the foundation of our free market economy. The antitrust laws promote the interests of consumers; they support unfettered markets and result in lower prices and more choices.
Correct Answer(s) Bureau of Competition
Explanation Associated term(s): Bureau of Consumer Protection; Bureau of Economics
Rate this question:
28.
The United States’ Federal Trade Commission’s ________ (BoCP) stops unfair, deceptive and fraudulent business practices by collecting complaints and conducting investigations, suing companies and people that break the law, developing rules to maintain a fair marketplace, and educating consumers and businesses about their rights and responsibilities.
Correct Answer(s) Bureau of Consumer Protection
Explanation Associated term(s): Bureau of Competition; Bureau of Economics
Rate this question:
29.
The United States’ Federal Trade Commission’s ________ (BoE) helps the FTC evaluate the economic
impact of its actions by providing economic analysis for competition and consumer protection investigations and rulemakings, and analyzing the economic impact of government regulations on businesses and consumers.
Correct Answer(s) Bureau of Economics
Explanation Associated term(s): Bureau of Competition; Bureau of Consumer Protection
Rate this question:
30.
The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or regulations, industry frameworks, customer requirements and other considerations. ________
Correct Answer(s) Business case
Explanation The given answer, "Business case," is the correct answer because a business case is a document that outlines the justification for a proposed project or initiative. In the context of assessing the needs of a privacy organization, a business case would outline the individual program needs and provide a framework for meeting specific business goals, such as compliance with privacy laws, industry frameworks, customer requirements, and other considerations. The business case would outline the financial, strategic, and operational benefits of implementing the proposed privacy program, helping to justify the allocation of resources and support decision-making.
Rate this question:
31.
BCDR or ________ is a risk mitigation plan designed to prepare an organization for crises and to ensure critical business functions continue. The focus is to recover from a disaster when disruptions of any size are encountered.
Correct Answer(s) Business Continuity and Disaster Recovery Plan
Explanation The given answer, "Business Continuity and Disaster Recovery Plan," accurately describes the acronym BCDR. BCDR is a risk mitigation plan that helps organizations prepare for crises and ensure that critical business functions can continue even in the face of disruptions or disasters. This plan focuses on recovering from a disaster and maintaining business continuity regardless of the size or nature of the disruption.
Rate this question:
32.
The ________ (BCP) is typically drafted and maintained by key stakeholders, spelling out departmental
responsibilities and actions teams must take before, during and after an event in order to help operations run smoothly. Situations covered in a BCP often include fire, flood, natural disasters (tornadoes and hurricanes), and terrorist attack.
Correct Answer(s) Business Continuity Plan
Explanation A Business Continuity Plan (BCP) is a document that outlines the responsibilities and actions that key stakeholders and teams must take in order to ensure that operations run smoothly before, during, and after an event. It is typically drafted and maintained by these stakeholders and covers various situations such as fire, flood, natural disasters, and terrorist attacks. The purpose of a BCP is to provide a roadmap for businesses to follow in order to minimize disruptions and ensure the continuity of critical functions in the face of unexpected events.
Rate this question:
33.
________ (COPPA) is a U.S. federal law that applies to the operators of commercial websites and online services that are directed to children under the age of 13. It also applies to general audience websites and online services that have actual knowledge that they are collecting personal information from children under the age of 13.
Explanation COPPA requires these website operators: to post a privacy notice on the homepage of the website; provide notice about collection practices to parents; obtain verifiable parental consent before collecting personal information from children; give parents a choice as to whether their child’s personal information will be disclosed to third parties; provide parents access and the opportunity to delete the child’s personal information and opt out of future collection or use of the information, and maintain the confidentiality, security and integrity of personal information collected from children.
Acronym(s): COPPA
Link to text of law: 15 U.S.C. §§ 6501-6508
Rate this question:
34.
In the context of consent, ________ refers to the idea that consent must be freely given.
Correct Answer(s) Choice
Explanation In the context of consent, choice refers to the idea that consent must be freely given and that data subjects must have a genuine choice as to whether to provide personal data or not. If there is no true choice it is unlikely the consent will be deemed valid under the General Data Protection Regulation.
Associated term(s): Consent
Rate this question:
35.
Three common information security principles from the 1960s. ________
Correct Answer(s) CIA Triad
Explanation Also known as information security triad; three common information security principles from the 1960s: Confidentiality, integrity, availability.
Associated term(s): Information Security Triad
Rate this question:
36.
The three common information security principles from the 1960s that comprise the CIA Triad also known as Information Security Triad: ________
Explanation The CIA Triad, also known as the Information Security Triad, consists of three fundamental principles: confidentiality, integrity, and availability. Confidentiality ensures that information is only accessible to authorized individuals, protecting it from unauthorized disclosure. Integrity ensures that information remains accurate, complete, and unaltered, preventing unauthorized modifications. Availability ensures that information is accessible and usable by authorized individuals when needed. These three principles form the foundation of information security, providing a comprehensive approach to protect sensitive information from unauthorized access, manipulation, and unavailability.
Rate this question:
37.
A fair information practices principle, it is the principle stating there should be limits to the collection
of personal data, that any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. ________
Correct Answer(s) Collection Limitation
Explanation The given answer, "Collection Limitation," is the correct answer because it accurately describes the fair information practices principle mentioned in the question. This principle states that there should be limits to the collection of personal data, and any such data should be obtained through lawful and fair means, with the knowledge or consent of the data subject. "Collection Limitation" summarizes this principle effectively.
Rate this question:
38.
This privacy requirement is one of the fair information practices. Individuals must be able to prevent the collection of their personal data, unless the disclosure is required by law. ________
Correct Answer(s) Consent
Explanation If an individual has choice about the use or disclosure of his or her information, consent is the individual's way of giving permission for the use or disclosure. Consent may be affirmative; i.e., opt-in; or implied; i.e., the individual didn’t opt out.
(1) Affirmative/Explicit Consent: A requirement that an individual "signifies" his or her agreement with a data controller by some active communication between the parties.
(2) Implicit Consent: Implied consent arises where consent may reasonably be inferred from the action or inaction of the individual.
Associated term(s): Choice
Rate this question:
39.
A requirement that an individual "signifies" his or her agreement with a data controller by some active communication between the parties. ________
Correct Answer(s) Affirmative/Explicit Consent
Explanation (1) Affirmative/Explicit Consent: A requirement that an individual "signifies" his or her agreement with a data controller by some active communication between the parties.
(2) Implicit Consent: Implied consent arises where consent may reasonably be inferred from the action or inaction of the individual.
Rate this question:
40.
Implied consent arises where consent may reasonably be inferred from the action or inaction of the individual. ________
Correct Answer(s) Implicit Consent
Explanation (1) Affirmative/Explicit Consent: A requirement that an individual "signifies" his or her agreement with a data controller by some active communication between the parties.
(2) Implicit Consent: Implied consent arises where consent may reasonably be inferred from the action or inaction of the individual.
Rate this question:
41.
Any person or entity that complies or evaluates personal information for the purpose of furnishing it to third parties for a fee. ________
Correct Answer(s) Consumer Reporting Agency
Explanation Acronym(s): CRAs
Associated term(s): Credit Reporting Agency
Rate this question:
42.
“As-is” data privacy requirements; the current environment and any protections, policies, and procedures currently deployed. ________
Correct Answer(s) Current baseline
Explanation The given answer "Current baseline" refers to the existing state or condition of the data privacy requirements, environment, and the protections, policies, and procedures that are currently in place. It suggests that the answer is related to the current status or starting point of these factors, indicating that the question is asking for an assessment or evaluation of the present situation rather than any future or hypothetical scenario.
Rate this question:
43.
Relatively new form of insurance protection that fills gaps typically not covered by General Commercial Liability plans. ________
Correct Answer(s) Cyber liability insurance
Explanation Cyber liability insurance may cover many breach-related expenses, including forensic investigations, outside counsel fees, crisis management services, public relations experts, breach notification, and call center costs.
Rate this question:
44.
The unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by a data collector. ________
Correct Answer(s) Data Breach
Explanation Breaches do not include good faith acquisitions of personal information by an employee or agent of the data collector for a legitimate purpose of the data collector —provided the personal information is not used for a purpose unrelated to the data collector's business or subject to further unauthorized disclosure.
The natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data. ________
Correct Answer(s) Data Controller
Explanation Where the purposes and means of such processing are determined by EU or member state law, the controller or the specific criteria for its nomination may be provided for by EU or member state law.
Associated term(s): Data Processor
Rate this question:
46.
Also known as a record of authority, identifies personal data as it moves across various systems and thus how data is shared and organized, and its location. That data is then categorized by subject area, which identifies inconsistent data versions, enabling identification and mitigation of data disparities. ________
Correct Answer(s) Data Inventory
Explanation A data inventory, also known as a record of authority, is a tool used to identify and track personal data as it moves across different systems. It helps to organize and categorize the data, as well as identify any inconsistencies or disparities in the data versions. By creating a data inventory, organizations can have a clear understanding of how data is shared and organized, and its location, which is crucial for effective data management and compliance with data protection regulations.
Rate this question:
47.
Also known as Information Life Cycle Management (ILM) or data governance, DLM is a policy-based approach to managing the flow of information through a life cycle from creation to final disposition. It provides a holistic approach to the processes, roles, controls and measures necessary to organize and maintain data, and has 11 elements. ________
Correct Answer(s) Data Life Cycle Management
Explanation Also known as Information Life Cycle Management (ILM) or data governance, DLM is a policy-based approach to managing the flow of information through a life cycle from creation to final disposition. DLM provides a holistic approach to the processes, roles, controls and measures necessary to organize and maintain data, and has 11 elements: Enterprise objectives; minimalism; simplicity of procedure and effective training; adequacy of infrastructure; information security; authenticity and accuracy of one’s own records; retrievability; distribution controls; auditability; consistency of policies; and enforcement.
Acronym(s): DLM; ILM
Associated term(s): Information Life Cycle Management
Rate this question:
48.
The idea that one should only collect and retain that personal data which is necessary. ________
Correct Answer(s) Data Minimization Principle
Explanation Link to text of law: Directive 95/46/EC
Link to text of law: Regulation EC (No) 45/2001
Rate this question:
49.
Independent public authorities that supervise the application of data protection laws in the EU. ________
Correct Answer(s) Data Protection Authority
Explanation DPAs provide advice on data protection issues and field complaints from individuals alleging violations of the General Data
Protection Regulation. Each EU member state has its own DPA. Under GDPR, DPAs have extensive enforcement powers, including the ability to impose fines that total 4% of a company’s global annual revenue.
Acronym(s): DPA
Rate this question:
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.