Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Information Privacy Professional/ Canada (CIPP/C) Question and Answers

Certified Information Privacy Professional/ Canada (CIPP/C)

Last Update May 18, 2024
Total Questions : 76

We are offering FREE CIPP-C IAPP exam questions. All you do is to just go and sign up. Give your details, prepare CIPP-C free exam questions and then go for complete pool of Certified Information Privacy Professional/ Canada (CIPP/C) test questions that will help you more.

CIPP-C pdf

CIPP-C PDF

$35  $99.99
CIPP-C Engine

CIPP-C Testing Engine

$42  $119.99
CIPP-C PDF + Engine

CIPP-C PDF + Testing Engine

$56  $159.99
Questions 1

Which act violates the Family Educational Rights and Privacy Act of 1974 (FERPA)?

Options:

A.  

A K-12 assessment vendor obtains a student’s signed essay about her hometown from her school to use as an exemplar for public release

B.  

A university posts a public student directory that includes names, hometowns, e-mail addresses, and majors

C.  

A newspaper prints the names, grade levels, and hometowns of students who made the quarterly honor roll

D.  

University police provide an arrest report to a student’s hometown police, who suspect him of a similar crime

Discussion 0
Questions 2

A student has left high school and is attending a public postsecondary institution. Under what condition may a school legally disclose educational records to the parents of the student without consent?

Options:

A.  

If the student has not yet turned 18 years of age

B.  

If the student is in danger of academic suspension

C.  

If the student is still a dependent for tax purposes

D.  

If the student has applied to transfer to another institution

Discussion 0
Questions 3

Which of the following would NOT constitute an exception to the authorization requirement under the HIPAA Privacy Rule?

Options:

A.  

Disclosing health information for public health activities.

B.  

Disclosing health information to file a child abuse report.

C.  

Disclosing health information needed to treat a medical emergency.

D.  

Disclosing health information needed to pay a third party billing administrator.

Discussion 0
Questions 4

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company’s privacy program?

Options:

A.  

Consumers have a right to exercise control over how companies use their personal data.

B.  

Consumers have a right to reasonable limits on the personal data that a company retains.

C.  

Consumers have a right to easily accessible information about privacy and security practices.

D.  

Consumers have a right to correct personal data in a manner that is appropriate to the sensitivity.

Discussion 0
Questions 5

Who has rulemaking authority for the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA)?

Options:

A.  

State Attorneys General

B.  

The Federal Trade Commission

C.  

The Department of Commerce

D.  

The Consumer Financial Protection Bureau

Discussion 0
Questions 6

SCENARIO

Please use the following to answer the next QUESTION

Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie’s Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still

be sitting in the office, unsecured.

Two days ago, Noah got another interview for a position at Sam’s Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.

Regardless, the effect of Noah’s credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills – all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today.

In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money.

After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit.

Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job.

Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?

Options:

A.  

The rules under the Fair Debt Collection Practices Act.

B.  

The creation of the Consumer Financial Protection Bureau.

C.  

Federal Trade Commission investigations into “unfair and deceptive” acts or practices.

D.  

Investigations of “abusive” acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.

Discussion 0
Questions 7

The rules for “e-discovery” mainly prevent which of the following?

Options:

A.  

A conflict between business practice and technological safeguards

B.  

The loss of information due to poor data retention practices

C.  

The practice of employees using personal devices for work

D.  

A breach of an organization’s data retention program

Discussion 0
Questions 8

Which of the following types of information would an organization generally NOT be required to disclose to law enforcement?

Options:

A.  

Information about medication errors under the Food, Drug and Cosmetic Act

B.  

Money laundering information under the Bank Secrecy Act of 1970

C.  

Information about workspace injuries under OSHA requirements

D.  

Personal health information under the HIPAA Privacy Rule

Discussion 0
Questions 9

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the main problem with Cheryl’s suggested method of communicating the new privacy policy?

Options:

A.  

The policy would not be considered valid if not communicated in full.

B.  

The policy might not be implemented consistency across departments.

C.  

Employees would not be comfortable with a policy that is put into action over time.

D.  

Employees might not understand how the documents relate to the policy as a whole.

Discussion 0
Questions 10

An organization self-certified under Privacy Shield must, upon request by an individual, do what?

Options:

A.  

Suspend the use of all personal information collected by the organization to fulfill its original purpose.

B.  

Provide the identities of third parties with whom the organization shares personal information.

C.  

Provide the identities of third and fourth parties that may potentially receive personal information.

D.  

Identify all personal information disclosed during a criminal investigation.

Discussion 0
Questions 11

More than half of U.S. states require telemarketers to?

Options:

A.  

Identify themselves at the beginning of a call

B.  

Obtain written consent from potential customers

C.  

Register with the state before conducting business

D.  

Provide written contracts for customer transactions

Discussion 0
Questions 12

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

What could the company have done differently prior to the breach to reduce their risk?

Options:

A.  

Implemented a comprehensive policy for accessing customer information.

B.  

Honored the promise of its privacy policy to acquire information by using an opt-in method.

C.  

Looked for any persistent threats to security that could compromise the company’s network.

D.  

Communicated requests for changes to users’ preferences across the organization and with third parties.

Discussion 0
Questions 13

Which of the following is an important implication of the Dodd-Frank Wall Street Reform and Consumer Protection Act?

Options:

A.  

Financial institutions must avoid collecting a customer’s sensitive personal information

B.  

Financial institutions must help ensure a customer’s understanding of products and services

C.  

Financial institutions must use a prescribed level of encryption for most types of customer records

D.  

Financial institutions must cease sending e-mails and other forms of advertising to customers who opt out of direct marketing

Discussion 0
Questions 14

What consumer service was the Fair Credit Reporting Act (FCRA) originally intended to provide?

Options:

A.  

The ability to receive reports from multiple credit reporting agencies.

B.  

The ability to appeal negative credit-based decisions.

C.  

The ability to correct inaccurate credit information.

D.  

The ability to investigate incidents of identity theft.

Discussion 0
Questions 15

Smith Memorial Healthcare (SMH) is a hospital network headquartered in New York and operating in 7 other states. SMH uses an electronic medical record to enter and track information about its patients. Recently, SMH suffered a data breach where a third-party hacker was able to gain access to the SMH internal network.

Because it is a HIPPA-covered entity, SMH made a notification to the Office of Civil Rights at the U.S. Department of Health and Human Services about the breach.

Which statement accurately describes SMH’s notification responsibilities?

Options:

A.  

If SMH is compliant with HIPAA, it will not have to make a separate notification to individuals in the state of New York.

B.  

If SMH has more than 500 patients in the state of New York, it will need to make separate notifications to these patients.

C.  

If SMH must make a notification in any other state in which it operates, it must also make a notification to individuals in New York.

D.  

If SMH makes credit monitoring available to individuals who inquire, it will not have to make a separate

notification to individuals in the state of New York.

Discussion 0
Questions 16

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

At this stage of the investigation, what should the data privacy leader review first?

Options:

A.  

Available data flow diagrams

B.  

The text of the original complaint

C.  

The company’s data privacy policies

D.  

Prevailing regulation on this subject

Discussion 0
Questions 17

In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?

Options:

A.  

Simplifying consumer choice.

B.  

Enhancing security measures.

C.  

Practicing Privacy by Design.

D.  

Providing greater transparency.

Discussion 0
Questions 18

What is the most likely reason that states have adopted their own data breach notification laws?

Options:

A.  

Many states have unique types of businesses that require specific legislation

B.  

Many lawmakers believe that federal enforcement of current laws has not been effective

C.  

Many types of organizations are not currently subject to federal laws regarding breaches

D.  

Many large businesses have intentionally breached the personal information of their customers

Discussion 0
Questions 19

SCENARIO

Please use the following to answer the next QUESTION:

Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were really serious about not being bothered,” Evan said, “They’d be on the national DNC list. That’s the only one we’re required to follow. At SunriseLynx, we call until they ask us not to.”

Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call “another time.” This, to Larry, is a clear indication that they don’t want to be called at all. Evan doesn’t see it that way.

Larry believes that Evan’s arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan’s political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions.

Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan’s leadership.

Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker’s belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss.

Larry wants to take action, but is uncertain how to proceed.

Which act would authorize Evan’s undercover investigation?

Options:

A.  

The Whistleblower Protection Act

B.  

The Stored Communications Act (SCA)

C.  

The National Labor Relations Act (NLRA)

D.  

The Fair and Accurate Credit Transactions Act (FACTA)

Discussion 0
Questions 20

SCENARIO

Please use the following to answer the next QUESTION

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need to hire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.

Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.

Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that

even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.

In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.

Which law will be most relevant to Felicia’s plan to ask applicants about drug addiction?

Options:

A.  

The Americans with Disabilities Act (ADA).

B.  

The Occupational Safety and Health Act (OSHA).

C.  

The Genetic Information Nondiscrimination Act of 2008.

D.  

The Health Insurance Portability and Accountability Act (HIPAA).

Discussion 0
Questions 21

Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?

Options:

A.  

Announcing the tracking of online behavior for advertising purposes.

B.  

Integrating privacy protections during product development.

C.  

Allowing consumers to opt in before collecting any data.

D.  

Mitigating harm to consumers after a security breach.

Discussion 0
Questions 22

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the best reason for Cheryl to follow Janice’s suggestion about classifying customer data?

Options:

A.  

It will help employees stay better organized

B.  

It will help the company meet a federal mandate

C.  

It will increase the security of customers’ personal information (PI)

D.  

It will prevent the company from collecting too much personal information (PI)

Discussion 0