Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified Information Privacy Professional/United States (CIPP/US) Question and Answers

Certified Information Privacy Professional/United States (CIPP/US)

Last Update Sep 23, 2025
Total Questions : 194

We are offering FREE CIPP-US IAPP exam questions. All you do is to just go and sign up. Give your details, prepare CIPP-US free exam questions and then go for complete pool of Certified Information Privacy Professional/United States (CIPP/US) test questions that will help you more.

CIPP-US pdf

CIPP-US PDF

$42  $104.99
CIPP-US Engine

CIPP-US Testing Engine

$50  $124.99
CIPP-US PDF + Engine

CIPP-US PDF + Testing Engine

$66  $164.99
Questions 1

Which of the following privacy rights is NOT available under the Colorado Privacy Act?

Options:

A.  

The right to access sensitive data.

B.  

The right to correct sensitive data.

C.  

The right to delete sensitive data.

D.  

The right to limit the use of sensitive data.

Discussion 0
Questions 2

A company based in United States receives information about its UK subsidiary’s employees in connection with the centralized HR service it provides.

How can the UK company ensure an adequate level of data protection that would allow the restricted data transfer to continue?

Options:

A.  

By signing up to an approved code of conduct under UK GDPR to demonstrate compliance with its requirements, both for the parent and the subsidiary companies.

B.  

By revising the contract with the United States parent company incorporating EU SCCs, as it continues to be valid for restricted transfers under the UK regime.

C.  

By submitting to the ICO a new application for the UK BCRs using the UK BCR application forms, as their existing authorized EU BCRs are not recognized.

D.  

By allowing each employee the option to opt-out to the restricted transfer, as it is necessary to send their names in order to book the sales bonuses.

Discussion 0
Questions 3

The CFO of a pharmaceutical company is duped by a phishing email and discloses many of the company’s employee personnel files to an online predator. The files include employee contact information, job applications, performance reviews, discipline records, and job descriptions.

Which of the following state laws would be an affected employee’s best recourse against the employer?

Options:

A.  

The state social security number confidentiality statute.

B.  

The state personnel record review statute.

C.  

The state data destruction statute.

D.  

The state UDAP statute.

Discussion 0
Questions 4

A financial services company install "bossware" software on its employees' remote computers to monitor performance. The software logs screenshots, mouse movements, and keystrokes to determine whether an employee is being productive. The software can also enable the computer webcams to record video footage.

Which of the following would best support an employee claim for an intrusion upon seclusion tort?

Options:

A.  

The webcam is enabled to record video any time the computer is turned on.

B.  

The company creates and saves a biometric template for each employee based upon keystroke dynamics.

C.  

The software automatically sends a notification to a supervisor any time the employee's mouse is dormant for more than five minutes.

D.  

The webcam records video of an employee using a company laptop to perform personal business while at a coffee shop during work hours.

Discussion 0
Questions 5

Acme Student Loan Company has developed an artificial intelligence algorithm that determines whether an individual is likely to pay their bill or default. A person who is determined by the algorithm to be more likely to default will receive frequent payment reminder calls, while those who are less likely to default will not receive payment reminders.

Which of the following most accurately reflects the privacy concerns with Acme Student Loan Company using

artificial intelligence in this manner?

Options:

A.  

If the algorithm uses risk factors that impact the automatic decision engine. Acme must ensure that the algorithm does not have a disparate impact on protected classes in the output.

B.  

If the algorithm makes automated decisions based on risk factors and public information, Acme need not determine if the algorithm has a disparate impact on protected classes.

C.  

If the algorithm’s methodology is disclosed to consumers, then it is acceptable for Acme to have a disparate impact on protected classes.

D.  

If the algorithm uses information about protected classes to make automated decisions, Acme must ensure that the algorithm does not have a disparate impact on protected classes in the output.

Discussion 0
Questions 6

SCENARIO

Please use the following to answer the next QUESTION

Felicia has spent much of her adult life overseas, and has just recently returned to the U.S. to help her friend Celeste open a jewelry store in California. Felicia, despite being excited at the prospect, has a number of security concerns, and has only grudgingly accepted the need tohire other employees. In order to guard against the loss of valuable merchandise, Felicia wants to carefully screen applicants. With their permission, Felicia would like to run credit checks, administer polygraph tests, and scrutinize videos of interviews. She intends to read applicants’ postings on social media, ask QUESTION NO:s about drug addiction, and solicit character references. Felicia believes that if potential employees are serious about becoming part of a dynamic new business, they will readily agree to these requirements.

Felicia is also in favor of strict employee oversight. In addition to protecting the inventory, she wants to prevent mistakes during transactions, which will require video monitoring. She also wants to regularly check the company vehicle’s GPS for locations visited by employees. She also believes that employees who use their own devices for work-related purposes should agree to a certain amount of supervision.

Given her high standards, Felicia is skeptical about the proposed location of the store. She has been told that many types of background checks are not allowed under California law. Her friend Celeste thinks these worries are unfounded, as long as applicants verbally agree to the checks and are offered access to the results. Nor does Celeste share Felicia’s concern about state breach notification laws, which, she claims, would be costly to implement even on a minor scale. Celeste believes that

even if the business grows a customer database of a few thousand, it’s unlikely that a state agency would hassle an honest business if an accidental security incident were to occur.

In any case, Celeste feels that all they need is common sense – like remembering to tear up sensitive documents before throwing them in the recycling bin. Felicia hopes that she’s right, and that all of her concerns will be put to rest next month when their new business consultant (who is also a privacy professional) arrives from North Carolina.

Regarding credit checks of potential employees, Celeste has a misconception regarding what?

Options:

A.  

Consent requirements.

B.  

Disclosure requirements.

C.  

Employment-at-will rules.

D.  

Records retention policies

Discussion 0
Questions 7

Which of the following laws is NOT involved in the regulation of employee background checks?

Options:

A.  

The Civil Rights Act.

B.  

The Gramm-Leach-Bliley Act (GLBA).

C.  

The U.S. Fair Credit Reporting Act (FCRA).

D.  

The California Investigative Consumer Reporting Agencies Act (ICRAA).

Discussion 0
Questions 8

According to FERPA, when can a school disclose records without a student’s consent?

Options:

A.  

If the disclosure is not to be conducted through email to the third party

B.  

If the disclosure would not reveal a student’s student identification number

C.  

If the disclosure is to practitioners who are involved in a student’s health care

D.  

If the disclosure is to provide transcripts to a school where a student intends to enroll

Discussion 0
Questions 9

Which of the following practices is NOT a key component of a data ethics framework?

Options:

A.  

Automated decision-making.

B.  

Preferability testing.

C.  

Data governance.

D.  

Auditing.

Discussion 0
Questions 10

The FTC often negotiates consent decrees with companies found to be in violation of privacy principles. How does this benefit both parties involved?

Options:

A.  

It standardizes the amount of fines.

B.  

It simplifies the audit requirements.

C.  

It avoids potentially harmful publicity.

D.  

It spares the expense of going to trial.

Discussion 0
Questions 11

Once a breach has been definitively established, which task should be prioritized next?

Options:

A.  

Involving law enforcement and state Attorneys General.

B.  

Determining what was responsible for the breach and neutralizing the threat.

C.  

Providing notice to the affected parties so they can take precautionary measures.

D.  

Implementing remedial measures and evaluating how to prevent future breaches.

Discussion 0
Questions 12

SCENARIO

Please use the following to answer the next QUESTION:

Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were really serious about not being bothered,” Evan said, “They’d be on the national DNC list. That’s the only one we’re required to follow. At SunriseLynx, we call until they ask us not to.”

Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call “another time.” This, to Larry, is a clear indication that they don’t want to be called at all. Evan doesn’t see it that way.

Larry believes that Evan’s arrogance also affects the way he treats employees. The U.S. Constitution protects American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan’s political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions.

Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan’s leadership.

Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker’s belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss.

Larry wants to take action, but is uncertain how to proceed.

In regard to telemarketing practices, Evan the supervisor has a misconception regarding?

Options:

A.  

The conditions under which recipients can opt out

B.  

The wishes of recipients who request callbacks

C.  

The right to monitor calls for quality assurance

D.  

The relationship of state law to federal law

Discussion 0
Questions 13

The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?

Options:

A.  

The 1974 Privacy Act

B.  

Common law principles

C.  

European Union Directive

D.  

Traditional fair information practices

Discussion 0
Questions 14

Which of the following is an important implication of the Dodd-Frank Wall Street Reform and Consumer Protection Act?

Options:

A.  

Financial institutions must avoid collecting a customer’s sensitive personal information

B.  

Financial institutions must help ensure a customer’s understanding of products and services

C.  

Financial institutions must use a prescribed level of encryption for most types of customer records

D.  

Financial institutions must cease sending e-mails and other forms of advertising to customers who opt out of direct marketing

Discussion 0
Questions 15

SCENARIO

Please use the following to answer the next QUESTION

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.

Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able to gain access to Filtration Station’s network and was able to steal data relating to employees in the company’s Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.

The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.

What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?

Options:

A.  

Request that the Board sign off in a written document on the choice of cloud provider.

B.  

Ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit.

C.  

Obtain express consent from employees for storing the HR data in the cloud and keep a record of the employee consents.

D.  

Negotiate a Business Associate Agreement with the cloud provider to protect any health-related data employees might share with Filtration Station.

Discussion 0
Questions 16

Which law provides employee benefits, but often mandates the collection of medical information?

Options:

A.  

The Occupational Safety and Health Act.

B.  

The Americans with Disabilities Act.

C.  

The Employee Medical Security Act.

D.  

The Family and Medical Leave Act.

Discussion 0
Questions 17

Which of the following is NOT one of three broad categories of products offered by data brokers, as identified by the U.S. Federal Trade Commission (FTC)?

Options:

A.  

Research (such as information for understanding consumer trends).

B.  

Risk mitigation (such as information that may reduce the risk of fraud).

C.  

Location of individuals (such as identifying an individual from partial information).

D.  

Marketing (such as appending data to customer information that a marketing company already has).

Discussion 0
Questions 18

Which of the following conditions would NOT be sufficient to excuse an entity from providing breach notification under state law?

Options:

A.  

If the data involved was encrypted.

B.  

If the data involved was accessed but not exported.

C.  

If the entity was subject to the GLBA Safeguards Rule.

D.  

If the entity followed internal notification procedures compatible with state law.

Discussion 0
Questions 19

In a case of civil litigation, what might a defendant who is being sued for distributing an employee’s private information face?

Options:

A.  

Probation.

B.  

Criminal fines.

C.  

An injunction.

D.  

A jail sentence.

Discussion 0
Questions 20

Global Manufacturing Co’s Human Resources department recently purchased a new software tool. This tool helps evaluate future candidates for executive roles by scanning emails to see what those candidates say and what is said about them. This provides the HR department with an automated “360 review” that lets them know how the candidate thinks and operates, what their peers and direct reports say about them, and how well they interact with each other.

What is the most important step for the Human Resources Department to take when implementing this new software?

Options:

A.  

Making sure that the software does not unintentionally discriminate against protected groups.

B.  

Ensuring that the software contains a privacy notice explaining that employees have no right to privacy as long as they are running this software on organization systems to scan email systems.

C.  

Confirming that employees have read and signed the employee handbook where they have been advised that they have no right to privacy as long as they are using the organization’s systems, regardless of the protected group or laws enforced by EEO

C.  

D.  

Providing notice to employees that their emails will be scanned by the software and creating automated profiles.

Discussion 0
Questions 21

What does the Massachusetts Personal Information Security Regulation require as it relates to encryption of personal information?

Options:

A.  

The encryption of all personal information of Massachusetts residents when all equipment is located in Massachusetts.

B.  

The encryption of all personal information stored in Massachusetts-based companies when all equipment is located in Massachusetts.

C.  

The encryption of personal information stored in Massachusetts-based companies when stored on portable devices.

D.  

The encryption of all personal information of Massachusetts residents when stored on portable devices.

Discussion 0
Questions 22

An organization self-certified under Privacy Shield must, upon request by an individual, do what?

Options:

A.  

Suspend the use of all personal information collected by the organization to fulfill its original purpose.

B.  

Provide the identities of third parties with whom the organization shares personal information.

C.  

Provide the identities of third and fourth parties that may potentially receive personal information.

D.  

Identify all personal information disclosed during a criminal investigation.

Discussion 0
Questions 23

In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?

Options:

A.  

Simplifying consumer choice.

B.  

Enhancing security measures.

C.  

Practicing Privacy by Design.

D.  

Providing greater transparency.

Discussion 0
Questions 24

What consumer protection did the Fair and Accurate Credit Transactions Act (FACTA) require?

Options:

A.  

The ability for the consumer to correct inaccurate credit report information

B.  

The truncation of account numbers on credit card receipts

C.  

The right to request removal from e-mail lists

D.  

Consumer notice when third-party data is used to make an adverse decision

Discussion 0
Questions 25

A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.

What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?

Options:

A.  

SCA

B.  

ECPA

C.  

CALEA

D.  

USA Freedom Act

Discussion 0
Questions 26

What is a legal document approved by a judge that formalizes an agreement between a governmental agency and an adverse party called?

Options:

A.  

A consent decree

B.  

Stare decisis decree

C.  

A judgment rider

D.  

Common law judgment

Discussion 0
Questions 27

Mega Corp. is a U.S.-based business with employees in California, Virginia, and Colorado. Which of the following must Mega Corp. comply with in regard to its human resources data?

Options:

A.  

California Privacy Rights Act.

B.  

California Privacy Rights Act and Virginia Consumer Data Protection Act.

C.  

California Privacy Rights Act and Colorado Privacy Act.

D.  

California Privacy Rights Act, Virginia Consumer Data Protection Act, and Colorado Privacy Act.

Discussion 0
Questions 28

All of the following are tasks in the “Discover” phase of building an information management program EXCEPT?

Options:

A.  

Facilitating participation across departments and levels

B.  

Developing a process for review and update of privacy policies

C.  

Deciding how aggressive to be in the use of personal information

D.  

Understanding the laws that regulate a company’s collection of information

Discussion 0
Questions 29

Which is an exception to the general prohibitions on telephone monitoring that exist under the U.S. Wiretap Act?

Options:

A.  

Call center exception

B.  

Inter-company communications exception

C.  

Ordinary course of business exception

D.  

Internet calls exception

Discussion 0
Questions 30

Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?

Options:

A.  

Announcing the tracking of online behavior for advertising purposes.

B.  

Integrating privacy protections during product development.

C.  

Allowing consumers to opt in before collecting any data.

D.  

Mitigating harm to consumers after a security breach.

Discussion 0
Questions 31

What is the main purpose of the CAN-SPAM Act?

Options:

A.  

To diminish the use of electronic messages to send sexually explicit materials

B.  

To authorize the states to enforce federal privacy laws for electronic marketing

C.  

To empower the FTC to create rules for messages containing sexually explicit content

D.  

To ensure that organizations respect individual rights when using electronic advertising

Discussion 0
Questions 32

SCENARIO

Please use the following to answer the next QUESTION:

A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes an ongoing investigation by a supervisory authority into the retailer’s data handling practices.

The complainant accuses the retailer of improperly disclosing her personal data, without consent, to parties in the United States. Further, the complainant accuses the EU-based retailer of failing to respond to her

withdrawal of consent and request for erasure of her personal data. Your organization, the US-based startup company, was never informed of this request for erasure by the EU-based retail partner. The supervisory authority investigating the complaint has threatened the suspension of data flows if the parties involved do not cooperate with the investigation. The letter closes with an urgent request: “Please act immediately by identifying all personal data received from our company.”

This is an important partnership. Company executives know that its biggest fans come from Western Europe; and this retailer is primarily responsible for the startup’s rapid market penetration.

As the Company’s data privacy leader, you are sensitive to the criticality of the relationship with the retailer.

Under the General Data Protection Regulation (GDPR), how would the U.S.-based startup company most likely be classified?

Options:

A.  

As a data supervisor

B.  

As a data processor

C.  

As a data controller

D.  

As a data manager

Discussion 0
Questions 33

Which of the following best describes the ASIA-Pacific Economic Cooperation (APEC) principles?

Options:

A.  

A bill of rights for individuals seeking access to their personal information.

B.  

A code of responsibilities for medical establishments to uphold privacy laws.

C.  

An international court ruling on personal information held in the commercial sector.

D.  

A baseline of marketers’ minimum responsibilities for providing opt-out mechanisms.

Discussion 0
Questions 34

What was the original purpose of the Foreign Intelligence Surveillance Act?

Options:

A.  

To further define what information can reasonably be under surveillance in public places under the USA PATRIOT Act, such as Internet access in public libraries.

B.  

To further clarify a reasonable expectation of privacy stemming from the Katz v. United States decision.

C.  

To further define a framework for authorizing wiretaps by the executive branch for national security purposes under Article II of the Constitution.

D.  

To further clarify when a warrant is not required for a wiretap performed internally by the telephone company outside the suspect’s home, stemming from the Olmstead v. United States decision.

Discussion 0
Questions 35

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data,including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Based on the problems with the company’s privacy security that Roberta identifies, what is the most likely cause of the breach?

Options:

A.  

Mishandling of information caused by lack of access controls.

B.  

Unintended disclosure of information shared with a third party.

C.  

Fraud involving credit card theft at point-of-service terminals.

D.  

Lost company property such as a computer or flash drive.

Discussion 0
Questions 36

John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures in place to safeguard his personal information.

Which of the following answers most accurately reflects John’s ability to pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?

Options:

A.  

John has no right to sue the corporation because the CCPA does not address any data breach rights.

B.  

John cannot sue the corporation for the data breach because only the state’s Attoney General has authority to file suit under the CCPA.

C.  

John can sue the corporation for the data breach but only to recover monetary damages he actually suffered as a result of the data breach.

D.  

John can sue the corporation for the data breach to recover monetary damages suffered as a result of the data breach, and in some circumstances seek statutory damages irrespective of whether he suffered any financial harm.

Discussion 0
Questions 37

Under state breach notification laws, which is NOT typically included in the definition of personal information?

Options:

A.  

State identification number

B.  

First and last name

C.  

Social Security number

D.  

Medical Information

Discussion 0
Questions 38

SCENARIO

Please use the following to answer the next QUESTION:

Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were really serious about not being bothered,” Evan said, “They’d be on the national DNC list. That’s the only one we’re required to follow. At SunriseLynx, we call until they ask us not to.”

Bizarrely, Evan requires telemarketers to keep records of recipients who ask them to call “another time.” This, to Larry, is a clear indication that they don’t want to be called at all. Evan doesn’t see it that way.

Larry believes that Evan’s arrogance also affects the way he treats employees. The U.S. Constitution protects

American workers, and Larry believes that the rights of those at SunriseLynx are violated regularly. At first Evan seemed friendly, even connecting with employees on social media. However, following Evan’s political posts, it became clear to Larry that employees with similar affiliations were the only ones offered promotions.

Further, Larry occasionally has packages containing personal-use items mailed to work. Several times, these have come to him already opened, even though this name was clearly marked. Larry thinks the opening of personal mail is common at SunriseLynx, and that Fourth Amendment rights are being trampled under Evan’s leadership.

Larry has also been dismayed to overhear discussions about his coworker, Sadie. Telemarketing calls are regularly recorded for quality assurance, and although Sadie is always professional during business, her personal conversations sometimes contain sexual comments. This too is something Larry has heard Evan laughing about. When he mentioned this to a coworker, his concern was met with a shrug. It was the coworker’s belief that employees agreed to be monitored when they signed on. Although personal devices are left alone, phone calls, emails and browsing histories are all subject to surveillance. In fact, Larry knows of one case in which an employee was fired after an undercover investigation by an outside firm turned up evidence of misconduct. Although the employee may have stolen from the company, Evan could have simply contacted the authorities when he first suspected something amiss.

Larry wants to take action, but is uncertain how to proceed.

Based on the way he uses social media, Evan is susceptible to a lawsuit based on?

Options:

A.  

Defamation

B.  

Discrimination

C.  

Intrusion upon seclusion

D.  

Publicity given to private life

Discussion 0
Questions 39

Federal laws establish which of the following requirements for collecting personal information of minors under the age of 13?

Options:

A.  

Implied consent from a minor’s parent or guardian, or affirmative consent from the minor.

B.  

Affirmative consent from a minor’s parent or guardian before collecting the minor’s personal information online.

C.  

Implied consent from a minor’s parent or guardian before collecting a minor’s personal information online, such as when they permit the minor to use the internet.

D.  

Affirmative consent of a parent or guardian before collecting personal information of a minor offline (e.g., in person), which also satisfies any requirements for online consent.

Discussion 0
Questions 40

Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?

Options:

A.  

They prescribe working environments that are safe and comfortable.

B.  

They limit the amount of time a potential employee can be interviewed.

C.  

They promote a workforce of employees with diverse skills and interests.

D.  

They limit the types of information that employers can collect about employees.

Discussion 0
Questions 41

All of the following common law torts are relevant to employee privacy under US law EXCEPT?

Options:

A.  

Infliction of emotional distress.

B.  

Intrusion upon seclusion.

C.  

Defamation

D.  

Conversion.

Discussion 0
Questions 42

What information did the Red Flag Program Clarification Act of 2010 add to the original Red Flags rule?

Options:

A.  

The most common methods of identity theft.

B.  

The definition of what constitutes a creditor.

C.  

The process for proper disposal of sensitive data.

D.  

The components of an identity theft detection program.

Discussion 0
Questions 43

SCENARIO

Please use the following to answer the next QUESTION:

You are the chief privacy officer at HealthCo, a major hospital in a large U.S. city in state A. HealthCo is a HIPAA-covered entity that provides healthcare services to more than 100,000 patients. A third-party cloud computing service provider, CloudHealth, stores and manages the electronic protected health information (ePHI) of these individuals on behalf of HealthCo. CloudHealth stores the data in state B. As part of HealthCo’s business associate agreement (BAA) with CloudHealth, HealthCo requires CloudHealth to implement security measures, including industry standard encryption practices, to adequately protect the data. However, HealthCo did not perform due diligence on CloudHealth before entering the contract, and has not conducted audits of CloudHealth’s security measures.

A CloudHealth employee has recently become the victim of a phishing attack. When the employee unintentionally clicked on a link from a suspicious email, the PHI of more than 10,000 HealthCo patients was compromised. It has since been published online. The HealthCo cybersecurity team quickly identifies the perpetrator as a known hacker who has launched similar attacks on other hospitals – ones that exposed the PHI of public figures including celebrities and politicians.

During the course of its investigation, HealthCo discovers that CloudHealth has not encrypted the PHI in accordance with the terms of its contract. In addition, CloudHealth has not provided privacy or security training to its employees. Law enforcement has requested that HealthCo provide its investigative report of the breach and a copy of the PHI of the individuals affected.

A patient affected by the breach then sues HealthCo, claiming that the company did not adequately protect the individual’s ePHI, and that he has suffered substantial harm as a result of the exposed data. The patient’s attorney has submitted a discovery request for the ePHI exposed in the breach.

Which of the following would be HealthCo’s best response to the attorney’s discovery request?

Options:

A.  

Reject the request because the HIPAA privacy rule only permits disclosure for payment, treatment or healthcare operations

B.  

Respond with a request for satisfactory assurances such as a qualified protective order

C.  

Turn over all of the compromised patient records to the plaintiff’s attorney

D.  

Respond with a redacted document only relative to the plaintiff

Discussion 0
Questions 44

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the main problem with Cheryl’s suggested method of communicating the new privacy policy?

Options:

A.  

The policy would not be considered valid if not communicated in full.

B.  

The policy might not be implemented consistency across departments.

C.  

Employees would not be comfortable with a policy that is put into action over time.

D.  

Employees might not understand how the documents relate to the policy as a whole.

Discussion 0
Questions 45

A company’s employee wellness portal offers an app to track exercise activity via users’ mobile devices. Which of the following design techniques would most effectively inform users of their data privacy rights and privileges when using the app?

Options:

A.  

Offer information about data collection and uses at key data entry points.

B.  

Publish a privacy policy written in clear, concise, and understandable language.

C.  

Present a privacy policy to users during the wellness program registration process.

D.  

Provide a link to the wellness program privacy policy at the bottom of each screen.

Discussion 0
Questions 46

Which of the following statements is most accurate in regard to data breach notifications under federal and

state laws:

Options:

A.  

You must notify the Federal Trade Commission (FTC) in addition to affected individuals if over 500 individuals are receiving notice.

B.  

When providing an individual with required notice of a data breach, you must identify what personal information was actually or likely compromised.

C.  

When you are required to provide an individual with notice of a data breach under any state’s law, you must provide the individual with an offer for free credit monitoring.

D.  

The only obligations to provide data breach notification are under state law because currently there is no federal law or regulation requiring notice for the breach of personal information.

Discussion 0
Questions 47

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?

Options:

A.  

By being present when patients are checking in

B.  

By speaking to a patient without prior authorization

C.  

By ignoring the conversation about a potential breach

D.  

By following through with his plans for his upcoming paper

Discussion 0
Questions 48

SuperMart is a large Nevada-based business that has recently determined it sells what constitutes “covered information” under Nevada’s privacy law, Senate Bill 260. Which of the following privacy compliance steps would best help SuperMart comply with the law?

Options:

A.  

Providing a mechanism for consumers to opt out of sales.

B.  

Implementing internal protocols for handling access and deletion requests.

C.  

Preparing a notice of financial incentive for any loyalty programs offered to its customers.

D.  

Reviewing its vendor contracts to ensure that the vendors are subject to service provider restrictions.

Discussion 0
Questions 49

Privacy Is Hiring Inc., a CA-based company, is an online specialty recruiting firm focusing on placing privacy professionals in roles at major companies. Job candidates create online profiles

outlining their experience and credentials, and can pay $19.99/month via credit card to have their profiles promoted to potential employers. Privacy Is Hiring Inc. keeps all customer data at rest encrypted on its servers.

Under what circumstances would Privacy Is Hiring Inc., need to notify affected individuals in the event of a data breach?

Options:

A.  

If law enforcement has completed its investigation and has authorized Privacy Is Hiring Inc. to provide the notification to clients and applicable regulators.

B.  

If the job candidates’ credit card information and the encryption keys were among the information taken.

C.  

If Privacy Is Hiring Inc., reasonably believes that job candidates will be harmed by the data breach.

D.  

If the personal information stolen included the individuals’ names and credit card pin numbers.

Discussion 0
Questions 50

Which of the following is NOT a principle found in the APEC Privacy Framework?

Options:

A.  

Integrity of Personal Information.

B.  

Access and Correction.

C.  

Preventing Harm.

D.  

Privacy by Design.

Discussion 0