Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Information Privacy Professional/United States (CIPP/US) Question and Answers

Certified Information Privacy Professional/United States (CIPP/US)

Last Update May 18, 2024
Total Questions : 168

We are offering FREE CIPP-US IAPP exam questions. All you do is to just go and sign up. Give your details, prepare CIPP-US free exam questions and then go for complete pool of Certified Information Privacy Professional/United States (CIPP/US) test questions that will help you more.

CIPP-US pdf

CIPP-US PDF

$35  $99.99
CIPP-US Engine

CIPP-US Testing Engine

$42  $119.99
CIPP-US PDF + Engine

CIPP-US PDF + Testing Engine

$56  $159.99
Questions 1

In 2012, the White House and the FTC both issued reports advocating a new approach to privacy enforcement that can best be described as what?

Options:

A.  

Harm-based.

B.  

Self-regulatory.

C.  

Comprehensive.

D.  

Notice and choice.

Discussion 0
Questions 2

The use of cookies on a website by a service provider is generally not deemed a ‘sale’ of personal information by CCPA, as long as which of the following conditions is met?

Options:

A.  

The third party stores personal information to trigger a response to a consumer’s request to exercise their right to opt in.

B.  

The analytics cookies placed by the service provider are capable of being tracked but cannot be linked to a particular consumer of that business.

C.  

The service provider retains personal information obtained in the course of providing the services specified in the agreement with the subcontractors.

D.  

The information collected by the service provider is necessary to perform debugging and the business and service provider have entered into an appropriate agreement.

Discussion 0
Questions 3

In a case of civil litigation, what might a defendant who is being sued for distributing an employee’s private information face?

Options:

A.  

Probation.

B.  

Criminal fines.

C.  

An injunction.

D.  

A jail sentence.

Discussion 0
Questions 4

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?

Options:

A.  

By being present when patients are checking in

B.  

By speaking to a patient without prior authorization

C.  

By ignoring the conversation about a potential breach

D.  

By following through with his plans for his upcoming paper

Discussion 0
Questions 5

Which of the following federal agencies does NOT enforce the Disposal Rule under the Fair and Accurate Credit Transactions Act (FACTA)?

Options:

A.  

The Office of the Comptroller of the Currency

B.  

The Consumer Financial Protection Bureau

C.  

The Department of Health and Human Services

D.  

The Federal Trade Commission

Discussion 0
Questions 6

Global Manufacturing Co’s Human Resources department recently purchased a new software tool. This tool helps evaluate future candidates for executive roles by scanning emails to see what those candidates say and what is said about them. This provides the HR department with an automated “360 review” that lets them know how the candidate thinks and operates, what their peers and direct reports say about them, and how well they interact with each other.

What is the most important step for the Human Resources Department to take when implementing this new software?

Options:

A.  

Making sure that the software does not unintentionally discriminate against protected groups.

B.  

Ensuring that the software contains a privacy notice explaining that employees have no right to privacy as long as they are running this software on organization systems to scan email systems.

C.  

Confirming that employees have read and signed the employee handbook where they have been advised that they have no right to privacy as long as they are using the organization’s systems, regardless of the protected group or laws enforced by EEO

C.  

D.  

Providing notice to employees that their emails will be scanned by the software and creating automated profiles.

Discussion 0
Questions 7

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

How does Matt come to the decision to report the marketer’s activities?

Options:

A.  

The marketer failed to make an adequate attempt to provide Matt with information

B.  

The marketer did not provide evidence that the prize books were appropriate for children

C.  

The marketer seems to have distributed his son’s information without Matt’s permission

D.  

The marketer failed to identify himself and indicate the purpose of the messages

Discussion 0
Questions 8

What is a key way that the Gramm-Leach-Bliley Act (GLBA) prevents unauthorized access into a person’s back account?

Options:

A.  

By requiring immediate public disclosure after a suspected security breach.

B.  

By requiring the amount of customer personal information printed on paper.

C.  

By requiring the financial institutions limit the collection of personal information.

D.  

By restricting the disclosure of customer account numbers by financial institutions.

Discussion 0
Questions 9

Which of the following best describes how federal anti-discrimination laws protect the privacy of private-sector employees in the United States?

Options:

A.  

They prescribe working environments that are safe and comfortable.

B.  

They limit the amount of time a potential employee can be interviewed.

C.  

They promote a workforce of employees with diverse skills and interests.

D.  

They limit the types of information that employers can collect about employees.

Discussion 0
Questions 10

A law enforcement subpoenas the ACME telecommunications company for access to text message records of a person suspected of planning a terrorist attack. The company had previously encrypted its text message records so that only the suspect could access this data.

What law did ACME violate by designing the service to prevent access to the information by a law enforcement agency?

Options:

A.  

SCA

B.  

ECPA

C.  

CALEA

D.  

USA Freedom Act

Discussion 0
Questions 11

When may a financial institution share consumer information with non-affiliated third parties for marketing purposes?

Options:

A.  

After disclosing information-sharing practices to customers and after giving them an opportunity to opt in.

B.  

After disclosing marketing practices to customers and after giving them an opportunity to opt in.

C.  

After disclosing information-sharing practices to customers and after giving them an opportunity to opt out.

D.  

After disclosing marketing practices to customers and after giving them an opportunity to opt out.

Discussion 0
Questions 12

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the most likely risk of Fitness Coach, Inc. adopting Janice’s first draft of the privacy policy?

Options:

A.  

Leaving the company susceptible to violations by setting unrealistic goals

B.  

Failing to meet the needs of customers who are concerned about privacy

C.  

Showing a lack of trust in the organization’s privacy practices

D.  

Not being in standard compliance with applicable laws

Discussion 0
Questions 13

Which of the following would NOT constitute an exception to the authorization requirement under the HIPAA Privacy Rule?

Options:

A.  

Disclosing health information for public health activities.

B.  

Disclosing health information to file a child abuse report.

C.  

Disclosing health information needed to treat a medical emergency.

D.  

Disclosing health information needed to pay a third party billing administrator.

Discussion 0
Questions 14

The Family Educational Rights and Privacy Act (FERPA) requires schools to do all of the following EXCEPT?

Options:

A.  

Verify the identity of students who make requests for access to their records.

B.  

Provide students with access to their records within a specified amount of time.

C.  

Respond to all reasonable student requests regarding explanation of their records.

D.  

Obtain student authorization before releasing directory information in their records.

Discussion 0
Questions 15

Under the Fair and Accurate Credit Transactions Act (FACTA), what is the most appropriate action for a car dealer holding a paper folder of customer credit reports?

Options:

A.  

To follow the Disposal Rule by having the reports shredded

B.  

To follow the Red Flags Rule by mailing the reports to customers

C.  

To follow the Privacy Rule by notifying customers that the reports are being stored

D.  

To follow the Safeguards Rule by transferring the reports to a secure electronic file

Discussion 0
Questions 16

Which of the following is an example of federal preemption?

Options:

A.  

The Payment Card Industry’s (PCI) ability to self-regulate and enforce data security standards for payment card data.

B.  

The U.S. Federal Trade Commission’s (FTC) ability to enforce against unfair and deceptive trade practices across sectors and industries.

C.  

The California Consumer Privacy Act (CCPA) regulating businesses that have no physical brick-and-mortal presence in California, but which do business there.

D.  

The U.S. Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act prohibiting states from passing laws that impose greater obligations on senders of email marketing.

Discussion 0
Questions 17

Which of the following accurately describes the purpose of a particular federal enforcement agency?

Options:

A.  

The National Institute of Standards and Technology (NIST) has established mandatory privacy standards that can then be enforced against all for-profit organizations by the Department of Justice (DOJ).

B.  

The Cybersecurity and Infrastructure Security Agency (CISA) is authorized to bring civil enforcement actions against organizations whose website or other online service fails to adequately secure personal information.

C.  

The Federal Communications Commission (FCC) regulates privacy practices on the internet and enforces violations relating to websites’ posted privacy disclosures.

D.  

The Federal Trade Commission (FTC) is typically recognized as having the broadest authority under the FTC Act to address unfair or deceptive privacy practices.

Discussion 0
Questions 18

Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?

Options:

A.  

7 days

B.  

10 days

C.  

15 days

D.  

21 days

Discussion 0
Questions 19

A company based in United States receives information about its UK subsidiary’s employees in connection with the centralized HR service it provides.

How can the UK company ensure an adequate level of data protection that would allow the restricted data transfer to continue?

Options:

A.  

By signing up to an approved code of conduct under UK GDPR to demonstrate compliance with its requirements, both for the parent and the subsidiary companies.

B.  

By revising the contract with the United States parent company incorporating EU SCCs, as it continues to be valid for restricted transfers under the UK regime.

C.  

By submitting to the ICO a new application for the UK BCRs using the UK BCR application forms, as their existing authorized EU BCRs are not recognized.

D.  

By allowing each employee the option to opt-out to the restricted transfer, as it is necessary to send their names in order to book the sales bonuses.

Discussion 0
Questions 20

SCENARIO

Please use the following to answer the next QUESTION

Noah is trying to get a new job involving the management of money. He has a poor personal credit rating, but he has made better financial decisions in the past two years.

One potential employer, Arnie’s Emporium, recently called to tell Noah he did not get a position. As part of the application process, Noah signed a consent form allowing the employer to request his credit report from a consumer reporting agency (CRA). Noah thinks that the report hurt his chances, but believes that he may not ever know whether it was his credit that cost him the job. However, Noah is somewhat relieved that he was not offered this particular position. He noticed that the store where he interviewed was extremely disorganized. He imagines that his credit report could still

be sitting in the office, unsecured.

Two days ago, Noah got another interview for a position at Sam’s Market. The interviewer told Noah that his credit report would be a factor in the hiring decision. Noah was surprised because he had not seen anything on paper about this when he applied.

Regardless, the effect of Noah’s credit on his employability troubles him, especially since he has tried so hard to improve it. Noah made his worst financial decisions fifteen years ago, and they led to bankruptcy. These were decisions he made as a young man, and most of his debt at the time consisted of student loans, credit card debt, and a few unpaid bills – all of which Noah is still working to pay off. He often laments that decisions he made fifteen years ago are still affecting him today.

In addition, Noah feels that an experience investing with a large bank may have contributed to his financial troubles. In 2007, in an effort to earn money to help pay off his debt, Noah talked to a customer service representative at a large investment company who urged him to purchase stocks. Without understanding the risks, Noah agreed. Unfortunately, Noah lost a great deal of money.

After losing the money, Noah was a customer of another financial institution that suffered a large security breach. Noah was one of millions of customers whose personal information was compromised. He wonders if he may have been a victim of identity theft and whether this may have negatively affected his credit.

Noah hopes that he will soon be able to put these challenges behind him, build excellent credit, and find the perfect job.

Consumers today are most likely protected from situations like the one Noah had buying stock because of which federal action or legislation?

Options:

A.  

The rules under the Fair Debt Collection Practices Act.

B.  

The creation of the Consumer Financial Protection Bureau.

C.  

Federal Trade Commission investigations into “unfair and deceptive” acts or practices.

D.  

Investigations of “abusive” acts and practices under the Dodd-Frank Wall Street Reform and Consumer Protection Act.

Discussion 0
Questions 21

Which of these organizations would be required to provide its customers with an annual privacy notice?

Options:

A.  

The Four Winds Tribal College.

B.  

The Golden Gavel Auction House.

C.  

The King County Savings and Loan.

D.  

The Breezy City Housing Commission.

Discussion 0
Questions 22

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

Options:

A.  

California.

B.  

Texas.

C.  

Illinois.

D.  

Washington.

Discussion 0
Questions 23

An organization self-certified under Privacy Shield must, upon request by an individual, do what?

Options:

A.  

Suspend the use of all personal information collected by the organization to fulfill its original purpose.

B.  

Provide the identities of third parties with whom the organization shares personal information.

C.  

Provide the identities of third and fourth parties that may potentially receive personal information.

D.  

Identify all personal information disclosed during a criminal investigation.

Discussion 0
Questions 24

How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?

Options:

A.  

It expanded the definition of “consumer reports” to include communications relating to employee investigations

B.  

It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized access

C.  

It stipulated the purpose of obtaining a consumer report can only be for a review of the employee’s credit worthiness

D.  

It required employers to get an employee’s consent in advance of requesting a consumer report for internal investigation purposes

Discussion 0
Questions 25

Which of the following types of information would an organization generally NOT be required to disclose to law enforcement?

Options:

A.  

Information about medication errors under the Food, Drug and Cosmetic Act

B.  

Money laundering information under the Bank Secrecy Act of 1970

C.  

Information about workspace injuries under OSHA requirements

D.  

Personal health information under the HIPAA Privacy Rule

Discussion 0
Questions 26

The U.S. Supreme Court has recognized an individual’s right to privacy over personal issues, such as contraception, by acknowledging which of the following?

Options:

A.  

Federal preemption of state constitutions that expressly recognize an individual right to privacy.

B.  

A “penumbra” of unenumerated constitutional rights as well as more general protections of due process of law.

C.  

An interpretation of the U.S. Constitution’s explicit definition of privacy that extends to personal issues.

D.  

The doctrine of stare decisis, which allows the U.S. Supreme Court to follow the precedent of previously decided case law.

Discussion 0
Questions 27

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

Based on the incident, the FTC’s enforcement actions against the marketer would most likely include what violation?

Options:

A.  

Intruding upon the privacy of a family with young children.

B.  

Collecting information from a child under the age of thirteen.

C.  

Failing to notify of a breach of children’s private information.

D.  

Disregarding the privacy policy of the children’s marketing industry.

Discussion 0
Questions 28

In March 2012, the FTC released a privacy report that outlined three core principles for companies handling consumer data. Which was NOT one of these principles?

Options:

A.  

Simplifying consumer choice.

B.  

Enhancing security measures.

C.  

Practicing Privacy by Design.

D.  

Providing greater transparency.

Discussion 0
Questions 29

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the best reason for Cheryl to follow Janice’s suggestion about classifying customer data?

Options:

A.  

It will help employees stay better organized

B.  

It will help the company meet a federal mandate

C.  

It will increase the security of customers’ personal information (PI)

D.  

It will prevent the company from collecting too much personal information (PI)

Discussion 0
Questions 30

What does the Massachusetts Personal Information Security Regulation require as it relates to encryption of personal information?

Options:

A.  

The encryption of all personal information of Massachusetts residents when all equipment is located in Massachusetts.

B.  

The encryption of all personal information stored in Massachusetts-based companies when all equipment is located in Massachusetts.

C.  

The encryption of personal information stored in Massachusetts-based companies when stored on portable devices.

D.  

The encryption of all personal information of Massachusetts residents when stored on portable devices.

Discussion 0
Questions 31

More than half of U.S. states require telemarketers to?

Options:

A.  

Identify themselves at the beginning of a call

B.  

Obtain written consent from potential customers

C.  

Register with the state before conducting business

D.  

Provide written contracts for customer transactions

Discussion 0
Questions 32

Who has rulemaking authority for the Fair Credit Reporting Act (FCRA) and the Fair and Accurate Credit Transactions Act (FACTA)?

Options:

A.  

State Attorneys General

B.  

The Federal Trade Commission

C.  

The Department of Commerce

D.  

The Consumer Financial Protection Bureau

Discussion 0
Questions 33

A financial services company install "bossware" software on its employees' remote computers to monitor performance. The software logs screenshots, mouse movements, and keystrokes to determine whether an employee is being productive. The software can also enable the computer webcams to record video footage.

Which of the following would best support an employee claim for an intrusion upon seclusion tort?

Options:

A.  

The webcam is enabled to record video any time the computer is turned on.

B.  

The company creates and saves a biometric template for each employee based upon keystroke dynamics.

C.  

The software automatically sends a notification to a supervisor any time the employee's mouse is dormant for more than five minutes.

D.  

The webcam records video of an employee using a company laptop to perform personal business while at a coffee shop during work hours.

Discussion 0
Questions 34

Which was NOT one of the five priority areas listed by the Federal Trade Commission in its 2012 report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers”?

Options:

A.  

International data transfers

B.  

Large platform providers

C.  

Promoting enforceable self-regulatory codes

D.  

Do Not Track

Discussion 0
Questions 35

Under state breach notification laws, which is NOT typically included in the definition of personal information?

Options:

A.  

State identification number

B.  

First and last name

C.  

Social Security number

D.  

Medical Information

Discussion 0
Questions 36

According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?

Options:

A.  

Determine which bodies will be involved in adjudication

B.  

Decide if any enforcement actions are justified

C.  

Adhere to its industry’s code of conduct

D.  

Appeal decisions made against it

Discussion 0
Questions 37

In which situation is a company operating under the assumption of implied consent?

Options:

A.  

An employer contacts the professional references provided on an applicant’s resume

B.  

An online retailer subscribes new customers to an e-mail list by default

C.  

A landlord uses the information on a completed rental application to run a credit report

D.  

A retail clerk asks a customer to provide a zip code at the check-out counter

Discussion 0
Questions 38

What is the main reason some supporters of the European approach to privacy are skeptical about self- regulation of privacy practices?

Options:

A.  

A large amount of money may have to be sent on improved technology and security

B.  

Industries may not be strict enough in the creation and enforcement of rules

C.  

A new business owner may not understand the regulations

D.  

Human rights may be disregarded for the sake of privacy

Discussion 0
Questions 39

Once a breach has been definitively established, which task should be prioritized next?

Options:

A.  

Involving law enforcement and state Attorneys General.

B.  

Determining what was responsible for the breach and neutralizing the threat.

C.  

Providing notice to the affected parties so they can take precautionary measures.

D.  

Implementing remedial measures and evaluating how to prevent future breaches.

Discussion 0
Questions 40

What is the main purpose of the Global Privacy Enforcement Network?

Options:

A.  

To promote universal cooperation among privacy authorities

B.  

To investigate allegations of privacy violations internationally

C.  

To protect the interests of privacy consumer groups worldwide

D.  

To arbitrate disputes between countries over jurisdiction for privacy laws

Discussion 0
Questions 41

Why was the Privacy Protection Act of 1980 drafted?

Options:

A.  

To respond to police searches of newspaper facilities

B.  

To assist prosecutors in civil litigation against newspaper companies

C.  

To assist in the prosecution of white-collar crimes

D.  

To protect individuals from personal privacy invasion by the police

Discussion 0
Questions 42

Under the Fair Credit Reporting Act (FCRA), what must a person who is denied employment based upon his credit history receive?

Options:

A.  

A prompt notification from the employer.

B.  

An opportunity to reapply with the employer.

C.  

Information from several consumer reporting agencies (CRAs).

D.  

A list of rights from the Consumer Financial Protection Bureau (CFPB).

Discussion 0
Questions 43

What consumer service was the Fair Credit Reporting Act (FCRA) originally intended to provide?

Options:

A.  

The ability to receive reports from multiple credit reporting agencies.

B.  

The ability to appeal negative credit-based decisions.

C.  

The ability to correct inaccurate credit information.

D.  

The ability to investigate incidents of identity theft.

Discussion 0
Questions 44

Which of the following state laws has an entity exemption for organizations subject to the Gramm-Leach-Bliley Act (GLBA)?

Options:

A.  

Nevada Privacy Law.

B.  

California Privacy Rights Act.

C.  

California Consumer Privacy Act.

D.  

Virginia Consumer Data Protection Act

Discussion 0
Questions 45

Which of the following practices is NOT a key component of a data ethics framework?

Options:

A.  

Automated decision-making.

B.  

Preferability testing.

C.  

Data governance.

D.  

Auditing.

Discussion 0
Questions 46

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He Questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

How can the radiology department address Declan’s concern about paper waste and still comply with the Health Insurance Portability and Accountability Act (HIPAA)?

Options:

A.  

State the privacy policy to the patient verbally

B.  

Post the privacy notice in a prominent location instead

C.  

Direct patients to the correct area of the hospital website

D.  

Confirm that patients are given the privacy notice on their first visit

Discussion 0
Questions 47

Which federal law or regulation preempts state law?

Options:

A.  

Health Insurance Portability and Accountability Act

B.  

Controlling the Assault of Non-Solicited Pornography and Marketing Act

C.  

Telemarketing Sales Rule

D.  

Electronic Communications Privacy Act of 1986

Discussion 0
Questions 48

The Cable Communications Policy Act of 1984 requires which activity?

Options:

A.  

Delivery of an annual notice detailing how subscriber information is to be used

B.  

Destruction of personal information a maximum of six months after it is no longer needed

C.  

Notice to subscribers of any investigation involving unauthorized reception of cable services

D.  

Obtaining subscriber consent for disseminating any personal information necessary to render cable services

Discussion 0
Questions 49

John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures in place to safeguard his personal information.

Which of the following answers most accurately reflects John’s ability to pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?

Options:

A.  

John has no right to sue the corporation because the CCPA does not address any data breach rights.

B.  

John cannot sue the corporation for the data breach because only the state’s Attoney General has authority to file suit under the CCPA.

C.  

John can sue the corporation for the data breach but only to recover monetary damages he actually suffered as a result of the data breach.

D.  

John can sue the corporation for the data breach to recover monetary damages suffered as a result of the data breach, and in some circumstances seek statutory damages irrespective of whether he suffered any financial harm.

Discussion 0
Questions 50

Which act violates the Family Educational Rights and Privacy Act of 1974 (FERPA)?

Options:

A.  

A K-12 assessment vendor obtains a student’s signed essay about her hometown from her school to use as an exemplar for public release

B.  

A university posts a public student directory that includes names, hometowns, e-mail addresses, and majors

C.  

A newspaper prints the names, grade levels, and hometowns of students who made the quarterly honor roll

D.  

University police provide an arrest report to a student’s hometown police, who suspect him of a similar crime

Discussion 0