What is the best way to prevent the Finnish vendor from transferring data to another party?

SCENARIO Please use the following to answer the next question: Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been...

October 18, 2020 No Comments READ MORE +

Which is NOT an influence on the privacy environment external to an organization?

Which is NOT an influence on the privacy environment external to an organization?A . Management team prioritiesB . RegulationsC . Consumer demandD . Technological advancesView AnswerAnswer: C

October 18, 2020 No Comments READ MORE +

What is the key factor that lays the foundation for all other elements of a privacy program?

What is the key factor that lays the foundation for all other elements of a privacy program?A . The applicable privacy regulationsB . The structure of a privacy teamC . A privacy mission statementD . A responsible internal stakeholderView AnswerAnswer: A

October 17, 2020 No Comments READ MORE +

Which statement is FALSE regarding the use of technical security controls?

Which statement is FALSE regarding the use of technical security controls?A . Most privacy legislation enumerates the types of technical security controls that must be implementedB . Technical security controls are part of a data governance strategyC . Technical security controls deployed for one jurisdiction often satisfy another jurisdictionD ....

October 17, 2020 No Comments READ MORE +

What phase in the Privacy Maturity Model (PMM) does Gadgo’s privacy program best exhibit?

SCENARIO Please use the following to answer the next question: Paul Daniels, with years of experience as a CEO, is worried about his son Carlton’s successful venture, Gadgo. A technological innovator in the communication industry that quickly became profitable, Gadgo has moved beyond its startup phase. While it has retained...

October 17, 2020 No Comments READ MORE +

Which of Anton’s plans for improving the data management of the company is most unachievable?

SCENARIO Please use the following to answer the next question: Henry Home Furnishings has built high-end furniture for nearly forty years. However, the new owner, Anton, has found some degree of disorganization after touring the company headquarters. His uncle Henry has always focused on production C not data processing C...

October 16, 2020 No Comments READ MORE +

What is the best way to understand the location, use and importance of personal data within an organization?

What is the best way to understand the location, use and importance of personal data within an organization?A . By analyzing the data inventoryB . By testing the security of data systemsC . By evaluating methods for collecting dataD . By interviewing employees tasked with data entryView AnswerAnswer: C

October 16, 2020 1 Comment READ MORE +

Based on Albert’s observations regarding recent security incidents, which of the following should he suggest as a priority for Treasure Box?

SCENARIO Please use the following to answer the next question: For 15 years, Albert has worked at Treasure Box C a mail order company in the United States (U.S.) that used to sell decorative candles around the world, but has recently decided to limit its shipments to customers in the...

October 15, 2020 No Comments READ MORE +

The company may start to earn back the trust of its customer base by following Albert’s suggestion regarding which handling procedure?

SCENARIO Please use the following to answer the next question: For 15 years, Albert has worked at Treasure Box C a mail order company in the United States (U.S.) that used to sell decorative candles around the world, but has recently decided to limit its shipments to customers in the...

October 14, 2020 No Comments READ MORE +

“Collection,” “access” and “destruction” are aspects of what privacy management process?

“Collection,” “access” and “destruction” are aspects of what privacy management process?A . The data governance strategyB . The breach response planC . The metric life cycleD . The business caseView AnswerAnswer: A

October 13, 2020 No Comments READ MORE +