Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?A . Individual participation.B . Purpose specification.C . Collection limitation.D . Accountability.View AnswerAnswer: C Explanation: Reference: http://oecdprivacy.org

September 19, 2021 No Comments READ MORE +

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

What Privacy by Design (PbD) element should include a de-identification or deletion plan?A . Categorization.B . Remediation.C . Retention.D . SecurityView AnswerAnswer: C

September 19, 2021 No Comments READ MORE +

Which of the following is an example of drone “swarming”?

Which of the following is an example of drone “swarming”?A . A drone filming a cyclist from above as he rides.B . A drone flying over a building site to gather data.C . Drones delivering retailers’ packages to private homes.D . Drones communicating with each other to perform a search...

September 19, 2021 No Comments READ MORE +

Regarding the app, which action is an example of a decisional interference violation?

SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based...

September 19, 2021 No Comments READ MORE +

A key principle of an effective privacy policy is that it should be?

A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios.B . Made general enough to maximize flexibility in its application.C . Presented with external parties as the intended audience.D . Designed primarily by the organization's...

September 19, 2021 No Comments READ MORE +

Before implementation, a privacy technologist should conduct which of the following?

An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls. Before implementation, a privacy technologist should...

September 19, 2021 No Comments READ MORE +

Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?

SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house...

September 18, 2021 No Comments READ MORE +

What must be done to destroy data stored on "write once read many" (WORM) media?

What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C

September 18, 2021 No Comments READ MORE +

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?A . Configuring the environment to use shorter error messages.B . Handing exceptions internally and not displaying errors to the user.C . Creating default error pages or error messages...

September 18, 2021 No Comments READ MORE +

Which of the following would best improve an organization’ s system of limiting data use?

Which of the following would best improve an organization’ s system of limiting data use?A . Implementing digital rights management technology.B . Confirming implied consent for any secondary use of data.C . Applying audit trails to resources to monitor company personnel.D . Instituting a system of user authentication for company...

September 18, 2021 No Comments READ MORE +