Which of the following is an example of drone “swarming”?

Which of the following is an example of drone “swarming”?A . A drone filming a cyclist from above as he rides. B. A drone flying over a building site to gather data. C. Drones delivering retailers’ packages to private homes. D. Drones communicating with each other to perform a search...

May 19, 2023 No Comments READ MORE +

If Clean-Q were to utilize LeadOps' services, what is a contract clause that may be included in the agreement entered into with LeadOps?

SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house...

May 19, 2023 No Comments READ MORE +

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?A . Implementing a mandatory privacy review and legal approval process. B. Obtain leadership buy-in for a mandatory privacy review and approval process. C. Set up an online Privacy Impact...

May 18, 2023 No Comments READ MORE +

When analyzing user data, how is differential privacy applied?

When analyzing user data, how is differential privacy applied?A . By injecting noise into aggregated datasets. B. By assessing differences between datasets. C. By applying asymmetric encryption to datasets. D. By removing personal identifiers from datasets.View AnswerAnswer: A

May 18, 2023 No Comments READ MORE +

Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected? ^

Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected? ^A . Review the Data Life Cycle. B. Review data retention policies. C. Create enterprise data flow diagrams. D. Recommend controls for...

May 18, 2023 No Comments READ MORE +

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

SCENARIO Please use the following to answer the next question: Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a...

May 18, 2023 No Comments READ MORE +

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance. B. The EU Data Protection Directive. C. The Code of Fair Information Practices. D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D...

May 17, 2023 No Comments READ MORE +

Which of the following best describes a risk that is likely to result in a privacy breach?

SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based...

May 17, 2023 No Comments READ MORE +

Value sensitive design focuses on which of the following?

Value sensitive design focuses on which of the following?A . Quality and benefit. B. Ethics and morality. C. Confidentiality and integrity. D. Consent and human rights.View AnswerAnswer: B Explanation: Value sensitive design (VSD) is a theoretically grounded approach to the design of technology that accounts for human values in a...

May 17, 2023 No Comments READ MORE +

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?A . Copies of the consent forms from each data subject. B. Time limits for erasure of different...

May 17, 2023 No Comments READ MORE +