Which is NOT a suitable action to apply to data when the retention period ends?

Which is NOT a suitable action to apply to data when the retention period ends?A . Aggregation.B . De-identification.C . Deletion.D . Retagging.View AnswerAnswer: C

February 12, 2025 No Comments READ MORE +

Which activity would best support the principle of data quality?

Which activity would best support the principle of data quality?A . Providing notice to the data subject regarding any change in the purpose for collecting such data.B . Ensuring that the number of teams processing personal information is limited.C . Delivering information in a format that the data subject understands.D...

February 12, 2025 No Comments READ MORE +

What distinguishes a "smart" device?

What distinguishes a "smart" device?A . It can perform multiple data functions simultaneously.B . It is programmable by a user without specialized training.C . It can reapply access controls stored in its internal memory.D . It augments its intelligence with information from the internet.View AnswerAnswer: D

February 12, 2025 No Comments READ MORE +

Which of the following suggests the greatest degree of transparency?

Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collectionB . The data subject has multiple opportunities to opt-out after collection has occurred.C . A privacy notice accommodates broadly defined future collections for new products.D . After reading the...

February 11, 2025 No Comments READ MORE +

What is the main function of the Amnesic Incognito Live System or TAILS device?

What is the main function of the Amnesic Incognito Live System or TAILS device?A . It allows the user to run a self-contained computer from a USB device.B . It accesses systems with a credential that leaves no discernable tracks.C . It encrypts data stored on any computer on a...

February 11, 2025 No Comments READ MORE +

What was the first privacy framework to be developed?

What was the first privacy framework to be developed?A . OECD Privacy Principles.B . Generally Accepted Privacy Principles.C . Code of Fair Information Practice Principles (FIPPs).D . The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.View AnswerAnswer: C

February 10, 2025 No Comments READ MORE +

What term describes two re-identifiable data sets that both come from the same unidentified individual?

What term describes two re-identifiable data sets that both come from the same unidentified individual?A . Pseudonymous data.B . Anonymous data.C . Aggregated data.D . Imprecise data.View AnswerAnswer: A

February 10, 2025 No Comments READ MORE +

What is the main function of a breach response center?

What is the main function of a breach response center?A . Detecting internal security attacks.B . Addressing privacy incidents.C . Providing training to internal constituencies.D . Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B

February 5, 2025 No Comments READ MORE +

Carol replied, `Jane, that doesn't sound so bad. Could you just fix things and help us to post even more online?

SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...

February 3, 2025 No Comments READ MORE +

Which is true regarding the type of encryption Lancelot uses?

SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. `The old...

February 3, 2025 No Comments READ MORE +