Under the GDPR, the complainant’s request regarding her personal information is known as what?
SCENARIO Please use the following to answer the next QUESTION: A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes...
What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?
SCENARIO Please use the following to answer the next QUESTION Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The...
How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?
How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?A . It expanded the definition of “consumer reports” to include communications relating to employee investigationsB . It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized accessC...
What is the data privacy leader’s next best source of information to aid the investigation?
SCENARIO Please use the following to answer the next QUESTION: A US-based startup company is selling a new gaming application. One day, the CEO of the company receives an urgent letter from a prominent EU-based retail partner. Triggered by an unresolved complaint lodged by an EU resident, the letter describes...
Which act would authorize Evan’s undercover investigation?
SCENARIO Please use the following to answer the next QUESTION: Larry has become increasingly dissatisfied with his telemarketing position at SunriseLynx, and particularly with his supervisor, Evan. Just last week, he overheard Evan mocking the state’s Do Not Call list, as well as the people on it. “If they were...
What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?
What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?A . Where one of the parties has given consentB . Where state law permits such interceptionC . If an organization intercepts an employee’s purely personal callD . Only if...
Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?
Based on the 2012 Federal Trade Commission report “Protecting Consumer Privacy in an Era of Rapid Change”, which of the following directives is most important for businesses?A . Announcing the tracking of online behavior for advertising purposes.B . Integrating privacy protections during product development.C . Allowing consumers to opt in...
Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?
Which venture would be subject to the requirements of Section 5 of the Federal Trade Commission Act?A . A local nonprofit charity’s fundraiserB . An online merchant’s free shipping offerC . A national bank’s no-fee checking promotionD . A city bus system’s frequent rider programView AnswerAnswer: B
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?
Within what time period must a commercial message sender remove a recipient’s address once they have asked to stop receiving future e-mail?A . 7 daysB . 10 daysC . 15 daysD . 21 daysView AnswerAnswer: B Explanation: Reference: https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide- business
Which of the following best describes what a “private right of action” is?
Which of the following best describes what a “private right of action” is?A . The right of individuals to keep their information private.B . The right of individuals to submit a request to access their information.C . The right of individuals harmed by data processing to have their information deleted.D...