Which of the following actions should the privacy officer take first?
An organization's privacy officer was just notified by the benefits manager that she accidentally sent out the retirement enrollment report of all employees to a wrong vendor. Which of the following actions should the privacy officer take first?A . Perform a risk of harm analysis.B . Report the incident to...
What is the best way to prevent the Finnish vendor from transferring data to another party?
SCENARIO Please use the following to answer the next QUESTION: Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been...
Under the General Data Protection Regulation (GDPR), when would a data subject have the right to require the erasure of his or her data without undue delay?
Under the General Data Protection Regulation (GDPR), when would a data subject have the right to require the erasure of his or her data without undue delay?A . When the data subject is a public authority.B . When the erasure is in the public interest.C . When the processing is...
How would a strong data life cycle management policy have helped prevent the breach?
SCENARIO Please use the following to answer the next QUESTION: Martin Briseño is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseño decided to change the hotel’s on-the-job mentoring model to a standardized training program for employees who were...
Which of the following is NOT an obligation of MessageSafe as the email continuity service provider for A&M LLP?
SCENARIO Please use the following to answer the next QUESTION: John is the new privacy officer at the prestigious international law firm C A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe....
“Collection”, “access” and “destruction” are aspects of what privacy management process?
“Collection”, “access” and “destruction” are aspects of what privacy management process?A . The data governance strategyB . The breach response planC . The metric life cycleD . The business caseView AnswerAnswer: A
What must be done to maintain the program and develop it beyond just a data breach prevention program? How can you build on your success?
SCENARIO Please use the following to answer the next QUESTION: As the Director of data protection for Consolidated Records Corporation, you are justifiably pleased with your accomplishments so far. Your hiring was precipitated by warnings from regulatory agencies following a series of relatively minor data breaches that could easily have...
What can Sanjay do to minimize the risks of offering the product in Europe?
SCENARIO Please use the following to answer the next QUESTION: Manasa is a product manager at Omnipresent Omnimedia, where she is responsible for leading the development of the company's flagship product, the Handy Helper. The Handy Helper is an application that can be used in the home to manage family...
What step in the system development process did Manasa skip?
SCENARIO Please use the following to answer the next QUESTION: Manasa is a product manager at Omnipresent Omnimedia, where she is responsible for leading the development of the company's flagship product, the Handy Helper. The Handy Helper is an application that can be used in the home to manage family...
What safeguard can most efficiently ensure that privacy protection is a dimension of relationships with vendors?
SCENARIO Please use the following to answer the next QUESTION: Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand...