Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users:

Privacy enhancing tools aim to allow users to take one or more of the following actions related to their personal data that is sent to, and used by online service providers, merchants or other users: I) Increase control over their personal data II) Choose whether to use services anonymously or...

January 27, 2023 No Comments READ MORE +

The concept of data adequacy is based on the principle of _________.

The concept of data adequacy is based on the principle of _________.A . Adequate compliance B. Dissimilarity of legislations C. Essential equivalence D. Essential assessmentView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +

What is the maximum compensation that can be imposed on an organization for negligence in implementing reasonable security practices as defined in Section 43A of ITAA, 2008?

What is the maximum compensation that can be imposed on an organization for negligence in implementing reasonable security practices as defined in Section 43A of ITAA, 2008?A . Uncapped compensation B. 5 crores C. 15 crores or 4% of the global turnover D. 5 lakhsView AnswerAnswer: C

January 23, 2023 No Comments READ MORE +

Was the visibility exercise adequately carried out? What gaps did you notice?

CORRECT TEXT FILL BLANK VPI As a starting point, the consultants undertook a visibility exercise to understand the type of personal information (PI) being dealt with within the organization and also by third parties and the scope was to cover all the client relationships (IT services and BPM both) and...

January 23, 2023 No Comments READ MORE +

What should be the learning for the company going forward? What should the consultants suggest?

CORRECT TEXT FILL BLANK RCI and PCM Given its global operations, the company is exposed to multiple regulations (privacy related) across the globe and needs to comply mostly through contracts for client relationships and directly for business functions. The corporate legal team is responsible for managing the contracts and understanding,...

January 21, 2023 No Comments READ MORE +

What is a Data Subject? (Choose all that apply.)

What is a Data Subject? (Choose all that apply.)A . An individual who provides his/her data/information for availing any service B. An individual who processes the data/information of individuals for providing necessary services C. An individual whose data/information is processed D. A company providing PI of its employees for processing...

January 21, 2023 No Comments READ MORE +

Assuming you have been tasked to deploy this framework for the bank, which of the following would most likely be your first step?

XYZ bank has recently decided to start offering online banking services. For doing so, the bank has outsourced its IT operations and processes to various third parties. Acknowledging privacy concerns, bank has decided to implement a privacy program. Assuming you have been tasked to deploy this framework for the bank,...

January 21, 2023 No Comments READ MORE +

Which of the following would be the most critical factor for the review process?

A newly appointed Data Protection officer is reviewing the organization’s existing privacy policy. Which of the following would be the most critical factor for the review process?A . Awareness of the business units about the privacy policy B. Changes in the legal/regulatory regime C. Privacy policies of industry peers D....

January 20, 2023 No Comments READ MORE +

Can you please guide the information security function to realign company’s security initiatives to include privacy protection, keeping in mind that the client security requirements would vary across relationships?

CORRECT TEXT FILL BLANK PIS The company has a well-defined and effectively implemented security policy. As in case of access control, the security controls vary in different client relationships based on the client requirements but certain basic or hygiene security practices / controls are implemented organization wide. The consultants have...

January 19, 2023 No Comments READ MORE +

Which of the following are classified as Sensitive Personal Data or Information under Section 43A of ITAA, 2008? (Choose all that apply.)

Which of the following are classified as Sensitive Personal Data or Information under Section 43A of ITAA, 2008? (Choose all that apply.)A . Password B. Financial information C. Sexual orientation D. Caste and religious beliefs E. Biometric information F. Medical records and historyView AnswerAnswer: B,C,E,F

January 18, 2023 No Comments READ MORE +