Which of the following is the most effective control to enforce MessageSafe’s implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP?

SCENARIO

Please use the following to answer the next QUESTION:

John is the new privacy officer at the prestigious international law firm C A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe.

During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm’s email continuity service to their existing email security vendor C MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.

John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe’s previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.

At the meeting, Derrick emphasized that email is the primary method for the firm’s lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn’t have the time or resource to look for another solution. Furthermore, the off-premises email continuity service will only be turned on when the email service at A&M LLP’s primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.

Which of the following is the most effective control to enforce MessageSafe’s implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP?
A . MessageSafe must apply due diligence before trusting Cloud Inc. with the personal data received from A&M LLP.
B . MessageSafe must flow-down its data protection contract terms with A&M LLP to Cloud Inc.
C . MessageSafe must apply appropriate security controls on the cloud infrastructure.
D . MessageSafe must notify A&M LLP of a data breach.

Answer: C

Explanation:

The most effective control to enforce MessageSafe’s implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP is to require MessageSafe to apply appropriate security controls on the cloud infrastructure. This control ensures that MessageSafe takes responsibility for securing the personal data that it processes on behalf of A&M LLP on the cloud platform provided by Cloud Inc. According to the GDPR, data processors must implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of processing personal data1 These measures may include encryption, pseudonymisation, access control, backup and recovery, logging and monitoring, vulnerability management, incident response, etc2 Furthermore, data processors must ensure that any sub-processors they engage to process personal data on behalf of the data controller also comply with the same obligations3 Therefore, MessageSafe must ensure that Cloud Inc. provides adequate security guarantees for the cloud infrastructure and services that it uses to host the email continuity service for A&M LLP. MessageSafe must also monitor and audit the security performance of Cloud Inc. and report any issues or breaches to A&M LLP.

Reference: 1: Article 32 GDPR | General Data Protection Regulation (GDPR); 2: Guidelines 4/2019 on Article 25 Data Protection by Design and by Default | European Data Protection Board; 3: Article 28 GDPR | General Data Protection Regulation (GDPR)

Latest CIPM Dumps Valid Version with 90 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments