Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CIPM Premium Access

View all detail and faqs for the CIPM exam


687 Students Passed

94% Average Score

97% Same Questions
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

What United States federal law requires financial institutions to declare their personal data collection practices?

Options:

A.

The Kennedy-Hatch Disclosure Act of 1997.

B.

The Gramm-Leach-Bliley Act of 1999.

C.

SUPCLA, or the federal Superprivacy Act of 2001.

D.

The Financial Portability and Accountability Act of 2006.

Questions # 62:

Under the European Data Protection Board (EDPB). which processing operation would require a DPIA?

Options:

A.

An online newspaper using its subscriber list to email a daily newsletter.

B.

A healthcare clinic that processes personal data of its patients in its billing system.

C.

A hospital processing patient's genetic and health data in its hospital information system.

D.

An online store displaying advertisements based on items viewed or purchased on its own website.

Questions # 63:

Which most accurately describes the reasons an organization will conduct a PIA?

Options:

A.

To assess an organization's compliance with applicable laws, regulations, standards, and internal procedures.

B.

To establish an inventory of its data processing activities in compliance with Article 30 of the GDPR.

C.

To identify and reduce the privacy risks to individuals at the commencement of a project.

D.

To analyze the impact of an incident response and determine next steps.

Questions # 64:

Which of the following is TRUE about a PIA (Privacy Impact Analysis)?

Options:

A.

Any project that involves the use of personal data requires a PIA

B.

A Data Protection Impact Analysis (DPIA) process includes a PIA

C.

The PIA must be conducted at the early stages of the project lifecycle

D.

The results from a previous information audit can be leveraged in a PIA process

Questions # 65:

Which of the following is NOT a type of privacy program metric?

Options:

A.

Business enablement metrics.

B.

Data enhancement metrics.

C.

Value creation metrics.

D.

Commercial metrics.

Questions # 66:

SCENARIO

Please use the following to answer the next QUESTION:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested

IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

To determine the steps to follow, what would be the most appropriate internal guide for Ben to review?

Options:

A.

Incident Response Plan.

B.

Code of Business Conduct.

C.

IT Systems and Operations Handbook.

D.

Business Continuity and Disaster Recovery Plan.

Questions # 67:

“Collection”, “access” and “destruction” are aspects of what privacy management process?

Options:

A.

The data governance strategy

B.

The breach response plan

C.

The metric life cycle

D.

The business case

Questions # 68:

SCENARIO

Please use the following lo answer the next question:

You are the privacy manager within the privacy office of a National Forest Parks and Recreation Department. While having lunch with a colleague from the IT division, you learn that the IT director has put out a request for proposal (RFP) which calls for a system that collects the personal data of park attendees.

You consult with a few other colleagues in IT and learn that the RFP is worded such that it leaves it to the vendors to demonstrate what information they would collect from people who enter parks anywhere in the country, either in a vehicle or on foot. A partial list of the information collected includes:

• personal identifiers such as name, address, age, gender;

• vehicle registration information:

• facial images of park attendees;

• health information (e.g.. physical disabilities, use of mobility devices)

The stated purpose of the RFP is to:

"Improve the National Forest. Parks, and Recreation Department's ability to track and monitor service usage thereby Increasing the robustness of our customer data and to improve service offerings.''

Companies have already started submitting proposals for software solutions that address these information gathering practices. There is only one week left before the RFP closes.

The IT department has put together an RFP evaluation team but no one from the privacy office has been a Dart of the RFP ud to this point. This occurred deposite the fact….

From a privacy management perspective, what is problematic about the "stated purpose" of the RFP?

Options:

A.

It seeks to improve the robustness of customer data.

B.

It seeks to track and monitor service usage by the customers.

C.

It could lead to unauthorized collection of personal data to improve customer service.

D.

It does not specify what information will be collected for improving customer data.

Questions # 69:

Your company provides a SaaS tool for B2B services and does not interact with individual consumers. A client's current employee reaches out with a right to delete request. what is the most appropriate response?

Options:

A.

Forward the request to the contact on file for the client asking them how they would like you to proceed.

B.

Redirect the individual back to their employer to understand their rights and how this might impact access to company tools.

C.

Process the request assuming that the individual understands the implications to their organization if their information is deleted.

D.

Explain you are unable to process the request because business contact information and associated data is not covered under privacy rights laws.

Questions # 70:

SCENARIO

Please use the following to answer the next QUESTION:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

If this were a data breach, how is it likely to be categorized?

Options:

A.

Availability Breach.

B.

Authenticity Breach.

C.

Confidentiality Breach.

D.

Integrity Breach.

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.