New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IAPP > Certified Information Privacy Professional > CIPP-US

CIPP-US Certified Information Privacy Professional/United States (CIPP/US) Question and Answers

Question # 4

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the most likely risk of Fitness Coach, Inc. adopting Janice’s first draft of the privacy policy?

A.

Leaving the company susceptible to violations by setting unrealistic goals

B.

Failing to meet the needs of customers who are concerned about privacy

C.

Showing a lack of trust in the organization’s privacy practices

D.

Not being in standard compliance with applicable laws

Full Access
Question # 5

Which of the following best describes what a “private right of action” is?

A.

The right of individuals to keep their information private.

B.

The right of individuals to submit a request to access their information.

C.

The right of individuals harmed by data processing to have their information deleted.

D.

The right of individuals harmed by a violation of a law to file a lawsuit against the violation.

Full Access
Question # 6

John, a California resident, receives notification that a major corporation with $500 million in annual revenue has experienced a data breach. John’s personal information in their possession has been stolen, including his full name and social security numb. John also learns that the corporation did not have reasonable cybersecurity measures in place to safeguard his personal information.

Which of the following answers most accurately reflects John’s ability to pursue a legal claim against the corporation under the California Consumer Privacy Act (CCPA)?

A.

John has no right to sue the corporation because the CCPA does not address any data breach rights.

B.

John cannot sue the corporation for the data breach because only the state’s Attoney General has authority to file suit under the CCPA.

C.

John can sue the corporation for the data breach but only to recover monetary damages he actually suffered as a result of the data breach.

D.

John can sue the corporation for the data breach to recover monetary damages suffered as a result of the data breach, and in some circumstances seek statutory damages irrespective of whether he suffered any financial harm.

Full Access
Question # 7

Although an employer may have a strong incentive or legal obligation to monitor employees’ conduct or behavior, some excessive monitoring may be considered an intrusion on employees’ privacy? Which of the following is the strongest example of excessive monitoring by the employer?

A.

An employer who installs a video monitor in physical locations, such as a warehouse, to ensure employees are performing tasks in a safe manner and environment.

B.

An employer who installs data loss prevention software on all employee computers to limit transmission of confidential company information.

C.

An employer who installs video monitors in physical locations, such as a changing room, to reduce the risk of sexual harassment.

D.

An employer who records all employee phone calls that involve financial transactions with customers completed over the phone.

Full Access
Question # 8

In 2012, the White House and the FTC both issued reports advocating a new approach to privacy enforcement that can best be described as what?

A.

Harm-based.

B.

Self-regulatory.

C.

Comprehensive.

D.

Notice and choice.

Full Access
Question # 9

SCENARIO

Please use the following to answer the next QUESTION:

Cheryl is the sole owner of Fitness Coach, Inc., a medium-sized company that helps individuals realize their physical fitness goals through classes, individual instruction, and access to an extensive indoor gym. She has owned the company for ten years and has always been concerned about protecting customer’s privacy while maintaining the highest level of service. She is proud that she has built long-lasting customer relationships.

Although Cheryl and her staff have tried to make privacy protection a priority, the company has no formal privacy policy. So Cheryl hired Janice, a privacy professional, to help her develop one.

After an initial assessment, Janice created a first of a new policy. Cheryl read through the draft and was concerned about the many changes the policy would bring throughout the company. For example, the draft policy stipulates that a customer’s personal information can only be held for one year after paying for a service such as a session with personal trainer. It also promises that customer information will not be shared with third parties without the written consent of the customer. The wording of these rules worry Cheryl since stored personal information often helps her company to serve her customers, even if there are long pauses between their visits. In addition, there are some third parties that provide crucial services, such as aerobics instructors who teach classes on a contract basis. Having access to customer files and understanding the fitness levels of their students helps instructors to organize their classes.

Janice understood Cheryl’s concerns and was already formulating some ideas for revision. She tried to put Cheryl at ease by pointing out that customer data can still be kept, but that it should be classified according to levels of sensitivity. However, Cheryl was skeptical. It seemed that classifying data and treating each type differently would cause undue difficulties in the company’s day-to-day operations. Cheryl wants one simple data storage and access system that any employee can access if needed.

Even though the privacy policy was only a draft, she was beginning to see that changes within her company were going to be necessary. She told Janice that she would be more comfortable with implementing the new policy gradually over a period of several months, one department at a time. She was also interested in a layered approach by creating documents listing applicable parts of the new policy for each department.

What is the main problem with Cheryl’s suggested method of communicating the new privacy policy?

A.

The policy would not be considered valid if not communicated in full.

B.

The policy might not be implemented consistency across departments.

C.

Employees would not be comfortable with a policy that is put into action over time.

D.

Employees might not understand how the documents relate to the policy as a whole.

Full Access
Question # 10

The Video Privacy Protection Act of 1988 restricted which of the following?

A.

Which purchase records of audio visual materials may be disclosed

B.

When downloading of copyrighted audio visual materials is allowed

C.

When a user’s viewing of online video content can be monitored

D.

Who advertisements for videos and video games may target

Full Access
Question # 11

The “Consumer Privacy Bill of Rights” presented in a 2012 Obama administration report is generally based on?

A.

The 1974 Privacy Act

B.

Common law principles

C.

European Union Directive

D.

Traditional fair information practices

Full Access
Question # 12

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

A.

California.

B.

Texas.

C.

Illinois.

D.

Washington.

Full Access
Question # 13

A company’s employee wellness portal offers an app to track exercise activity via users’ mobile devices. Which of the following design techniques would most effectively inform users of their data privacy rights and privileges when using the app?

A.

Offer information about data collection and uses at key data entry points.

B.

Publish a privacy policy written in clear, concise, and understandable language.

C.

Present a privacy policy to users during the wellness program registration process.

D.

Provide a link to the wellness program privacy policy at the bottom of each screen.

Full Access
Question # 14

Which federal act does NOT contain provisions for preempting stricter state laws?

A.

The CAN-SPAM Act

B.

The Children’s Online Privacy Protection Act (COPPA)

C.

The Fair and Accurate Credit Transactions Act (FACTA)

D.

The Telemarketing Consumer Protection and Fraud Prevention Act

Full Access
Question # 15

Under the Driver’s Privacy Protection Act (DPPA), which of the following parties would require consent of an individual in order to obtain his or her Department of Motor Vehicle information?

A.

Law enforcement agencies performing investigations.

B.

Insurance companies needing to investigate claims.

C.

Attorneys gathering information related to lawsuits.

D.

Marketers wishing to distribute bulk materials.

Full Access
Question # 16

The FTC often negotiates consent decrees with companies found to be in violation of privacy principles. How does this benefit both parties involved?

A.

It standardizes the amount of fines.

B.

It simplifies the audit requirements.

C.

It avoids potentially harmful publicity.

D.

It spares the expense of going to trial.

Full Access
Question # 17

Which of the following practices is NOT a key component of a data ethics framework?

A.

Automated decision-making.

B.

Preferability testing.

C.

Data governance.

D.

Auditing.

Full Access
Question # 18

Which of the following federal agencies does NOT have regulatory authority related to privacy?

A.

Consumer Financial Protection Bureau.

B.

U.S. Department of Transportation.

C.

U.S. Department of Commerce.

D.

Federal Reserve

Full Access
Question # 19

What is an exception to the Electronic Communications Privacy Act of 1986 ban on interception of wire, oral and electronic communications?

A.

Where one of the parties has given consent

B.

Where state law permits such interception

C.

If an organization intercepts an employee’s purely personal call

D.

Only if all parties have given consent

Full Access
Question # 20

What practice do courts commonly require in order to protect certain personal information on documents, whether paper or electronic, that is involved in litigation?

A.

Redaction

B.

Encryption

C.

Deletion

D.

Hashing

Full Access
Question # 21

In what way is the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act intended to help consumers?

A.

By providing consumers with free spam-filtering software.

B.

By requiring a company to receive an opt-in before sending any advertising e-mails.

C.

By prohibiting companies from sending objectionable content through unsolicited e-mails.

D.

By requiring companies to allow consumers to opt-out of future e-mails.

Full Access
Question # 22

Which was NOT one of the five priority areas listed by the Federal Trade Commission in its 2012 report, “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers”?

A.

International data transfers

B.

Large platform providers

C.

Promoting enforceable self-regulatory codes

D.

Do Not Track

Full Access
Question # 23

Chanel Hair Studio is a busy high-end hair salon. In an effort to maximize efficiency of its operations and reduce wait times for appointments, Chanel decides to implement artificial intelligence software that will use client profiles and history to predict which clients will likely be late for their appointments. Information used to create the client profile included appointment history, distance from the salon, and any references to being tardy pulled from the client’s social media accounts. If a client is predicted to be late, their appointment will be cancelled within 5 minutes.

Based on the details, what is the biggest potential privacy concern related to Chanel’s use of this new software?

A.

Scanning a client’s social media accounts to use in a client profile without notice to the client.

B.

Calculating client profile address distance from the salon to determine location from salon to help predict if the client will be late.

C.

Using client profile information for any purpose other than setting up an appointment.

D.

Assessing client tardiness history with the salon for predictive purposes.

Full Access
Question # 24

In 2011, the FTC announced a settlement with Google regarding its social networking service Google Buzz. The FTC alleged that in the process of launching the service, the company did all of the following EXCEPT?

A.

Violated its own privacy policies.

B.

Engaged in deceptive trade practices.

C.

Failed to comply with Safe Harbor principles.

D.

Failed to employ sufficient security safeguards.

Full Access
Question # 25

What privacy concept grants a consumer the right to view and correct errors on his or her credit report?

A.

Access.

B.

Notice.

C.

Action.

D.

Choice.

Full Access
Question # 26

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

Based on the incident, the FTC’s enforcement actions against the marketer would most likely include what violation?

A.

Intruding upon the privacy of a family with young children.

B.

Collecting information from a child under the age of thirteen.

C.

Failing to notify of a breach of children’s private information.

D.

Disregarding the privacy policy of the children’s marketing industry.

Full Access
Question # 27

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portable hard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

What is the most likely way that Declan might directly violate the Health Insurance Portability and Accountability Act (HIPAA)?

A.

By being present when patients are checking in

B.

By speaking to a patient without prior authorization

C.

By ignoring the conversation about a potential breach

D.

By following through with his plans for his upcoming paper

Full Access
Question # 28

Which of the following best describes private-sector workplace monitoring in the United States?

A.

Employers have broad authority to monitor their employees

B.

U.S. federal law restricts monitoring only to industries for which it is necessary

C.

Judgments in private lawsuits have severely limited the monitoring of employees

D.

Most employees are protected from workplace monitoring by the U.S. Constitution

Full Access
Question # 29

The Family Educational Rights and Privacy Act (FERPA) requires schools to do all of the following EXCEPT?

A.

Verify the identity of students who make requests for access to their records.

B.

Provide students with access to their records within a specified amount of time.

C.

Respond to all reasonable student requests regarding explanation of their records.

D.

Obtain student authorization before releasing directory information in their records.

Full Access
Question # 30

Which of the following describes the most likely risk for a company developing a privacy policy with standards that are much higher than its competitors?

A.

Being more closely scrutinized for any breaches of policy

B.

Getting accused of discriminatory practices

C.

Attracting skepticism from auditors

D.

Having a security system failure

Full Access
Question # 31

Which of these organizations would be required to provide its customers with an annual privacy notice?

A.

The Four Winds Tribal College.

B.

The Golden Gavel Auction House.

C.

The King County Savings and Loan.

D.

The Breezy City Housing Commission.

Full Access
Question # 32

The rules for “e-discovery” mainly prevent which of the following?

A.

A conflict between business practice and technological safeguards

B.

The loss of information due to poor data retention practices

C.

The practice of employees using personal devices for work

D.

A breach of an organization’s data retention program

Full Access
Question # 33

Read this notice:

Our website uses cookies. Cookies allow us to identify the computer or device you’re using to access the site, but they don’t identify you personally. For instructions on setting your Web browser to refuse cookies, click here.

What type of legal choice does not notice provide?

A.

Mandatory

B.

Implied consent

C.

Opt-in

D.

Opt-out

Full Access
Question # 34

What is a key way that the Gramm-Leach-Bliley Act (GLBA) prevents unauthorized access into a person’s back account?

A.

By requiring immediate public disclosure after a suspected security breach.

B.

By requiring the amount of customer personal information printed on paper.

C.

By requiring the financial institutions limit the collection of personal information.

D.

By restricting the disclosure of customer account numbers by financial institutions.

Full Access
Question # 35

Which of the following types of information would an organization generally NOT be required to disclose to law enforcement?

A.

Information about medication errors under the Food, Drug and Cosmetic Act

B.

Money laundering information under the Bank Secrecy Act of 1970

C.

Information about workspace injuries under OSHA requirements

D.

Personal health information under the HIPAA Privacy Rule

Full Access
Question # 36

All of the following common law torts are relevant to employee privacy under US law EXCEPT?

A.

Infliction of emotional distress.

B.

Intrusion upon seclusion.

C.

Defamation

D.

Conversion.

Full Access
Question # 37

Which of the following became the first state to pass a law specifically regulating the practices of data brokers?

A.

Washington.

B.

California.

C.

New York.

D.

Vermont.

Full Access
Question # 38

The U.S. Supreme Court has recognized an individual’s right to privacy over personal issues, such as contraception, by acknowledging which of the following?

A.

Federal preemption of state constitutions that expressly recognize an individual right to privacy.

B.

A “penumbra” of unenumerated constitutional rights as well as more general protections of due process of law.

C.

An interpretation of the U.S. Constitution’s explicit definition of privacy that extends to personal issues.

D.

The doctrine of stare decisis, which allows the U.S. Supreme Court to follow the precedent of previously decided case law.

Full Access
Question # 39

SCENARIO

Please use the following to answer the next QUESTION:

Matt went into his son’s bedroom one evening and found him stretched out on his bed typing on his laptop. “Doing your network?” Matt asked hopefully.

“No,” the boy said. “I’m filling out a survey.”

Matt looked over his son’s shoulder at his computer screen. “What kind of survey?” “It’s asking Questions about my opinions.”

“Let me see,” Matt said, and began reading the list of Questions that his son had already answered. “It’s asking your opinions about the government and citizenship. That’s a little odd. You’re only ten.”

Matt wondered how the web link to the survey had ended up in his son’s email inbox. Thinking the message might have been sent to his son by mistake he opened it and read it. It had come from an entity called the Leadership Project, and the content and the graphics indicated that it was intended for children. As Matt read further he learned that kids who took the survey were automatically registered in a contest to win the first book in a series about famous leaders.

To Matt, this clearly seemed like a marketing ploy to solicit goods and services to children. He asked his son if he had been prompted to give information about himself in order to take the survey. His son told him he had been asked to give his name, address, telephone number, and date of birth, and to answer Questions about his favorite games and toys.

Matt was concerned. He doubted if it was legal for the marketer to collect information from his son in the way that it was. Then he noticed several other commercial emails from marketers advertising products for children in his son’s inbox, and he decided it was time to report the incident to the proper authorities.

How could the marketer have best changed its privacy management program to meet COPPA “Safe Harbor” requirements?

A.

By receiving FTC approval for the content of its emails

B.

By making a COPPA privacy notice available on website

C.

By participating in an approved self-regulatory program

D.

By regularly assessing the security risks to consumer privacy

Full Access
Question # 40

Which statement is FALSE regarding the provisions of the Employee Polygraph Protection Act of 1988 (EPPA)?

A.

The EPPA requires that employers post essential information about the Act in a conspicuous location.

B.

The EPPA includes an exception that allows polygraph tests in professions in which employee honesty is necessary for public safety.

C.

Employers are prohibited from administering psychological testing based on personality traits such as honesty, preferences or habits.

D.

Employers involved in the manufacture of controlled substances may terminate employees based on polygraph results if other evidence exists.

Full Access
Question # 41

A company based in United States receives information about its UK subsidiary’s employees in connection with the centralized HR service it provides.

How can the UK company ensure an adequate level of data protection that would allow the restricted data transfer to continue?

A.

By signing up to an approved code of conduct under UK GDPR to demonstrate compliance with its requirements, both for the parent and the subsidiary companies.

B.

By revising the contract with the United States parent company incorporating EU SCCs, as it continues to be valid for restricted transfers under the UK regime.

C.

By submitting to the ICO a new application for the UK BCRs using the UK BCR application forms, as their existing authorized EU BCRs are not recognized.

D.

By allowing each employee the option to opt-out to the restricted transfer, as it is necessary to send their names in order to book the sales bonuses.

Full Access
Question # 42

Which of the following is NOT one of three broad categories of products offered by data brokers, as identified by the U.S. Federal Trade Commission (FTC)?

A.

Research (such as information for understanding consumer trends).

B.

Risk mitigation (such as information that may reduce the risk of fraud).

C.

Location of individuals (such as identifying an individual from partial information).

D.

Marketing (such as appending data to customer information that a marketing company already has).

Full Access
Question # 43

SCENARIO

Please use the following to answer the next QUESTION

When there was a data breach involving customer personal and financial information at a large retail store, the company’s directors were shocked. However, Roberta, a privacy analyst at the company and a victim of identity theft herself, was not. Prior to the breach, she had been working on a privacy program report for the executives. How the company shared and handled data across its organization was a major concern. There were neither adequate rules about access to customer information nor

procedures for purging and destroying outdated data. In her research, Roberta had discovered that even low- level employees had access to all of the company’s customer data, including financial records, and that the company still had in its possession obsolete customer data going back to the 1980s.

Her report recommended three main reforms. First, permit access on an as-needs-to-know basis. This would mean restricting employees’ access to customer information to data that was relevant to the work performed. Second, create a highly secure database for storing customers’ financial information (e.g., credit card and bank account numbers) separate from less sensitive information. Third, identify outdated customer information and then develop a process for securely disposing of it.

When the breach occurred, the company’s executives called Roberta to a meeting where she presented the recommendations in her report. She explained that the company having a national customer base meant it would have to ensure that it complied with all relevant state breach notification laws. Thanks to Roberta’s guidance, the company was able to notify customers quickly and within the specific timeframes set by state breach notification laws.

Soon after, the executives approved the changes to the privacy program that Roberta recommended in her report. The privacy program is far more effective now because of these changes and, also, because privacy and security are now considered the responsibility of every employee.

Which principle of the Consumer Privacy Bill of Rights, if adopted, would best reform the company’s privacy program?

A.

Consumers have a right to exercise control over how companies use their personal data.

B.

Consumers have a right to reasonable limits on the personal data that a company retains.

C.

Consumers have a right to easily accessible information about privacy and security practices.

D.

Consumers have a right to correct personal data in a manner that is appropriate to the sensitivity.

Full Access
Question # 44

SCENARIO

Please use the following to answer the next QUESTION:

Declan has just started a job as a nursing assistant in a radiology department at Woodland Hospital. He has also started a program to become a registered nurse.

Before taking this career path, Declan was vaguely familiar with the Health Insurance Portability and Accountability Act (HIPAA). He now knows that he must help ensure the security of his patients’ Protected Health Information (PHI). Therefore, he is thinking carefully about privacy issues.

On the morning of his first day, Declan noticed that the newly hired receptionist handed each patient a HIPAA privacy notice. He wondered if it was necessary to give these privacy notices to returning patients, and if the radiology department could reduce paper waste through a system of one-time distribution.

He was also curious about the hospital’s use of a billing company. He Questioned whether the hospital was doing all it could to protect the privacy of its patients if the billing company had details about patients’ care.

On his first day Declan became familiar with all areas of the hospital’s large radiology department. As he was organizing equipment left in the halfway, he overheard a conversation between two hospital administrators. He was surprised to hear that a portablehard drive containing non-encrypted patient information was missing. The administrators expressed relief that the hospital would be able to avoid liability. Declan was surprised, and wondered whether the hospital had plans to properly report what had happened.

Despite Declan’s concern about this issue, he was amazed by the hospital’s effort to integrate Electronic Health Records (EHRs) into the everyday care of patients. He thought about the potential for streamlining care even more if they were accessible to all medical facilities nationwide.

Declan had many positive interactions with patients. At the end of his first day, he spoke to one patient, John, whose father had just been diagnosed with a degenerative muscular disease. John was about to get blood work done, and he feared that the blood work could reveal a genetic predisposition to the disease that could affect his ability to obtain insurance coverage. Declan told John that he did not think that was possible, but the patient was wheeled away before he could explain why. John plans to ask a colleague about this.

In one month, Declan has a paper due for one his classes on a health topic of his choice. By then, he will have had many interactions with patients he can use as examples. He will be pleased to give credit to John by name for inspiring him to think more carefully about genetic testing.

Although Declan’s day ended with many Questions, he was pleased about his new position.

Based on the scenario, what is the most likely way Declan’s supervisor would answer his question about the hospital’s use of a billing company?

A.

By suggesting that Declan look at the hospital’s publicly posted privacy policy

B.

By assuring Declan that third parties are prevented from seeing Private Health Information (PHI)

C.

By pointing out that contracts are in place to help ensure the observance of minimum security standards

D.

By describing how the billing system is integrated into the hospital’s electronic health records (EHR) system

Full Access
Question # 45

Under the Fair and Accurate Credit Transactions Act (FACTA), what is the most appropriate action for a car dealer holding a paper folder of customer credit reports?

A.

To follow the Disposal Rule by having the reports shredded

B.

To follow the Red Flags Rule by mailing the reports to customers

C.

To follow the Privacy Rule by notifying customers that the reports are being stored

D.

To follow the Safeguards Rule by transferring the reports to a secure electronic file

Full Access
Question # 46

A financial services company install "bossware" software on its employees' remote computers to monitor performance. The software logs screenshots, mouse movements, and keystrokes to determine whether an employee is being productive. The software can also enable the computer webcams to record video footage.

Which of the following would best support an employee claim for an intrusion upon seclusion tort?

A.

The webcam is enabled to record video any time the computer is turned on.

B.

The company creates and saves a biometric template for each employee based upon keystroke dynamics.

C.

The software automatically sends a notification to a supervisor any time the employee's mouse is dormant for more than five minutes.

D.

The webcam records video of an employee using a company laptop to perform personal business while at a coffee shop during work hours.

Full Access
Question # 47

California’s SB 1386 was the first law of its type in the United States to do what?

A.

Require commercial entities to disclose a security data breach concerning personal information about the state’s residents

B.

Require notification of non-California residents of a breach that occurred in California

C.

Require encryption of sensitive information stored on servers that are Internet connected

D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

Full Access
Question # 48

What is the main challenge financial institutions face when managing user preferences?

A.

Ensuring they are in compliance with numerous complex state and federal privacy laws

B.

Developing a mechanism for opting out that is easy for their consumers to navigate

C.

Ensuring that preferences are applied consistently across channels and platforms

D.

Determining the legal requirements for sharing preferences with their affiliates

Full Access
Question # 49

SCENARIO

Please use the following to answer the next QUESTION

Otto is preparing a report to his Board of Directors at Filtration Station, where he is responsible for the privacy program. Filtration Station is a U.S. company that sells filters and tubing products to pharmaceutical companies for research use. The company is based in Seattle, Washington, with offices throughout the U.S. and Asia. It sells to business customers across both the U.S. and the Asia-Pacific region. Filtration Station participates in the Cross-Border Privacy Rules system of the APEC Privacy Framework.

Unfortunately, Filtration Station suffered a data breach in the previous quarter. An unknown third party was able to gain access to Filtration Station’s network and was able to steal data relating to employees in the company’s Human Resources database, which is hosted by a third-party cloud provider based in the U.S. The HR data is encrypted. Filtration Station also uses the third-party cloud provider to host its business marketing contact database. The marketing database was not affected by the data breach. It appears that the data breach was caused when a system administrator at the cloud provider stored the encryption keys with the data itself.

The Board has asked Otto to provide information about the data breach and how updates on new developments in privacy laws and regulations apply to Filtration Station. They are particularly concerned about staying up to date on the various U.S. state laws and regulations that have been in the news, especially the California Consumer Privacy Act (CCPA) and breach notification requirements.

What can Otto do to most effectively minimize the privacy risks involved in using a cloud provider for the HR data?

A.

Request that the Board sign off in a written document on the choice of cloud provider.

B.

Ensure that the cloud provider abides by the contractual requirements by conducting an on-site audit.

C.

Obtain express consent from employees for storing the HR data in the cloud and keep a record of the employee consents.

D.

Negotiate a Business Associate Agreement with the cloud provider to protect any health-related data employees might share with Filtration Station.

Full Access
Question # 50

A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?

A.

Department of Health and Human Services

B.

The affected individuals

C.

The local media

D.

Medical providers

Full Access