<< Prev Question Next Question >>

Question 27/31

SCENARIO
Please use the following to answer the next question:
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the Society's store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the "misunderstanding" has not occurred again.
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters, however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues of sales of items such as shirts and coffee cups from the store have been significant. The Society's operating budget is slim, and all sources of revenue are essential.
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data cloud. "The good news," he says, "is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a small charge to pass through to you, it won't be exorbitant, especially considering the advantages of a cloud." Lately, you have been hearing about cloud computing and you know it's fast becoming the new paradigm for various applications. However, you have heard mixed reviews about the potential impacts on privacy protection. You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared conventions and technologies for privacy protection. You make a note to find out if Jason's Finnish provider is signing on.
What is the best way to prevent the Finnish vendor from transferring data to another party?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (31q)
Question 1: An organization's privacy officer was just notified by the b...
Question 2: What is one reason the European Union has enacted more compr...
Question 3: SCENARIO Please use the following to answer the next questio...
Question 4: SCENARIO Please use the following to answer the next questio...
Question 5: Under the General Data Protection Regulation (GDPR), which o...
Question 6: SCENARIO Please use the following to answer the next questio...
Question 7: SCENARIO Please use the following to answer the next questio...
Question 8: SCENARIO Please use the following to answer the next questio...
Question 9: The General Data Protection Regulation (GDPR) specifies fine...
Question 10: All of the following changes will likely trigger a data inve...
Question 11: SCENARIO Please use the following to answer the next questio...
Question 12: "Collection," "access" and "destruction" are aspects of what...
Question 13: What are you doing if you succumb to "overgeneralization" wh...
Question 14: In addition to regulatory requirements and business practice...
Question 15: SCENARIO Please use the following to answer the next questio...
Question 16: How are individual program needs and specific organizational...
Question 17: Which term describes a piece of personal data that alone may...
Question 18: SCENARIO Please use the following to answer the next questio...
Question 19: SCENARIO Please use the following to answer the next questio...
Question 20: Which statement is FALSE regarding the use of technical secu...
1 commentQuestion 21: SCENARIO Please use the following to answer the next questio...
Question 22: SCENARIO Please use the following to answer the next questio...
Question 23: If an organization maintains a separate ethics office, to wh...
Question 24: SCENARIO Please use the following to answer the next questio...
Question 25: An organization is establishing a mission statement for its ...
Question 26: Under the General Data Protection Regulation (GDPR), which s...
Question 27: SCENARIO Please use the following to answer the next questio...
Question 28: SCENARIO Please use the following to answer the next questio...
Question 29: SCENARIO Please use the following to answer the next questio...
Question 30: SCENARIO Please use the following to answer the next questio...
Question 31: Which is NOT an influence on the privacy environment externa...