<< Prev Question Next Question >>

Question 9/48

SCENARIO
Please use the following to answer the next QUESTION:
As the Director of data protection for Consolidated Records Corporation, you are justifiably pleased with your accomplishments so far. Your hiring was precipitated by warnings from regulatory agencies following a series of relatively minor data breaches that could easily have been worse. However, you have not had a reportable incident for the three years that you have been with the company. In fact, you consider your program a model that others in the data storage industry may note in their own program development.
You started the program at Consolidated from a jumbled mix of policies and procedures and worked toward coherence across departments and throughout operations. You were aided along the way by the program's sponsor, the vice president of operations, as well as by a Privacy Team that started from a clear understanding of the need for change.
Initially, your work was greeted with little confidence or enthusiasm by the company's "old guard" among both the executive team and frontline personnel working with data and interfacing with clients. Through the use of metrics that showed the costs not only of the breaches that had occurred, but also projections of the costs that easily could occur given the current state of operations, you soon had the leaders and key decision-makers largely on your side. Many of the other employees were more resistant, but face-to-face meetings with each department and the development of a baseline privacy training program achieved sufficient "buy-in" to begin putting the proper procedures into place.
Now, privacy protection is an accepted component of all current operations involving personal or protected data and must be part of the end product of any process of technological development. While your approach is not systematic, it is fairly effective.
You are left contemplating:
What must be done to maintain the program and develop it beyond just a data breach prevention program?
How can you build on your success?
What are the next action steps?
Which of the following would be most effectively used as a guide to a systems approach to implementing data protection?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (48q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Which of the following is TRUE about a PIA (Privacy Impact A...
Question 3: In which situation would a Privacy Impact Assessment (PIA) b...
Question 4: A Human Resources director at a company reported that a lapt...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: An executive for a multinational online retail company in th...
Question 7: Under which circumstances would people who work in human res...
Question 8: SCENARIO Please use the following to answer the next QUESTIO...
Question 9: SCENARIO Please use the following to answer the next QUESTIO...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: What is the main reason to begin with 3-5 key metrics during...
Question 12: SCENARIO Please use the following to answer the next QUESTIO...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Why were the nongovernmental privacy organizations, Electron...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: Rationalizing requirements in order to comply with the vario...
Question 17: Which of the following is NOT typically a function of a Priv...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: Which of the following indicates you have developed the righ...
Question 22: What is one reason the European Union has enacted more compr...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: Which is the best way to view an organization's privacy fram...
Question 26: Which is NOT an influence on the privacy environment externa...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: SCENARIO Please use the following to answer the next QUESTIO...
Question 30: As a Data Protection Officer, one of your roles entails moni...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is the main purpose of a privacy program audit?...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is the function of the privacy operational life cycle?...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: All of the following changes will likely trigger a data inve...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: SCENARIO Please use the following to answer the next QUESTIO...
Question 41: Which of the following is an example of Privacy by Design (P...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: Which of the following controls does the PCI DSS framework N...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: Which is TRUE about the scope and authority of data protecti...
Question 46: Under the General Data Protection Regulation (GDPR), which s...
Question 47: Which of the following is TRUE about the Data Protection Imp...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...