Next Question >>

Question 1/48

SCENARIO
Please use the following to answer the next QUESTION:
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the Society's store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the "misunderstanding" has not occurred again.
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters, however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues of sales of items such as shirts and coffee cups from the store have been significant. The Society's operating budget is slim, and all sources of revenue are essential.
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data cloud. "The good news," he says, "is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a small charge to pass through to you, it won't be exorbitant, especially considering the advantages of a cloud." Lately, you have been hearing about cloud computing and you know it's fast becoming the new paradigm for various applications. However, you have heard mixed reviews about the potential impacts on privacy protection. You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared conventions and technologies for privacy protection. You make a note to find out if Jason's Finnish provider is signing on.
What process can best answer your Questions about the vendor's data security safeguards?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (48q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Which of the following is TRUE about a PIA (Privacy Impact A...
Question 3: In which situation would a Privacy Impact Assessment (PIA) b...
Question 4: A Human Resources director at a company reported that a lapt...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: An executive for a multinational online retail company in th...
Question 7: Under which circumstances would people who work in human res...
Question 8: SCENARIO Please use the following to answer the next QUESTIO...
Question 9: SCENARIO Please use the following to answer the next QUESTIO...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: What is the main reason to begin with 3-5 key metrics during...
Question 12: SCENARIO Please use the following to answer the next QUESTIO...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Why were the nongovernmental privacy organizations, Electron...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: Rationalizing requirements in order to comply with the vario...
Question 17: Which of the following is NOT typically a function of a Priv...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: Which of the following indicates you have developed the righ...
Question 22: What is one reason the European Union has enacted more compr...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: Which is the best way to view an organization's privacy fram...
Question 26: Which is NOT an influence on the privacy environment externa...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: SCENARIO Please use the following to answer the next QUESTIO...
Question 30: As a Data Protection Officer, one of your roles entails moni...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is the main purpose of a privacy program audit?...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is the function of the privacy operational life cycle?...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: All of the following changes will likely trigger a data inve...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: SCENARIO Please use the following to answer the next QUESTIO...
Question 41: Which of the following is an example of Privacy by Design (P...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: Which of the following controls does the PCI DSS framework N...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: Which is TRUE about the scope and authority of data protecti...
Question 46: Under the General Data Protection Regulation (GDPR), which s...
Question 47: Which of the following is TRUE about the Data Protection Imp...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...