<< Prev Question Next Question >>

Question 20/56

SCENARIO
Please use the following to answer the next QUESTION:
Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.
This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them." Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!" Which is the best first step in understanding the data security practices of a potential vendor?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: In a sample metric template, what does "target" mean?...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: What is most critical when outsourcing data destruction serv...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: The General Data Protection Regulation (GDPR) specifies fine...
Question 9: What should a privacy professional keep in mind when selecti...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: An executive for a multinational online retail company in th...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Which is TRUE about the scope and authority of data protecti...
Question 15: What are you doing if you succumb to "overgeneralization" wh...
Question 16: SCENARIO Please use the following to answer the next QUESTIO...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: What does it mean to "rationalize" data protection requireme...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: What is the function of the privacy operational life cycle?...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: Under the General Data Protection Regulation (GDPR), when wo...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: What is a key feature of the privacy metric template adapted...
Question 26: Incipia Corporation just trained the last of its 300 employe...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: Under the General Data Protection Regulation (GDPR), which s...
Question 30: In privacy protection, what is a "covered entity"?...
Question 31: If an organization maintains a separate ethics office, to wh...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is one reason the European Union has enacted more compr...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: Under the General Data Protection Regulation (GDPR), which o...
Question 37: Which of the following is NOT an important factor to conside...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: Which of the following controls does the PCI DSS framework N...
Question 40: When implementing Privacy by Design (PbD), what would NOT be...
Question 41: Which of the following indicates you have developed the righ...
Question 42: In addition to regulatory requirements and business practice...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next QUESTIO...
Question 48: What is the main function of the Asia-Pacific Economic Coope...
Question 49: There are different forms of monitoring available for organi...
Question 50: SCENARIO Please use the following to answer the next QUESTIO...
Question 51: An organization's privacy officer was just notified by the b...
Question 52: Which of the following privacy frameworks are legally bindin...
Question 53: SCENARIO Please use the following to answer the next QUESTIO...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
Question 55: Which of the following best supports implementing controls t...
Question 56: SCENARIO Please use the following to answer the next QUESTIO...