<< Prev Question Next Question >>

Question 6/56

SCENARIO
Please use the following to answer the next QUESTION:
It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It's a great deal, and after a month, more than half the organization's employees have signed on and acquired new laptops. Walking through the facility, you see them happily customizing and comparing notes on their new computers, and at the end of the day, most take their laptops with them, potentially carrying personal data to their homes or other unknown locations. It's enough to give you data- protection nightmares, and you've pointed out to the information technology Director and many others in the organization the potential hazards of this new practice, including the inevitability of eventual data loss or theft.
Today you have in your office a representative of the organization's marketing department who shares with you, reluctantly, a story with potentially serious consequences. The night before, straight from work, with laptop in hand, he went to the Bull and Horn Pub to play billiards with his friends. A fine night of sport and socializing began, with the laptop "safely" tucked on a bench, beneath his jacket. Later that night, when it was time to depart, he retrieved the jacket, but the laptop was gone. It was not beneath the bench or on another bench nearby. The waitstaff had not seen it. His friends were not playing a joke on him. After a sleepless night, he confirmed it this morning, stopping by the pub to talk to the cleanup crew. They had not found it. The laptop was missing. Stolen, it seems. He looks at you, embarrassed and upset.
You ask him if the laptop contains any personal data from clients, and, sadly, he nods his head, yes. He believes it contains files on about 100 clients, including names, addresses and governmental identification numbers. He sighs and places his head in his hands in despair.
In order to determine the best course of action, how should this incident most productively be viewed?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: In a sample metric template, what does "target" mean?...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: What is most critical when outsourcing data destruction serv...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: The General Data Protection Regulation (GDPR) specifies fine...
Question 9: What should a privacy professional keep in mind when selecti...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: An executive for a multinational online retail company in th...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Which is TRUE about the scope and authority of data protecti...
Question 15: What are you doing if you succumb to "overgeneralization" wh...
Question 16: SCENARIO Please use the following to answer the next QUESTIO...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: What does it mean to "rationalize" data protection requireme...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: What is the function of the privacy operational life cycle?...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: Under the General Data Protection Regulation (GDPR), when wo...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: What is a key feature of the privacy metric template adapted...
Question 26: Incipia Corporation just trained the last of its 300 employe...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: Under the General Data Protection Regulation (GDPR), which s...
Question 30: In privacy protection, what is a "covered entity"?...
Question 31: If an organization maintains a separate ethics office, to wh...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is one reason the European Union has enacted more compr...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: Under the General Data Protection Regulation (GDPR), which o...
Question 37: Which of the following is NOT an important factor to conside...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: Which of the following controls does the PCI DSS framework N...
Question 40: When implementing Privacy by Design (PbD), what would NOT be...
Question 41: Which of the following indicates you have developed the righ...
Question 42: In addition to regulatory requirements and business practice...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next QUESTIO...
Question 48: What is the main function of the Asia-Pacific Economic Coope...
Question 49: There are different forms of monitoring available for organi...
Question 50: SCENARIO Please use the following to answer the next QUESTIO...
Question 51: An organization's privacy officer was just notified by the b...
Question 52: Which of the following privacy frameworks are legally bindin...
Question 53: SCENARIO Please use the following to answer the next QUESTIO...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
Question 55: Which of the following best supports implementing controls t...
Question 56: SCENARIO Please use the following to answer the next QUESTIO...