<< Prev Question Next Question >>

Question 45/56

SCENARIO
Please use the following to answer the next QUESTION:
Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information used fraudulently subsequent to transactions on your site, but in neither case did the investigation reveal with certainty that the Society's store had been hacked. The thefts could have been employee-related.
Just as disconcerting was an incident where the organization discovered that SCS had sold information it had collected from customers to third parties. However, as Jason Roland, your SCS account representative, points out, it took only a phone call from you to clarify expectations and the "misunderstanding" has not occurred again.
As an information-technology program manager with the Society, the role of the privacy professional is only one of many you play. In all matters, however, you must consider the financial bottom line. While these problems with privacy protection have been significant, the additional revenues of sales of items such as shirts and coffee cups from the store have been significant. The Society's operating budget is slim, and all sources of revenue are essential.
Now a new challenge has arisen. Jason called to say that starting in two weeks, the customer data from the store would now be stored on a data cloud. "The good news," he says, "is that we have found a low-cost provider in Finland, where the data would also be held. So, while there may be a small charge to pass through to you, it won't be exorbitant, especially considering the advantages of a cloud." Lately, you have been hearing about cloud computing and you know it's fast becoming the new paradigm for various applications. However, you have heard mixed reviews about the potential impacts on privacy protection. You begin to research and discover that a number of the leading cloud service providers have signed a letter of intent to work together on shared conventions and technologies for privacy protection. You make a note to find out if Jason's Finnish provider is signing on.
What process can best answer your Questions about the vendor's data security safeguards?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: In a sample metric template, what does "target" mean?...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: What is most critical when outsourcing data destruction serv...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: The General Data Protection Regulation (GDPR) specifies fine...
Question 9: What should a privacy professional keep in mind when selecti...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: An executive for a multinational online retail company in th...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Which is TRUE about the scope and authority of data protecti...
Question 15: What are you doing if you succumb to "overgeneralization" wh...
Question 16: SCENARIO Please use the following to answer the next QUESTIO...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: What does it mean to "rationalize" data protection requireme...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: What is the function of the privacy operational life cycle?...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: Under the General Data Protection Regulation (GDPR), when wo...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: What is a key feature of the privacy metric template adapted...
Question 26: Incipia Corporation just trained the last of its 300 employe...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: Under the General Data Protection Regulation (GDPR), which s...
Question 30: In privacy protection, what is a "covered entity"?...
Question 31: If an organization maintains a separate ethics office, to wh...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is one reason the European Union has enacted more compr...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: Under the General Data Protection Regulation (GDPR), which o...
Question 37: Which of the following is NOT an important factor to conside...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: Which of the following controls does the PCI DSS framework N...
Question 40: When implementing Privacy by Design (PbD), what would NOT be...
Question 41: Which of the following indicates you have developed the righ...
Question 42: In addition to regulatory requirements and business practice...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next QUESTIO...
Question 48: What is the main function of the Asia-Pacific Economic Coope...
Question 49: There are different forms of monitoring available for organi...
Question 50: SCENARIO Please use the following to answer the next QUESTIO...
Question 51: An organization's privacy officer was just notified by the b...
Question 52: Which of the following privacy frameworks are legally bindin...
Question 53: SCENARIO Please use the following to answer the next QUESTIO...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
Question 55: Which of the following best supports implementing controls t...
Question 56: SCENARIO Please use the following to answer the next QUESTIO...