<< Prev Question Next Question >>

Question 45/89

SCENARIO
Please use the following to answer the next QUESTION:
As they company's new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically Questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the target of credit card data theft that made headlines around the world, as at least two million credit card numbers were thought to have been pilfered despite the company's claims that "appropriate" data protection safeguards were in place. The scandal affected the company's business as competitors were quick to market an increased level of protection while offering similar entertainment and media content. Within three weeks after the scandal broke, Hoopy founder and CEO Maxwell Martin, Goddard's mentor, was forced to step down.
Goddard, however, seems to have landed on his feet, securing the CEO position at your company, Medialite, which is just emerging from its start-up phase. He sold the company's board and investors on his vision of Medialite building its brand partly on the basis of industry-leading data protection standards and procedures. He may have been a key part of a lapsed or even rogue organization in matters of privacy but now he claims to be reformed and a true believer in privacy protection. In his first week on the job, he calls you into his office and explains that your primary work responsibility is to bring his vision for privacy to life. But you also detect some reservations. "We want Medialite to have absolutely the highest standards," he says. "In fact, I want us to be able to say that we are the clear industry leader in privacy and data protection. However, I also need to be a responsible steward of the company's finances. So, while I want the best solutions across the board, they also need to be cost effective." You are told to report back in a week's time with your recommendations. Charged with this ambiguous mission, you depart the executive suite, already considering your next steps.
What metric can Goddard use to assess whether costs associated with implementing new privacy protections are justified?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (89q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: SCENARIO Please use the following to answer the next questio...
Question 4: SCENARIO Please use the following to answer the next questio...
Question 5: What is the name for the privacy strategy model that describ...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What is the key factor that lays the foundation for all othe...
Question 9: An executive for a multinational online retail company in th...
Question 10: SCENARIO Please use the following to answer the next questio...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: SCENARIO Please use the following to answer the next questio...
Question 13: Data retention and destruction policies should meet all of t...
Question 14: SCENARIO Please use the following to answer the next QUESTIO...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: SCENARIO Please use the following to answer the next questio...
Question 17: You would like your organization to be independently audited...
Question 18: Which of the following is TRUE about the Data Protection Imp...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next questio...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: SCENARIO Please use the following to answer the next questio...
Question 26: SCENARIO Please use the following to answer the next questio...
1 commentQuestion 27: In regards to the collection of personal data conducted by a...
1 commentQuestion 28: SCENARIO Please use the following to answer the next QUESTIO...
9 commentQuestion 29: Which is the best way to view an organization's privacy fram...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next questio...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next questio...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next questio...
Question 36: SCENARIO Please use the following to answer the next questio...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next questio...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: Which term describes a piece of personal data that alone may...
Question 41: Which will best assist you in quickly identifying weaknesses...
Question 42: A systems audit uncovered a shared drive folder containing s...
Question 43: All of the following changes will likely trigger a data inve...
Question 44: An organization's business continuity plan or disaster recov...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next questio...
Question 48: SCENARIO Please use the following to answer the next questio...
Question 49: Which is NOT an influence on the privacy environment externa...
Question 50: SCENARIO Please use the following to answer the next questio...
Question 51: SCENARIO Please use the following to answer the next questio...
Question 52: "Collection," "access" and "destruction" are aspects of what...
Question 53: In a sample metric template, what does "target" mean?...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: You would like to better understand how your organization ca...
Question 57: SCENARIO Please use the following to answer the next QUESTIO...
Question 58: Which of the following is NOT a type of privacy program metr...
Question 59: SCENARIO Please use the following to answer the next questio...
Question 60: SCENARIO Please use the following to answer the next QUESTIO...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: SCENARIO Please use the following to answer the next QUESTIO...
Question 63: SCENARIO Please use the following to answer the next QUESTIO...
Question 64: When supporting the business and data privacy program expand...
Question 65: When building a data privacy program, what is a good startin...
Question 66: The General Data Protection Regulation (GDPR) specifies fine...
Question 67: What is one obligation that the General Data Protection Regu...
Question 68: What is the main purpose in notifying data subjects of a dat...
Question 69: While trying to e-mail her manager, an employee has e-mailed...
Question 70: If your organization has a recurring issue with colleagues n...
1 commentQuestion 71: Under the General Data Protection Regulation (GDPR), when wo...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: SCENARIO Please use the following to answer the next questio...
Question 74: Which of the following indicates you have developed the righ...
1 commentQuestion 75: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 76: Which statement is FALSE regarding the use of technical secu...
Question 77: If done correctly, how can a Data Protection Impact Assessme...
Question 78: For an organization that has just experienced a data breach,...
Question 79: SCENARIO Please use the following to answer the next QUESTIO...
Question 80: What have experts identified as an important trend in privac...
Question 81: SCENARIO Please use the following to answer the next QUESTIO...
Question 82: SCENARIO Please use the following to answer the next questio...
Question 83: There are different forms of monitoring available for organi...
Question 84: An organization is establishing a mission statement for its ...
Question 85: SCENARIO Please use the following to answer the next QUESTIO...
Question 86: SCENARIO Please use the following to answer the next QUESTIO...
Question 87: In addition to regulatory requirements and business practice...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: SCENARIO Please use the following to answer the next QUESTIO...