<< Prev Question Next Question >>

Question 82/89

SCENARIO
Please use the following to answer the next question:
Martin Briseno is the director of human resources at the Canyon City location of the U.S. hotel chain Pacific Suites. In 1998, Briseno decided to change the hotel's on-the-job mentoring model to a standardized training program for employees who were progressing from line positions into supervisory positions. He developed a curriculum comprising a series of lessons, scenarios, and assessments, which was delivered in-person to small groups. Interest in the training increased, leading Briseno to work with corporate HR specialists and software engineers to offer the program in an online format. The online program saved the cost of a trainer and allowed participants to work through the material at their own pace.
Upon hearing about the success of Briseno's program, Pacific Suites corporate Vice President Maryanne Silva-Hayes expanded the training and offered it company-wide. Employees who completed the program received certification as a Pacific Suites Hospitality Supervisor. By 2001, the program had grown to provide industry-wide training. Personnel at hotels across the country could sign up and pay to take the course online.
As the program became increasingly profitable, Pacific Suites developed an offshoot business, Pacific Hospitality Training (PHT). The sole focus of PHT was developing and marketing a variety of online courses and course progressions providing a number of professional certifications in the hospitality industry.
By setting up a user account with PHT, course participants could access an information library, sign up for courses, and take end-of-course certification tests. When a user opened a new account, all information was saved by default, including the user's name, date of birth, contact information, credit card information, employer, and job title. The registration page offered an opt-out choice that users could click to not have their credit card numbers saved. Once a user name and password were established, users could return to check their course status, review and reprint their certifications, and sign up and pay for new courses. Between 2002 and
2008, PHT issued more than 700,000 professional certifications.
PHT's profits declined in 2009 and 2010, the victim of industry downsizing and increased competition from e- learning providers. By 2011, Pacific Suites was out of the online certification business and PHT was dissolved.
The training program's systems and records remained in Pacific Suites' digital archives, un-accessed and unused. Briseno and Silva-Hayes moved on to work for other companies, and there was no plan for handling the archived data after the program ended. After PHT was dissolved, Pacific Suites executives turned their attention to crucial day-to-day operations. They planned to deal with the PHT materials once resources allowed.
In 2012, the Pacific Suites computer network was hacked. Malware installed on the online reservation system exposed the credit card information of hundreds of hotel guests. While targeting the financial data on the reservation site, hackers also discovered the archived training course data and registration accounts of Pacific Hospitality Training's customers. The result of the hack was the exfiltration of the credit card numbers of recent hotel guests and the exfiltration of the PHT database with all its contents.
A Pacific Suites systems analyst discovered the information security breach in a routine scan of activity reports. Pacific Suites quickly notified credit card companies and recent hotel guests of the breach, attempting to prevent serious harm. Technical security engineers faced a challenge in dealing with the PHT data.
PHT course administrators and the IT engineers did not have a system for tracking, cataloguing, and storing information. Pacific Suites has procedures in place for data access and storage, but those procedures were not implemented when PHT was formed. When the PHT database was acquired by Pacific Suites, it had no owner or oversight. By the time technical security engineers determined what private information was compromised, at least 8,000 credit card holders were potential victims of fraudulent activity.
In the Information Technology engineers had originally set the default for customer credit card information to
"Do Not Save," this action would have been in line with what concept?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (89q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: SCENARIO Please use the following to answer the next questio...
Question 4: SCENARIO Please use the following to answer the next questio...
Question 5: What is the name for the privacy strategy model that describ...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What is the key factor that lays the foundation for all othe...
Question 9: An executive for a multinational online retail company in th...
Question 10: SCENARIO Please use the following to answer the next questio...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: SCENARIO Please use the following to answer the next questio...
Question 13: Data retention and destruction policies should meet all of t...
Question 14: SCENARIO Please use the following to answer the next QUESTIO...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: SCENARIO Please use the following to answer the next questio...
Question 17: You would like your organization to be independently audited...
Question 18: Which of the following is TRUE about the Data Protection Imp...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next questio...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: SCENARIO Please use the following to answer the next questio...
Question 26: SCENARIO Please use the following to answer the next questio...
1 commentQuestion 27: In regards to the collection of personal data conducted by a...
1 commentQuestion 28: SCENARIO Please use the following to answer the next QUESTIO...
9 commentQuestion 29: Which is the best way to view an organization's privacy fram...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next questio...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next questio...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next questio...
Question 36: SCENARIO Please use the following to answer the next questio...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next questio...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: Which term describes a piece of personal data that alone may...
Question 41: Which will best assist you in quickly identifying weaknesses...
Question 42: A systems audit uncovered a shared drive folder containing s...
Question 43: All of the following changes will likely trigger a data inve...
Question 44: An organization's business continuity plan or disaster recov...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next questio...
Question 48: SCENARIO Please use the following to answer the next questio...
Question 49: Which is NOT an influence on the privacy environment externa...
Question 50: SCENARIO Please use the following to answer the next questio...
Question 51: SCENARIO Please use the following to answer the next questio...
Question 52: "Collection," "access" and "destruction" are aspects of what...
Question 53: In a sample metric template, what does "target" mean?...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: You would like to better understand how your organization ca...
Question 57: SCENARIO Please use the following to answer the next QUESTIO...
Question 58: Which of the following is NOT a type of privacy program metr...
Question 59: SCENARIO Please use the following to answer the next questio...
Question 60: SCENARIO Please use the following to answer the next QUESTIO...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: SCENARIO Please use the following to answer the next QUESTIO...
Question 63: SCENARIO Please use the following to answer the next QUESTIO...
Question 64: When supporting the business and data privacy program expand...
Question 65: When building a data privacy program, what is a good startin...
Question 66: The General Data Protection Regulation (GDPR) specifies fine...
Question 67: What is one obligation that the General Data Protection Regu...
Question 68: What is the main purpose in notifying data subjects of a dat...
Question 69: While trying to e-mail her manager, an employee has e-mailed...
Question 70: If your organization has a recurring issue with colleagues n...
1 commentQuestion 71: Under the General Data Protection Regulation (GDPR), when wo...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: SCENARIO Please use the following to answer the next questio...
Question 74: Which of the following indicates you have developed the righ...
1 commentQuestion 75: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 76: Which statement is FALSE regarding the use of technical secu...
Question 77: If done correctly, how can a Data Protection Impact Assessme...
Question 78: For an organization that has just experienced a data breach,...
Question 79: SCENARIO Please use the following to answer the next QUESTIO...
Question 80: What have experts identified as an important trend in privac...
Question 81: SCENARIO Please use the following to answer the next QUESTIO...
Question 82: SCENARIO Please use the following to answer the next questio...
Question 83: There are different forms of monitoring available for organi...
Question 84: An organization is establishing a mission statement for its ...
Question 85: SCENARIO Please use the following to answer the next QUESTIO...
Question 86: SCENARIO Please use the following to answer the next QUESTIO...
Question 87: In addition to regulatory requirements and business practice...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: SCENARIO Please use the following to answer the next QUESTIO...