<< Prev Question Next Question >>

Question 85/89

SCENARIO
Please use the following to answer the next QUESTION:
Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.
Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/ printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.
Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.
Richard needs to closely monitor the vendor in charge of creating the firm's database mainly because of what?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (89q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: SCENARIO Please use the following to answer the next questio...
Question 4: SCENARIO Please use the following to answer the next questio...
Question 5: What is the name for the privacy strategy model that describ...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What is the key factor that lays the foundation for all othe...
Question 9: An executive for a multinational online retail company in th...
Question 10: SCENARIO Please use the following to answer the next questio...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: SCENARIO Please use the following to answer the next questio...
Question 13: Data retention and destruction policies should meet all of t...
Question 14: SCENARIO Please use the following to answer the next QUESTIO...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: SCENARIO Please use the following to answer the next questio...
Question 17: You would like your organization to be independently audited...
Question 18: Which of the following is TRUE about the Data Protection Imp...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next questio...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: SCENARIO Please use the following to answer the next questio...
Question 26: SCENARIO Please use the following to answer the next questio...
1 commentQuestion 27: In regards to the collection of personal data conducted by a...
1 commentQuestion 28: SCENARIO Please use the following to answer the next QUESTIO...
9 commentQuestion 29: Which is the best way to view an organization's privacy fram...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next questio...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next questio...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next questio...
Question 36: SCENARIO Please use the following to answer the next questio...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next questio...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: Which term describes a piece of personal data that alone may...
Question 41: Which will best assist you in quickly identifying weaknesses...
Question 42: A systems audit uncovered a shared drive folder containing s...
Question 43: All of the following changes will likely trigger a data inve...
Question 44: An organization's business continuity plan or disaster recov...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next questio...
Question 48: SCENARIO Please use the following to answer the next questio...
Question 49: Which is NOT an influence on the privacy environment externa...
Question 50: SCENARIO Please use the following to answer the next questio...
Question 51: SCENARIO Please use the following to answer the next questio...
Question 52: "Collection," "access" and "destruction" are aspects of what...
Question 53: In a sample metric template, what does "target" mean?...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: You would like to better understand how your organization ca...
Question 57: SCENARIO Please use the following to answer the next QUESTIO...
Question 58: Which of the following is NOT a type of privacy program metr...
Question 59: SCENARIO Please use the following to answer the next questio...
Question 60: SCENARIO Please use the following to answer the next QUESTIO...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: SCENARIO Please use the following to answer the next QUESTIO...
Question 63: SCENARIO Please use the following to answer the next QUESTIO...
Question 64: When supporting the business and data privacy program expand...
Question 65: When building a data privacy program, what is a good startin...
Question 66: The General Data Protection Regulation (GDPR) specifies fine...
Question 67: What is one obligation that the General Data Protection Regu...
Question 68: What is the main purpose in notifying data subjects of a dat...
Question 69: While trying to e-mail her manager, an employee has e-mailed...
Question 70: If your organization has a recurring issue with colleagues n...
1 commentQuestion 71: Under the General Data Protection Regulation (GDPR), when wo...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: SCENARIO Please use the following to answer the next questio...
Question 74: Which of the following indicates you have developed the righ...
1 commentQuestion 75: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 76: Which statement is FALSE regarding the use of technical secu...
Question 77: If done correctly, how can a Data Protection Impact Assessme...
Question 78: For an organization that has just experienced a data breach,...
Question 79: SCENARIO Please use the following to answer the next QUESTIO...
Question 80: What have experts identified as an important trend in privac...
Question 81: SCENARIO Please use the following to answer the next QUESTIO...
Question 82: SCENARIO Please use the following to answer the next questio...
Question 83: There are different forms of monitoring available for organi...
Question 84: An organization is establishing a mission statement for its ...
Question 85: SCENARIO Please use the following to answer the next QUESTIO...
Question 86: SCENARIO Please use the following to answer the next QUESTIO...
Question 87: In addition to regulatory requirements and business practice...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: SCENARIO Please use the following to answer the next QUESTIO...