<< Prev Question Next Question >>

Question 61/90

SCENARIO
Please use the following to answer the next QUESTION:
Henry Home Furnishings has built high-end furniture for nearly forty years. However, the new owner, Anton, has found some degree of disorganization after touring the company headquarters. His uncle Henry had always focused on production - not data processing - and Anton is concerned. In several storage rooms, he has found paper files, disks, and old computers that appear to contain the personal data of current and former employees and customers. Anton knows that a single break-in could irrevocably damage the company's relationship with its loyal customers. He intends to set a goal of guaranteed zero loss of personal information.
To this end, Anton originally planned to place restrictions on who was admitted to the physical premises of the company. However, Kenneth - his uncle's vice president and longtime confidante - wants to hold off on Anton's idea in favor of converting any paper records held at the company to electronic storage. Kenneth believes this process would only take one or two years. Anton likes this idea; he envisions a password- protected system that only he and Kenneth can access.
Anton also plans to divest the company of most of its subsidiaries. Not only will this make his job easier, but it will simplify the management of the stored dat a. The heads of subsidiaries like the art gallery and kitchenware store down the street will be responsible for their own information management. Then, any unneeded subsidiary data still in Anton's possession can be destroyed within the next few years.
After learning of a recent security incident, Anton realizes that another crucial step will be notifying customers. Kenneth insists that two lost hard drives in Question are not cause for concern; all of the data was encrypted and not sensitive in nature. Anton does not want to take any chances, however. He intends on sending notice letters to all employees and customers to be safe.
Anton must also check for compliance with all legislative, regulatory, and market requirements related to privacy protection. Kenneth oversaw the development of the company's online presence about ten years ago, but Anton is not confident about his understanding of recent online marketing laws. Anton is assigning another trusted employee with a law background the task of the compliance assessment. After a thorough analysis, Anton knows the company should be safe for another five years, at which time he can order another check.
Documentation of this analysis will show auditors due diligence.
Anton has started down a long road toward improved management of the company, but he knows the effort is worth it. Anton wants his uncle's legacy to continue for many years to come.
To improve the facility's system of data security, Anton should consider following through with the plan for which of the following?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Integrating privacy requirements into functional areas acros...
Question 3: If your organization has a recurring issue with colleagues n...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: What is the main purpose in notifying data subjects of a dat...
Question 6: In a mobile app for purchasing and selling concert tickets, ...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What United States federal law requires financial institutio...
Question 9: Under the General Data Protection Regulation (GDPR), when wo...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: Which of the following privacy frameworks are legally bindin...
Question 13: "Collection", "access" and "destruction" are aspects of what...
Question 14: What is one reason the European Union has enacted more compr...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: In addition to regulatory requirements and business practice...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: If done correctly, how can a Data Protection Impact Assessme...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next QUESTIO...
Question 22: All of the following are access control measures required by...
Question 23: A new business crafting its privacy policy is struggling wit...
Question 24: SCENARIO Please use the following to answer the next questio...
Question 25: SCENARIO Please use the following to answer the next QUESTIO...
Question 26: Which of the following best supports implementing controls t...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: How do privacy audits differ from privacy assessments?...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is most critical when outsourcing data destruction serv...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: SCENARIO Please use the following to answer the next QUESTIO...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: Which of the following is NOT recommended for effective Iden...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: The General Data Protection Regulation (GDPR) specifies fine...
Question 41: Under the General Data Protection Regulation (GDPR), which o...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: An organization's internal audit team should do all of the f...
Question 45: What is the main function of the Asia-Pacific Economic Coope...
Question 46: Under the General Data Protection Regulation (GDPR), what ar...
Question 47: A systems audit uncovered a shared drive folder containing s...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...
Question 49: When implementing Privacy by Design (PbD), what would NOT be...
Question 50: Which of the following controls does the PCI DSS framework N...
Question 51: SCENARIO Please use the following to answer the next QUESTIO...
Question 52: Which term describes a piece of personal data that alone may...
Question 53: What is the function of the privacy operational life cycle?...
Question 54: All of the following would be answered through the creation ...
Question 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: Under the GDPR. when the applicable lawful basis for the pro...
Question 57: An organization's business continuity plan or disaster recov...
Question 58: Which most accurately describes the reasons an organization ...
Question 59: Which of the following is NOT a type of privacy program metr...
Question 60: A minimum requirement for carrying out a Data Protection Imp...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: Formosa International operates in 20 different countries inc...
Question 63: Under the General Data Protection Regulation (GDPR), what mu...
Question 64: SCENARIO Please use the following to answer the next QUESTIO...
Question 65: Which of the following best demonstrates the effectiveness o...
Question 66: SCENARIO Please use the following to answer the next QUESTIO...
Question 67: Which of the following helps build trust with customers and ...
Question 68: In a mobile app for purchasing and selling concert tickets, ...
Question 69: SCENARIO Please use the following to answer the next QUESTIO...
Question 70: What is least likely to be achieved by implementing a Data L...
Question 71: A privacy maturity model provides all of the following EXCEP...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: When supporting the business and data privacy program expand...
Question 74: Which is the best way to view an organization's privacy fram...
Question 75: SCENARIO Please use the following to answer the next QUESTIO...
Question 76: SCENARIO Please use the following to answer the next QUESTIO...
Question 77: All of the following would be recommended for effective iden...
Question 78: SCENARIO Please use the following to answer the next QUESTIO...
Question 79: A minimum requirement for carrying out a Data Protection Imp...
Question 80: SCENARIO Please use the following to answer the next QUESTIO...
Question 81: Incipia Corporation just trained the last of its 300 employe...
Question 82: SCENARIO Please use the following to answer the next QUESTIO...
Question 83: SCENARIO Please use the following to answer the next QUESTIO...
Question 84: Which of the documents below assists the Privacy Manager in ...
Question 85: Data retention and destruction policies should meet all of t...
Question 86: Which of the following is a physical control that can limit ...
Question 87: An organization is establishing a mission statement for its ...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: When building a data privacy program, what is a good startin...
Question 90: SCENARIO Please use the following to answer the next QUESTIO...