<< Prev Question Next Question >>

Question 28/90

SCENARIO
Please use the following to answer the next QUESTION:
Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space's practices and assess what her privacy priorities will be, Penny has set up meetings with a number of colleagues to hear about the work that they have been doing and their compliance efforts.
Penny's colleague in Marketing is excited by the new sales and the company's plans, but is also concerned that Penny may curtail some of the growth opportunities he has planned. He tells her "I heard someone in the breakroom talking about some new privacy laws but I really don't think it affects us. We're just a small company. I mean we just sell accessories online, so what's the real risk?" He has also told her that he works with a number of small companies that help him get projects completed in a hurry. "We've got to meet our deadlines otherwise we lose money. I just sign the contracts and get Jim in finance to push through the payment. Reviewing the contracts takes time that we just don't have." In her meeting with a member of the IT team, Penny has learned that although Ace Space has taken a number of precautions to protect its website from malicious activity, it has not taken the same level of care of its physical files or internal infrastructure. Penny's colleague in IT has told her that a former employee lost an encrypted USB key with financial data on it when he left. The company nearly lost access to their customer database last year after they fell victim to a phishing attack. Penny is told by her IT colleague that the IT team "didn't know what to do or who should do what. We hadn't been trained on it but we're a small team though, so it worked out OK in the end." Penny is concerned that these issues will compromise Ace Space's privacy and data protection.
Penny is aware that the company has solid plans to grow its international sales and will be working closely with the CEO to give the organization a data "shake up". Her mission is to cultivate a strong privacy culture within the company.
Penny has a meeting with Ace Space's CEO today and has been asked to give her first impressions and an overview of her next steps.
To help Penny and her CEO with their objectives, what would be the most helpful approach to address her IT concerns?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (90q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Integrating privacy requirements into functional areas acros...
Question 3: If your organization has a recurring issue with colleagues n...
Question 4: SCENARIO Please use the following to answer the next QUESTIO...
Question 5: What is the main purpose in notifying data subjects of a dat...
Question 6: In a mobile app for purchasing and selling concert tickets, ...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What United States federal law requires financial institutio...
Question 9: Under the General Data Protection Regulation (GDPR), when wo...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: Which of the following privacy frameworks are legally bindin...
Question 13: "Collection", "access" and "destruction" are aspects of what...
Question 14: What is one reason the European Union has enacted more compr...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: In addition to regulatory requirements and business practice...
Question 17: SCENARIO Please use the following to answer the next QUESTIO...
Question 18: If done correctly, how can a Data Protection Impact Assessme...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next QUESTIO...
Question 22: All of the following are access control measures required by...
Question 23: A new business crafting its privacy policy is struggling wit...
Question 24: SCENARIO Please use the following to answer the next questio...
Question 25: SCENARIO Please use the following to answer the next QUESTIO...
Question 26: Which of the following best supports implementing controls t...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: How do privacy audits differ from privacy assessments?...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is most critical when outsourcing data destruction serv...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: SCENARIO Please use the following to answer the next QUESTIO...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: Which of the following is NOT recommended for effective Iden...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: The General Data Protection Regulation (GDPR) specifies fine...
Question 41: Under the General Data Protection Regulation (GDPR), which o...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: SCENARIO Please use the following to answer the next QUESTIO...
Question 44: An organization's internal audit team should do all of the f...
Question 45: What is the main function of the Asia-Pacific Economic Coope...
Question 46: Under the General Data Protection Regulation (GDPR), what ar...
Question 47: A systems audit uncovered a shared drive folder containing s...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...
Question 49: When implementing Privacy by Design (PbD), what would NOT be...
Question 50: Which of the following controls does the PCI DSS framework N...
Question 51: SCENARIO Please use the following to answer the next QUESTIO...
Question 52: Which term describes a piece of personal data that alone may...
Question 53: What is the function of the privacy operational life cycle?...
Question 54: All of the following would be answered through the creation ...
Question 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: Under the GDPR. when the applicable lawful basis for the pro...
Question 57: An organization's business continuity plan or disaster recov...
Question 58: Which most accurately describes the reasons an organization ...
Question 59: Which of the following is NOT a type of privacy program metr...
Question 60: A minimum requirement for carrying out a Data Protection Imp...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: Formosa International operates in 20 different countries inc...
Question 63: Under the General Data Protection Regulation (GDPR), what mu...
Question 64: SCENARIO Please use the following to answer the next QUESTIO...
Question 65: Which of the following best demonstrates the effectiveness o...
Question 66: SCENARIO Please use the following to answer the next QUESTIO...
Question 67: Which of the following helps build trust with customers and ...
Question 68: In a mobile app for purchasing and selling concert tickets, ...
Question 69: SCENARIO Please use the following to answer the next QUESTIO...
Question 70: What is least likely to be achieved by implementing a Data L...
Question 71: A privacy maturity model provides all of the following EXCEP...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: When supporting the business and data privacy program expand...
Question 74: Which is the best way to view an organization's privacy fram...
Question 75: SCENARIO Please use the following to answer the next QUESTIO...
Question 76: SCENARIO Please use the following to answer the next QUESTIO...
Question 77: All of the following would be recommended for effective iden...
Question 78: SCENARIO Please use the following to answer the next QUESTIO...
Question 79: A minimum requirement for carrying out a Data Protection Imp...
Question 80: SCENARIO Please use the following to answer the next QUESTIO...
Question 81: Incipia Corporation just trained the last of its 300 employe...
Question 82: SCENARIO Please use the following to answer the next QUESTIO...
Question 83: SCENARIO Please use the following to answer the next QUESTIO...
Question 84: Which of the documents below assists the Privacy Manager in ...
Question 85: Data retention and destruction policies should meet all of t...
Question 86: Which of the following is a physical control that can limit ...
Question 87: An organization is establishing a mission statement for its ...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: When building a data privacy program, what is a good startin...
Question 90: SCENARIO Please use the following to answer the next QUESTIO...